The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Why Australia’s AI Ambitions Depend on Smarter Networks
Australia’s ambition to be a global leader in artificial intelligence (AI) is clear—from sovereign AI strategies to booming enterprise deployment. But underneath the promise lies a pressing energy challenge. Data centres already account for approximately 5% of Australia’s electricity supply today, and according to reports could consume as much as 8% by ...

Decrypting the Future: Why Post-Quantum Security Must Start Today
Introduction
Australia is standing at the edge of a technological shift that could redefine cyber resilience. With quantum computing on the horizon, the very foundations of data security are under threat. While this technology promises enormous advances in areas like medical research, logistics and AI, it also has the potential to break the ...
Ransomware Protection Advisory: From Cisco Flaws to SonicWall Breaches
“Please wait, your document is loading.”
That’s the message victims saw right before their systems got hijacked. Behind that digital curtain, crypto miners and information stealers worked stealthily to infiltrate networks, exfiltrate sensitive data, and plant persistent malware.
In the latest ColorTokens Threat Advisory, we tracked how threat ...

Caught in the Middle – How Diverse Cyber Laws Affect Global Organisations
Regulatory fragmentation has become one of the most pressing yet overlooked concerns for global organisations, particularly as governments introduce differing cybersecurity laws. The issue lies not in the creation per se, but in the fact that these rules and regulations are developed in silos. Every country has its own perspective, shaped by the ...

Overcoming the Security Risks of Using AI In Software Development
Development teams face relentless pressure to deliver, yet they must continue to prioritise building secure, high-quality software. Leaders play a crucial role in reinforcing how a Secure by Design approach, supported by observability, benchmarking, and ongoing education, directly enhances code quality. By embedding these practices, organisations can ...

Speed, Identity, and AI: Redefining Cybersecurity for Australian Organisations
Speed, Identity, and AI: Redefining Cybersecurity for Australian Organisations
Cybersecurity teams have always grappled with emerging technologies, increasingly sophisticated attacks and new regulations. However, as organisations accelerate AI and cloud adoption, digitise services, and adapt to evolving compliance regulations, security challenges ...

How to Invest in AI to Overcome the Challenges of Identity-based Security
AI is reshaping what’s possible when it comes to protecting organisations against identity-based attacks. By offering prescriptive recommendations on how to harden identity security, together with advanced detection of evolving threats, organisations can improve their ability to operate now and into the future.

How One Vendor Breach Becomes a Global Risk
Today, businesses run on an invisible thread: supply chain. It links industries and consumers through numerous pathways, whether physical or digital. From ports to airlines to healthcare and finances, organisations rely on these networks to operate efficiently and at scale. But here’s the catch, recent events revealed that the same interdependence and ...
No results found.
In The News
Darktrace Releases New Innovations in Darktrace / EMAIL™ to Stop Emerging Cross-Domain Attacks and Protect Outbound Trust
New research finds approximately 17% of email threats bypass Secure Email Gateways but are stopped by Darktrace’s AI[1]
New enhancements strengthen protection against threats that move across channels, like email bombing campaigns, as the volume of these attacks surges 100x
New brand verification capabilities introduced as phishing attacks ...
Unveiling WARP PANDA: A New Sophisticated China-Nexus Adversary
Throughout 2025, CrowdStrike has identified multiple intrusions targeting VMware vCenter environments at U.S.-based entities, in which newly identified China-nexus adversary WARP PANDA deployed BRICKSTORM malware. WARP PANDA exhibits a high level of technical sophistication, advanced operations security (OPSEC) skills, and extensive knowledge of cloud ...
Trend Micro Predicts 2026 as the Year Scams Become AI-Driven, AI-Scaled, and Emotion-Engineered
Trend Micro Predicts 2026 as the Year Scams Become AI-Driven, AI-Scaled, and Emotion-Engineered
Email Threat Radar – December
Email Threat Radar – December 2025
Notable threats targeting organisations seen by Barracuda Managed XDR
Dynatrace Expands AWS Integrations at re:Invent 2025
BOSTON, Mass., December 3, 2025 — Today at Amazon Web Services (AWS) re:Invent 2025, Dynatrace (NYSE: DT) announced expanded integrations with advanced AWS technologies and new achievements with AWS that deliver enhanced AI-driven observability, automation, and security to customers worldwide. These advancements help enterprises running workloads on ...
Datadog Announces Expanded Collaboration with AWS, Highlighting New AI, Observability and Security Capabilities at AWS re:Invent
Datadog signs new Strategic Collaboration Agreement with AWS, building on 10+ years of joint innovation and outcomes for customers
AI Adoption In Cybersecurity Surges Across Australia: 91 percent Already Using It
AI now powers detection, response, and recruitment as enterprises shift from reactive to predictive defence
Veeam and HPE Extend Strategic Partnership and Unveil Next-gen Data Protection to Supercharge Enterprise Resilience
Veeam® Software, the #1 global leader by market share in Data Resilience, today announced a bold new chapter in its strategic alliance with HPE. Building on the partnership’s momentum earlier this year, HPE and Veeam are unleashing transformative, integrated solutions designed to empower enterprises with radically simplified data resilience for the ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
