The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Let’s Stop Playing the Blame Game and Start Taking More Responsibility for Cybersecurity
You will know the drill if you work in cybersecurity: something goes wrong, and immediately the recriminations begin. Vendors, customers, consultants and service providers form an orderly circle, face off, and begin blaming and shaming.
We all know deep down that this circular firing squad routine is toxic and counterproductive, but it is an ...
Tenable Research Finds 72% of Organisations Remain Vulnerable to “Nightmare” Log4j Vulnerability
Tenable®, the Exposure Management company, today announced the results of a telemetry study examining the scope and impact of the critical Log4j vulnerability, known as Log4Shell, in the months following its initial disclosure. According to the data collected from over 500 million tests, 72% of organisations remain vulnerable to the Log4Shell ...

Lookout Threat Lab Discovers Predatory Loan Apps on Google Play and Apple App Store
Data exfiltration from devices used to pressure for repayment by harassing the customer or their contacts

9 out of 10 Organisations in Asia-Pacific Report Digital Trust as ‘Extremely Important’: DigiCert Survey
In APAC, organisations report digital trust as important due to the expanding threat landscape within the region. Also, 91% of consumers are concerned about cyber threats, more than the rest of the world.

Bitdefender Threat Debrief – November 2022
Bitdefender has released its November Threat Debrief, a monthly series analysing threat news, trends, and research from the previous month. It includes a Ransomware Report highlighting the top ransomware families detected, as well as the top countries affected including Australia, and the top trojans targeting Android during October.

Genetec Releases 2022 State of Physical Security Report
Cybersecurity concerns are on the rise; Data from physical security technology seen as ‘mission-critical’ tool for business operations; Industry embraces hybrid cloud infrastructure and unified solutions.

Why an Effective Security Strategy Requires Three Pillars
The cybersecurity strategies followed by many organisations tend to be rather piecemeal affairs. Multiple products are deployed to tackle different threats with little thought given to creating a cohesive whole.
Such an approach is concerning for a number of reasons. It makes effective management difficult to achieve because IT teams need to monitor ...

AIIA Urges Government to Reconsider Increases in Data Breach Penalties
AIIA urges Government to reconsider increases in data breach penalties as part of wider Privacy Act review: penalties regime needs to not discourage good behaviour.
Australia's peak body for innovation technology, the Australian Information Industry Association (AIIA), is calling on the Albanese Government to take a positive, collaborative approach ...
No results found.
In the News
Kyndryl Unveils Agentic AI Framework That Dynamically Evolves to Drive Enhanced Business Performance
Kyndryl taps into its decades of infrastructure-level expertise to deploy an enterprise-grade Framework with intelligent AI agents that learn, adapt and evolve to turn insights into action The Kyndryl Agentic AI Framework self-organises, scales, and securely executes tasks across diverse IT estates and complex workflows to increase efficiency and ...
KnowBe4 Research Reveals That Fake Internal Emails Dominate Phishing Simulation Clicks
KnowBe4’s Q2 2025 Phishing Simulation Roundup report underscores employees’ continued vulnerability to malicious emails that appear familiar, whether from HR, IT, or major brands.
Semperis Research Uncovers Critical Flaw in Windows Server 2025 Exposing Managed Service Accounts
Semperis Researcher Adi Malyanker develops a new tool dubbed GoldenDMSA that incorporates the attack’s logic, enabling efficient study and simulation of this novel technique.
Tenable Research Uncovers Remote Code Execution Vulnerability in Oracle Code Editor and Its Integrated Services
Tenable, the exposure management company, has identified a Remote Code Execution (RCE) vulnerability in Oracle Cloud Infrastructure (OCI) Code Editor, a service designed for developers working within Oracle’s Cloud Shell ecosystem. This vulnerability could have allowed attackers to run malicious code on a server without needing direct access.
The ...
77% of Australian Organisations Rely on MSPs to Manage the Security Challenges of Growth
New Research Shows Australian Companies Struggle with IT Complexity, Spiraling Tool Sprawl and Evolving Strategies
Check Point Launches Quantum Spark 2500 Series to Deliver Enterprise-Grade Security and Future-Ready Connectivity for Small and Medium Businesses
New lineup introduces Wi-Fi 7, 5G, AI-powered threat prevention, and streamlined management, that helps small and medium businesses stay secure, connected, and resilient
CyberArk Announces Availability of Tools to Secure AI Agents in the New AWS Marketplace AI Agents and Tools Category
Advanced capabilities help implement identity-first security for agentic AI at scale
DataDog and AWS Enhance Region’s Infrastructure for A/NZ Compliance and Security
Local data storage capacity allows Datadog’s customers and partners to meet data residency and security requirements across A/NZ
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
- 340
- 341
- 342
- 343
- 344
- 345
- 346
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
