The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

The Real Corporate Penetration Testing Process: How Companies Get Hacked Before The Hackers Do! 🚀

The Real Corporate Penetration Testing Process: How Companies Get Hacked Before The Hackers Do! 🚀

Hey guys, I’m sn0x — a cybersecurity researcher, bug hunter, and security enthusiast. I hold multiple certifications, including CNSP, EWPTXv2, CEH v11–12, GRC, RHCSA, and Cisco Cyber Threat Management. I’ve been ranked #1 in India and #2 globally on TryHackMe, secured #134 on Hack The Box in 2021, and even won HTB Battlegrounds twice. But hey, this ...
What in the DeepSeek?

What in the DeepSeek?

DeepSeek, the tool designed to exploit vulnerabilities in AI systems, raises significant concerns amongst the security industry, particularly OpenAI. The DeepSeek competitor discussed the potential for DeepSeek to undermine the security of AI applications, which could have far-reaching consequences for technology as we know it. Satnam Narang, Senior ...
AI First, Human Second: The New Cybersecurity Command Structure

AI First, Human Second: The New Cybersecurity Command Structure

"Man is the measure of all things." ― Protagora - pre-Socratic Greek philosopher It’s an ancient idea, yet it feels more relevant than ever as machines start making decisions that were once left to human minds. In today’s high-stakes cybersecurity landscape, artificial intelligence is no longer a future wager; it’s a frontline asset. AI systems detect ...
Data Management – It’s A High-stakes Game

Data Management – It’s A High-stakes Game

This articles explores the security risks associated with poorly managed data, and details how regulations from OAIC and APRA are raising the stakes for both professionals and organisations alike.
Account Takeover Attacks on Social Media: A Rising Threat for Content Creators and Influencers

Account Takeover Attacks on Social Media: A Rising Threat for Content Creators and Influencers

In 2024 and continuing into 2025, social media platforms were prime targets for cybercriminals, with content creators facing the brunt of the malicious attacks, including a surge in account takeovers, malicious live streams, and sophisticated phishing campaigns. Bitdefender Labs has been at the forefront in analysing these threats, and the numbers ...
The Growing Nexus of Cyber Security and Financial Warfare – An Australian’s Perspective

The Growing Nexus of Cyber Security and Financial Warfare – An Australian’s Perspective

Opening Remarks Sadly, it has become an undeniable reality that the traditional boundaries between conventional warfare and economic statecraft are rapidly dissolving. Cyber security and financial warfare have evolved into critical instruments of geopolitical influence and power projection, with significant implications for nations like Australia. The ...
Security Is An Arms Race, and The Bad Guys Are Two Steps Ahead

Security Is An Arms Race, and The Bad Guys Are Two Steps Ahead

Cloud environments are a notorious ransomware attack hot spot. It’s a calculated strategy on the part of the cybercriminals. As the old adage goes, ‘follow the money’, and that’s exactly what they’re doing. Predictions suggest cloud infrastructure spend will reach over US$135 billion in 2026, accounting for over 67 per cent of total compute and ...
The Challenges of Underfunding Data Teams: How Data Drives AI and Security

The Challenges of Underfunding Data Teams: How Data Drives AI and Security

This article delves into the critical role of data teams in supporting AI and security initiatives within organisations. It highlights the challenges that arise from underfunding these teams, emphasising the importance of data quality, governance, and management. The piece explores the imbalance in budget allocation, potential risks, and inefficiencies ...
No results found.

In The News

Microsoft Report – Fraudsters Using AI to Supercharge Their Scams – Tips to Protect Yourself

Microsoft Report – Fraudsters Using AI to Supercharge Their Scams – Tips to Protect Yourself

Today, Microsoft has released its latest Cyber Signals report on AI-assisted scams, including those targeting e-shoppers and job seekers. To read the full report, please click here. Why is this relevant now? AI-assisted scams are on the rise; over the past year alone, Microsoft has thwarted $US4 billion in fraud attempts and approximately 1.6 ...
Tenable Comment: MITRE CVE Program Funding Set To Expire

Tenable Comment: MITRE CVE Program Funding Set To Expire

MITRE’s CVE program has been an important pillar in cybersecurity for over two decades. The lack of certainty surrounding the future of the CVE program creates great uncertainty about how newly discovered vulnerabilities will be catalogued. Please find below a comment from Satnam Narang, sr. staff research engineer at Tenable and a bog here from ...
DDoS Threat Landscape Shifts: U.S. Hit Hardest, but Australia and NZ Remain on Alert

DDoS Threat Landscape Shifts: U.S. Hit Hardest, but Australia and NZ Remain on Alert

New data from Radware’s Hacktivism Unveiled Q1 2025 report underscores a sharp escalation in politically motivated cyberattacks, particularly Distributed Denial-of-Service (DDoS) campaigns. The United States emerged as the most frequently targeted nation, experiencing 558 attacks—13.5% of all incidents globally—outpacing Ukraine (400) and Israel (340). ...
Gerry Sillars is Bolstering Semperis’ Identity-Driven Cybersecurity Efforts in APJ

Gerry Sillars is Bolstering Semperis’ Identity-Driven Cybersecurity Efforts in APJ

Gerry Sillars is Bolstering Semperis’ Identity-Driven Cybersecurity Efforts in Asia Pacific and Japan
Tenable Announces Co-CEOs – Steve Vintz and Mark Thurmond

Tenable Announces Co-CEOs – Steve Vintz and Mark Thurmond

Tenable®, the exposure management company, today announced that its Board of Directors has unanimously appointed Steve Vintz and Mark Thurmond as Co-Chief Executive Officers on a permanent basis. Following an extensive search process that considered both internal and external candidates, the Board concluded that Vintz and Thurmond are best positioned ...
12th Annual Edition of the BeyondTrust Microsoft Vulnerabilities Report Reveals Record-Breaking Year for Microsoft Vulnerabilities

12th Annual Edition of the BeyondTrust Microsoft Vulnerabilities Report Reveals Record-Breaking Year for Microsoft Vulnerabilities

Total vulnerabilities reached an all-time high of 1,360 in 2024, an 11% increase from the previous record of 1,292 in 2022 Elevation of Privilege (EoP) and Remote Code Execution (RCE)—primary goals of any threat actor looking to exploit a system—continue to dominate the vulnerability categories year-over-year
New Research Reveals Australian Businesses Are Experiencing a Rise In Fraud

New Research Reveals Australian Businesses Are Experiencing a Rise In Fraud

61% of Australian respondents have reported increases in the most common types of fraud such as identity theft, account creation fraud and digital document forgeries.
Fuse Partners With Check Point Software to Deploy First Advanced Blockchain Firewall for Real-Time Threat Prevention

Fuse Partners With Check Point Software to Deploy First Advanced Blockchain Firewall for Real-Time Threat Prevention

Partnership introduces first-of-its-kind, AI-powered threat prevention layer for blockchains—securing smart contracts, wallets in real time
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This