The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Tenable Research Finds 72% of Organisations Remain Vulnerable to “Nightmare” Log4j Vulnerability

Tenable®, the Exposure Management company, today announced the results of a telemetry study examining the scope and impact of the critical Log4j vulnerability, known as Log4Shell, in the months following its initial disclosure. According to the data collected from over 500 million tests, 72% of organisations remain vulnerable to the Log4Shell ...
Lookout Threat Lab Discovers Predatory Loan Apps on Google Play and Apple App Store

Lookout Threat Lab Discovers Predatory Loan Apps on Google Play and Apple App Store

Data exfiltration from devices used to pressure for repayment by harassing the customer or their contacts
9 out of 10 Organisations in Asia-Pacific Report Digital Trust as ‘Extremely Important’: DigiCert Survey

9 out of 10 Organisations in Asia-Pacific Report Digital Trust as ‘Extremely Important’: DigiCert Survey

In APAC, organisations report digital trust as important due to the expanding threat landscape within the region. Also, 91% of consumers are concerned about cyber threats, more than the rest of the world.
Bitdefender Threat Debrief – November 2022

Bitdefender Threat Debrief – November 2022

Bitdefender has released its November Threat Debrief, a monthly series analysing threat news, trends, and research from the previous month. It includes a Ransomware Report highlighting the top ransomware families detected, as well as the top countries affected including Australia, and the top trojans targeting Android during October.
Genetec Releases 2022 State of Physical Security Report

Genetec Releases 2022 State of Physical Security Report

Cybersecurity concerns are on the rise; Data from physical security technology seen as ‘mission-critical’ tool for business operations; Industry embraces hybrid cloud infrastructure and unified solutions.
Why an Effective Security Strategy Requires Three Pillars

Why an Effective Security Strategy Requires Three Pillars

The cybersecurity strategies followed by many organisations tend to be rather piecemeal affairs. Multiple products are deployed to tackle different threats with little thought given to creating a cohesive whole. Such an approach is concerning for a number of reasons. It makes effective management difficult to achieve because IT teams need to monitor ...
AIIA Urges Government to Reconsider Increases in Data Breach Penalties

AIIA Urges Government to Reconsider Increases in Data Breach Penalties

AIIA urges Government to reconsider increases in data breach penalties as part of wider Privacy Act review: penalties regime needs to not discourage good behaviour. Australia's peak body for innovation technology, the Australian Information Industry Association (AIIA), is calling on the Albanese Government to take a positive, collaborative approach ...
As Virtual AGM Attendance Soars, How Does Technology Safeguard Against Cyber Threats?

As Virtual AGM Attendance Soars, How Does Technology Safeguard Against Cyber Threats?

Virtual attendance at Annual General Meetings (AGM) has soared in recent years, providing unheralded levels of engagement, access and accountability. Traditionally, AGMs have been essentially a closed club, limited to only those with the time to visit in person. Today, though, through technology and amendments to the Corporations Act, shareholders and ...
No results found.

In the News

Qualys Unveils Industry’s First Agentic AI-Powered Risk Operations Centre Delivering Autonomous Risk Management

Qualys Unveils Industry’s First Agentic AI-Powered Risk Operations Centre Delivering Autonomous Risk Management

New approach introduces a marketplace of Cyber Risk AI Agents that autonomously drive every step of Cyber Risk Operations—dramatically improving risk posture and reducing operational costs
BeyondTrust Research Exposes Hidden Privilege Threats: Secrets Are the New Identity Crisis Awaiting Agent

BeyondTrust Research Exposes Hidden Privilege Threats: Secrets Are the New Identity Crisis Awaiting Agent

New data from Identity Security Risk Assessments reveals critical blind spots in non-human identity posture BeyondTrust’s latest solution brings secrets into full view, just as Agentic AI spins up at scale
2025 CrowdStrike Threat Hunting Report: Adversaries Weaponize and Target AI at Scale

2025 CrowdStrike Threat Hunting Report: Adversaries Weaponize and Target AI at Scale

DPRK-nexus adversaries infiltrate 320+ companies using GenAI accelerated attacks; threat actors exploit AI agents, exposing autonomous systems as the next enterprise attack surface
Ransomware in the Crosshairs: Sophos and Halcyon Announce New Intelligence-Sharing and Mutual Anti-Tamper Protection Initiative

Ransomware in the Crosshairs: Sophos and Halcyon Announce New Intelligence-Sharing and Mutual Anti-Tamper Protection Initiative

Joint Collaboration Enables Real-Time Intelligence Sharing and Mutual Anti-Tamper Protections to Accelerate Ransomware Detection and Response
ASX Listed Excite Cyber Urges Australian Organisations to Adopt ISO 42001 Now to Prepare for Coming AI Regulation

ASX Listed Excite Cyber Urges Australian Organisations to Adopt ISO 42001 Now to Prepare for Coming AI Regulation

ASX listed cybersecurity firm, Excite Cyber is today urging Australian organisations to adopt ISO 42001 to ensure they are prepared for coming AI regulation.  
Barracuda Researchers Reveal New Emerging Email Threats Targeting Organisations Worldwide

Barracuda Researchers Reveal New Emerging Email Threats Targeting Organisations Worldwide

Email Threat Radar – July 2025 - During July, Barracuda threat analysts identified several notable email-based threats targeting organisations around the world. Many of them leveraged popular phishing-as-a-service (PhaaS) kits. The threats include: Tycoon PhaaS impersonating the Autodesk Construction Cloud for a credential phishing attack A ...
Trend Micro Reinvents Proactive Security With Digital Twin Technology

Trend Micro Reinvents Proactive Security With Digital Twin Technology

Innovation at the speed of agentic AI, built on NVIDIA AI, provides a data-driven foundation for supercharged decision-making
Nozomi Networks Names David Hope as Regional Vice President for APJ

Nozomi Networks Names David Hope as Regional Vice President for APJ

Industry veteran to lead APJ as Nozomi Networks expands regional investment to support growing demand in APJ.
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This