The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

New Genetec research shows cybersecurity remains a top concern for physical security professionals worldwide

New Genetec research shows cybersecurity remains a top concern for physical security professionals worldwide

As cybersecurity awareness month becomes a focus of discussion in October, new research conducted by Genetec Inc. (“Genetec”), a leading technology provider of unified security, public safety, operations, and business intelligence solutions, shows that cybersecurity remains a top concern for physical security professionals going into 2023.
We’re Still Terrible at Passwords, Confirms New Research

We’re Still Terrible at Passwords, Confirms New Research

Poor password management making it easy for cyber-attackers to access corporate systems
Australia’s leaders confident with cyber disclosure ability, yet hesitant to sharing publicly – PwC Digital Trust Insights Survey

Australia’s leaders confident with cyber disclosure ability, yet hesitant to sharing publicly – PwC Digital Trust Insights Survey

In an age of growing transparency, with consumers increasingly concerned about how their data is stored and used, domestic results indicate that Australia is lagging behind its global counterparts, according to local data released today from PwC’s 2023 Global Digital Trust Insights Survey.
The race to zero hours: Why latest guidelines spell danger for Australia’s Cybersecurity

The race to zero hours: Why latest guidelines spell danger for Australia’s Cybersecurity

Cybercrime is the biggest threat facing corporate Australia today, costing the economy more than an estimated $3trillion.
Russians buy fake employment & illness certificates on Telegram to avoid conscription

Russians buy fake employment & illness certificates on Telegram to avoid conscription

Since Putin’s mobilization order was announced, Flashpoint has observed a growing number of chatter and advertisements on Russian illicit communities and social media platforms, offering methods or access to avoid the draft.
IoT Software vulnerability in the IKEA TRÅDFRI smart lighting system

IoT Software vulnerability in the IKEA TRÅDFRI smart lighting system

Researchers at the Synopsys Cybersecurity Research Center (CyRC) have discovered an availability vulnerability in the IKEA TRÅDFRI smart lighting system.
What is a ‘Denial of Service’ software vulnerability and what impact could it have on you?

What is a ‘Denial of Service’ software vulnerability and what impact could it have on you?

By Jonathan Knudsen, Head of Global Research, Synopsys Cybersecurity Research Center The Synopsys Cybersecurity Research Center (CyRC) recently published a vulnerability advisory related to Open5GS, which is full of dense technical detail. But what does it all mean for organizations? What’s the potential impact? To answer that, let’s take a step ...
Why You Should Care About the Optus Breach If You’re A Customer

Why You Should Care About the Optus Breach If You’re A Customer

By now, you’ve likely seen the news about Optus, Australia's second-largest telco, having suffered a serious data breach, and the exposing of the private information of their millions of current and historic users through a malicious cyber-attack. What might not be clear to many, is the implications of the breach, and steps that can be taken toward ...
No results found.

In The News

Check Point to Acquire Veriti to Transform Threat Exposure Management and Reduce Organisations’ Cyber Attack Surface

Check Point to Acquire Veriti to Transform Threat Exposure Management and Reduce Organisations’ Cyber Attack Surface

Veriti is the first to introduce pre-emptive exposure management delivering automated remediation of threat exposure risks and collaborative threat prevention across complex multi-vendor environments 
Trend Micro Offers Enterprise AI Security Platform Across Data in Cloud Or On Premises

Trend Micro Offers Enterprise AI Security Platform Across Data in Cloud Or On Premises

AI security solution integrated with NVIDIA Enterprise AI Factory validated design  SYDNEY, MAY 20, 2025 – Global enterprise cybersecurity leader Trend Micro Incorporated (TYO: 4704; TSE: 4704) today announced its bringing powerful and simplified security capabilities to NVIDIA Enterprise AI Factory validated design, helping organisations worldwide ...
Elastic Brings Hybrid Retrieval to Microsoft Semantic Kernel

Elastic Brings Hybrid Retrieval to Microsoft Semantic Kernel

Elastic is the first vector database to support blended text and semantic retrieval techniques for .NET developers for more relevant, accurate results for search queries
ESET Research APT Report: Russian cyberattacks in Ukraine intensify; Sandworm unleashes new destructive wiper

ESET Research APT Report: Russian cyberattacks in Ukraine intensify; Sandworm unleashes new destructive wiper

ESET Research has released its latest APT Activity Report, which highlights activities of select APT groups that were documented by ESET researchers from October 2024 through March 2025.
Tenable Comment on ACSC’s joint advisory: Russian GRU targeting Western logistics entities and technology companies

Tenable Comment on ACSC’s joint advisory: Russian GRU targeting Western logistics entities and technology companies

Issued on 22 May 2025, a joint advisory from  ASD’s ACSC, CISA, NSA, FBI and more than a dozen allied agencies warning that Russia’s GRU Unit 26165 (APT28/Fancy Bear) has been spying on Western logistics and technology firms supporting aid to Ukraine since 2022, using password-spray and spear-phishing campaigns plus exploits for Outlook, WinRAR, ...

BeyondTrust Recognised as an Overall Leader in KuppingerCole Leadership Compass for Secrets Management

BeyondTrust’s forward-looking approach to securing human and non-human identities earns high marks from analyst firm Report highlights BeyondTrust’s scalability, native integrations, and developer-friendly approach to secure machine and application secrets
APT28 Escalates Cyber-Espionage Campaign Targeting Ukraine Aid Logistics

APT28 Escalates Cyber-Espionage Campaign Targeting Ukraine Aid Logistics

A Russian military cyber unit, known as APT28 or "Fancy Bear," has intensified its cyber-espionage efforts against organisations supporting Ukraine, according to a joint advisory issued by the UK's National Cyber Security Centre (NCSC) and allied intelligence agencies including the US and Australia. Operating under Russia’s military intelligence ...
Gigamon 2025 Survey: 91 Percent Of Security Leaders Are Recalibrating Hybrid Cloud Risk In The AI Era

Gigamon 2025 Survey: 91 Percent Of Security Leaders Are Recalibrating Hybrid Cloud Risk In The AI Era

New research shows AI is driving cybersecurity compromises amid rising data volumes, LLM threats, and growing public cloud concerns
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This