Exploits of public-facing apps are surging. Why?

Media Thumbnail
00:00
00:00
1x
  • 0.5
  • 1
  • 1.25
  • 1.5
  • 1.75
  • 2
This is a podcast episode titled, Exploits of public-facing apps are surging. Why?. The summary for this episode is: <p>For years, stolen credentials were king—the hacker’s attack vector of choice. Until now.&nbsp;</p><p><br></p><p>The 2026 IBM X-Force Threat Intelligence Index reveals a surge in the exploitation of public-facing applications, overtaking identity-based attacks as the top initial access vector.&nbsp;&nbsp;</p><p><br></p><p>Why are threat actors changing their tactics so dramatically—and what does it mean for defenders?&nbsp;</p><p>&nbsp;</p><p>In this episode of <em>Security Intelligence</em>, panelists Claire Nuñez, Chris Caridi and Joe Xatruch break down the biggest findings from the latest Threat Intelligence Index, plus:&nbsp;</p><ul><li>Infostealers that grab AI agents’ “souls”&nbsp;</li><li>Compromised packages that drop AI agents as malware&nbsp;</li><li>The AI infrastructure flaws we can’t seem to fix&nbsp;</li><li>Why threat intelligence is so siloed—and what we can do about it&nbsp;</li></ul><p><br></p><p>All that and more—on <em>Security Intelligence</em>.&nbsp;</p><p><br></p><p>00:00 - Intro&nbsp;</p><p>1:17 - Threat Intelligence Index 2026&nbsp;&nbsp;</p><p>16:22 - Stealing AI agents’ souls&nbsp;&nbsp;</p><p>28:03 - AI infrastructure flaws&nbsp;&nbsp;</p><p>36:36 - Threat intelligence made human&nbsp;</p><p><br></p><p>&nbsp;</p><p><em>The opinions expressed in this podcast are solely those of the participants and do not necessarily reflect the views of IBM or any other organization or entity.</em>&nbsp;</p><p>&nbsp;</p><p><br></p><p>Follow the Security Intelligence podcast on your preferred platform →&nbsp;<a href="https://www.ibm.com/think/podcasts/security-intelligence" rel="noopener noreferrer" target="_blank">https://www.ibm.com/think/podcasts/security-intelligence</a>&nbsp;</p><p>Explore the Threat Intelligence Index 2026 →<strong><em>&nbsp;</em></strong><a href="https://www.ibm.com/reports/threat-intelligence#sipod" rel="noopener noreferrer" target="_blank">https://www.ibm.com/reports/threat-intelligence#sipod</a><strong>&nbsp;&nbsp;&nbsp;</strong>&nbsp;</p>

DESCRIPTION

For years, stolen credentials were king—the hacker’s attack vector of choice. Until now. 


The 2026 IBM X-Force Threat Intelligence Index reveals a surge in the exploitation of public-facing applications, overtaking identity-based attacks as the top initial access vector.  


Why are threat actors changing their tactics so dramatically—and what does it mean for defenders? 

 

In this episode of Security Intelligence, panelists Claire Nuñez, Chris Caridi and Joe Xatruch break down the biggest findings from the latest Threat Intelligence Index, plus: 

  • Infostealers that grab AI agents’ “souls” 
  • Compromised packages that drop AI agents as malware 
  • The AI infrastructure flaws we can’t seem to fix 
  • Why threat intelligence is so siloed—and what we can do about it 


All that and more—on Security Intelligence


00:00 - Intro 

1:17 - Threat Intelligence Index 2026  

16:22 - Stealing AI agents’ souls  

28:03 - AI infrastructure flaws  

36:36 - Threat intelligence made human 


 

The opinions expressed in this podcast are solely those of the participants and do not necessarily reflect the views of IBM or any other organization or entity. 

 


Follow the Security Intelligence podcast on your preferred platform → https://www.ibm.com/think/podcasts/security-intelligence 

Explore the Threat Intelligence Index 2026 → https://www.ibm.com/reports/threat-intelligence#sipod