Sweet New Threat Intel Just Dropped

54,398
0
Published 2024-02-29
jh.live/x-force-report || Crash course preview to showcase the latest IBM X-Force Threat Intelligence Index! I honestly think this report is an awesome breakdown of the threats we've seen across the industry, and upcoming thoughts on AI and cyberwarfare. I walk through some of the details and share my hot takes.

Of course, big thanks to X-Force for their support and research here! You can check out the full IBM X-Force Threat Intelligence Index report here: jh.live/x-force-report
Their webinar: jh.live/x-force-webinar
Learn more about IBM X-Force: jh.live/x-force

Free Cybersecurity Education and Ethical Hacking with John Hammond
📧JOIN MY NEWSLETTER ➡ jh.live/email
🙏SUPPORT THE CHANNEL ➡ jh.live/patreon
🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor
🌎FOLLOW ME EVERYWHERE ➡ jh.live/twitterjh.live/linkedinjh.live/discordjh.live/instagramjh.live/tiktok
💥 SEND ME MALWARE ➡ jh.live/malware
🔥YOUTUBE ALGORITHM ➡ Like, Comment, & Subs

All Comments (21)
  • @eso210
    Babe wake up, new threat intel just dropped
  • @JPerridew
    Great video! I am NOW really excited to check out the report
  • @furttech
    thanks for the tip! looking at this later tonight.
  • @user-xl5sx9hq7k
    Cool video John! I like hit the high points as much as possible. Greatly appreciate the content you made. 👍 I like it.
  • @rorsie
    Wow, thanks for covering this. Definitely gonna download that and read through more
  • @brandoncpk
    At 8:17, whats the difference between valid account and phishing?
  • @CubensisEnjoyer
    IBM X-Force Threat Intelligence Index and the Verizon DBIR are my favorite sources for this kind of info. I think all security professionals should be reading this data, at the very least to avoid getting caught in their own bubble. Just because you don't see certain threats in your own environment doesn't mean they aren't out there
  • If you’ve ever integrated ibm x force iocs into your siem, you know the pain of false positives
  • @mytechnotalent
    Identies, particularly machine identies are literally everything and those that enforce these identities will provide real security.
  • @KenPryor
    Good stuff, John. Definitely going to check out the full report.
  • You're the man! Thanks for the content. Also lol please get a pop filter for your mic.
  • @ihacksi
    Hi John, Can you make a video with @13cubed about windows forensics... would love to see that. He has great content.
  • @UMERFAROOQ-cl2nd
    Can you please make a video on Nood Ransom ware How it works and how can we recover data which is infected by this Ransom , both for Offline and online Key please show how can we decrypt the data which is encrypted by this Nood Ransom. please.
  • @chrisorg170
    GenAI threat hype >= the upside to nft’s in 2021 ….. we’re so repetitive lol
  • @nickadams2361
    kerberoasting? roasting the security of your Kubernetes cluster heh