The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Why Security Vulnerability Management Strategies Need to Evolve

Why Security Vulnerability Management Strategies Need to Evolve

The capabilities offered by business software applications are constantly growing, but unfortunately so too are the number of vulnerabilities. Much of this challenge can be attributed to the rate of change that is occurring within organisations. Determined to improve productivity and reduce operational costs, many are embracing strategies of digital ...
Harassment Surged 20x in Ransomware Cases, New Report From Palo Alto Networks Unit 42 Finds

Harassment Surged 20x in Ransomware Cases, New Report From Palo Alto Networks Unit 42 Finds

A new report from Palo Alto Networks (NASDAQ: PANW), the global cybersecurity leader, found that ransomware and extortion actors are utilising more aggressive tactics to pressure organisations, with harassment being involved 20 times more often than in 2021, according to Unit 42™ incident response cases.
Research Highlights Cyber Security’s Underestimated Role as a Business and Revenue-enabler

Research Highlights Cyber Security’s Underestimated Role as a Business and Revenue-enabler

Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cybersecurity leader, today released new research* revealing that while Australian organisations plan to increase cybersecurity budgets in 2023, business leaders hold conflicting views on the function.
BeyondTrust 10th Annual Microsoft Vulnerabilities Report Finds Elevation of Privilege Remains #1 Microsoft Vulnerability Category

BeyondTrust 10th Annual Microsoft Vulnerabilities Report Finds Elevation of Privilege Remains #1 Microsoft Vulnerability Category

BeyondTrust, the worldwide leader in intelligent identity and access security, today announced the release of the 2023 Microsoft Vulnerabilities Report. This report is the 10th anniversary edition and covers a decade of vulnerability insights, providing valuable information to help organisations see into the past, present, and future of the Microsoft ...
UPDATE: Latitude Financial Hit by Data Breach

UPDATE: Latitude Financial Hit by Data Breach

Last week, ​​consumer finance provider Latitude Financial suffered a cyberattack that compromised the personal information of around 330,000 customers in New Zealand and Australia. Most of the stolen data was copies of driver's licenses or numbers, and only a small percentage were passport numbers or Medicare numbers. The Department of Internal Affairs ...
How to Safeguard Data From ChatGPT’s Security Risks

How to Safeguard Data From ChatGPT’s Security Risks

ChatGPT is now the fastest-growing app in history, hitting 100 million active users in just two months—way faster than the nine months it took previous record-holder TikTok to reach that mark. According to its developer OpenAI, Australia can also expect access to the subscription-based ChatGPT Plus soon.
Palo Alto Networks Leads the Industry to AI-Powered SASE

Palo Alto Networks Leads the Industry to AI-Powered SASE

According to the Gartner® 2022 Roadmap for SASE Convergence report1, by 2025, 80% of enterprises will have adopted a strategy to unify web, cloud services and private application access using a SASE/SSE architecture, up from 20% in 2021.

CrowdStrike Discovers First-Ever Dero cryptojacking Campaign Targeting Kubernetes

- Benjamin Grap - Manoj Ahuje CrowdStrike has discovered the first-ever Dero cryptojacking operation targeting Kubernetes infrastructure. Dero is a cryptocurrency that claims to offer improved privacy, anonymity and higher and faster monetary rewards compared to Monero, which is a commonly used cryptocurrency in cryptojacking operations. The novel ...
No results found.

In the News

BeyondTrust Completes Australian InfoSec Registered Assessor Program (IRAP) at “PROTECTED” Classification Level

BeyondTrust Completes Australian InfoSec Registered Assessor Program (IRAP) at “PROTECTED” Classification Level

New security status enables BeyondTrust to provide assurance in helping the Australian Government reinforce cloud posture. IRAP-assessed solutions now enable public sector agencies to ascertain BeyondTrust’s readiness for secure cloud adoption.
Oracle to Offer Google’s Gemini Models to Customers, Accelerating Enterprises’ Agentic AI Journeys

Oracle to Offer Google’s Gemini Models to Customers, Accelerating Enterprises’ Agentic AI Journeys

Customers will have access to highly performant, flexible Gemini multimodal models via OCI Generative AI service. Oracle will collaborate with Google Cloud on various Gemini model integrations across business applications
CrowdStrike Unveils Falcon Next-Gen Identity Security, the First Unified Solution to Protect Every Identity Across the Attack Chain

CrowdStrike Unveils Falcon Next-Gen Identity Security, the First Unified Solution to Protect Every Identity Across the Attack Chain

Only CrowdStrike unifies initial access, privileged access, ITDR, and SaaS security for every human, non-human, and AI agent identity into a single platform – delivered today, without delays or integration complexity
VAST Data Collaborates With SK Telecom to Optimise Korea’s Largest AI Infrastructure Based on NVIDIA Supercomputers

VAST Data Collaborates With SK Telecom to Optimise Korea’s Largest AI Infrastructure Based on NVIDIA Supercomputers

VAST Data today announced a partnership with SK Telecom (SKT), South Korea’s leading telecommunications provider that’s transforming itself into an AI company. To deploy its advanced AI platform on SKT’s new sovereign AI infrastructure powered by the latest NVIDIA Blackwell GPUs. Named the Haein Cluster, this AI infrastructure, designed initially ...
From Weakest Link to Cyber Shield: ESET Launches Awareness Training in Australia

From Weakest Link to Cyber Shield: ESET Launches Awareness Training in Australia

ESET launches ESET Cybersecurity Awareness Training in Australia, helping local businesses to avoid breaches resulting from human error. ESET Cybersecurity Awareness Training helps meet ISM-0252, NIS2, HIPAA, PCI, SOX, GDPR, and CCPA compliance requirements, as well as insurance requirements. This online educational and testing source puts 30 years ...
Qualys Honored With Dual Win at Prestigious Pwnie Awards for Groundbreaking Cybersecurity Research

Qualys Honored With Dual Win at Prestigious Pwnie Awards for Groundbreaking Cybersecurity Research

Wins for Epic Achievement and Best RCE spotlight Qualys’ industry-leading research into critical OpenSSH vulnerabilities, reinforcing its leadership in global cybersecurity innovation
Tenable Jailbreaks OpenAI’s GPT-5 Within 24 Hours, Bypassing New Safety Features

Tenable Jailbreaks OpenAI’s GPT-5 Within 24 Hours, Bypassing New Safety Features

Just 24 hours after OpenAI launched its highly anticipated GPT−5 model with promises of “significantly more sophisticated” prompt safety, exposure management company Tenable has successfully jailbroken the platform, compelling it to provide detailed instructions on how to build a Molotov cocktail. On August 7, 2025, OpenAI unveiled GPT−5, touting its ...
Fortinet Enhances FortiRecon to Align With Continuous Threat Exposure Management Framework to Help Organisations Stay Ahead of Threats

Fortinet Enhances FortiRecon to Align With Continuous Threat Exposure Management Framework to Help Organisations Stay Ahead of Threats

New features integrate attack surface management, threat intelligence, and security orchestration to help security teams reduce risk faster and more proactively
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This