The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Australia’s Next Insider Threat Might Be an Algorithm
As Australian organisations race to embed AI tools across human resources, finance and operations, they may be missing a critical security fault line. While disgruntled employees or contractors gone rogue remain a concern, the next major data breach is increasingly likely to come from an algorithm that never intended malice.

Safeguarding Australia’s Most Critical Systems: Why Cybersecurity Is a Sovereignty Issue
Byline from Christopher Rule, General Manager of Defence, Security, and Resilence at GME about why cybersecurity is a sovereignty issue, on the back off ASD's recent Cyber Threat Report and ASIO Director-General Mike Burgess's speech on cyber espionage against critical infrastructure no longer being a hypothetical wartime scenario.

Exploring Security In the Context of AI
Insights from the Cisco Live! "Redefining Security in the AI Era" Panel
The rapid proliferation of Artificial Intelligence (AI) across industries has adroitly shifted the paradigm of cybersecurity. At the recent “Redefining Security in the AI Era” panel held at Cisco Live! 2025, senior leaders from Cisco, and partner organisation Logicalis, met to ...

Cybercrime to Hit $10.5 Trillion by 2025, According to Cybersecurity Ventures
According to research from Cybersecurity Ventures, cybercrime is projected to cost the world $10.5 trillion annually by 2025 ¹ and attacks, especially ransomware, are now an everyday fact of life. Last week in New York, at a recent press briefing before the official commencement of Commvault Shift, Commvault disclosed that 78% of respondents in the ...

‘We Let the Internet Down Today’ says Co-Founder at Cloudflare
When Cloudflare goes down, the internet feels it. The recent Cloudflare outage wasn’t just ‘a blip’ - it was an unfortunate failure that took some of the world’s most heavily trafficked services offline.
Cloudflare confirmed that a configuration update triggered a failure inside its control plane, specifically within systems responsible for managing ...

Like It or Not, PQC Is the Key (For Now)
Every few months, another “quantum-safe” technology is marketed as the real answer, usually with the claim that post-quantum cryptography isn’t enough. PQC is too new, too slow, too fragile, too unproven. One person I spoke to even described adopting PQC as “shuffling the furniture on a sinking ship,” as if the standards effort itself is the ...
The ABCs of GRC
Introduction
In the face of increasing regulatory pressure, rising cyber threats, and growing business complexity, organisations need a structured, scalable approach to managing risk. Governance, Risk, and Compliance (GRC) frameworks have become vital for aligning information security with corporate objectives, ensuring operational resilience, and ...

The Korean Leaks – Analysing the Hybrid Geopolitical Campaign Targeting South Korean Financial Services with Qilin RaaS
When preparing data for the Bitdefender Threat Debrief | October 2025, Bitdefender noticed a significant departure from established ransomware trends. Typically, the top five most impacted countries are consistently the US, Canada, and major Western European nations. However, for this period, South Korea (KR) suddenly became the second most-targeted ...
No results found.
In The News
LABYRINTH CHOLLIMA Evolves into Three Adversaries
LABYRINTH CHOLLIMA has evolved into three distinct adversaries with specialized malware, objectives, and tradecraft: GOLDEN CHOLLIMA and PRESSURE CHOLLIMA now likely operate separately from the core LABYRINTH CHOLLIMA group.
GOLDEN CHOLLIMA and PRESSURE CHOLLIMA target cryptocurrency entities and are distinguished by the scale and scope of their ...
New ISACA Study: Privacy Teams Are Shrinking, Increasingly Stressed
ISACA’s 2026 State of Privacy survey report warns privacy risk is becoming a broader business issue as privacy resources tighten across the region.
DigiCert Releases Q4 2025 RADAR Brief
Heavy demand for online content and growing cyber threats defined the end of 2025
New Motorola Solutions AI Offerings Help Public Safety Agencies Reclaim Hours Every Day
Motorola Solutions has announced the launch of Assist Suites, a portfolio of role-based AI for public safety solutions designed to deliver the right intelligence to the right person at the right time. Assist Suites synthesise multiple sources of data from across an agency – 911 audio, body and in-car camera footage, radio transcripts and more – into a ...
xReality Group (ASX:XRG) Quarterly Activities Report
xReality Group (ASX:XRG) has announced its Quarterly Activities Report and Appendix 4C for the quarter ending 31st December 2025, together with an Operational Update.
Key Highlights:
Highest Cash Receipts to date
$7.4m in Q2 (up 85% QoQ)
$11.4m YTD (up 20% PcP)
Net Cash from Operations $3.1m
Global Individual Agencies ...
Mandiant Warns of Active ShinyHunters Vishing Campaign Targeting Enterprise Identity Systems
Mandiant, part of Google, is warning organisations of an active and ongoing cybercrime campaign attributed to actors operating under the ShinyHunters name, leveraging advanced voice phishing (vishing) techniques to compromise enterprise identity environments.
Mandiant has observed attackers using evolved social engineering methods to successfully ...
LevelBlue and Fortra Launch Strategic Managed Services Partnership to Accelerate Cybersecurity Innovation
Strategic partnership includes LevelBlue's acquisition of Fortra's Alert Logic Managed Detection and Response business, strengthening LevelBlue's position as a global MDR leader
New Global CDO Report Shows That Closing Skills and Data Governance Gaps is Critical to Australia’s AI Success
Informatica from Salesforce, a leader in AI-powered cloud data management, has published a new global study revealing that while Australian organisations are rapidly accelerating their use of AI, many lack the data skills, governance frameworks and infrastructure needed to support responsible and scalable AI.
The study, which surveyed 600 global ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
