The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

The ABCs of GRC

The ABCs of GRC

Introduction In the face of increasing regulatory pressure, rising cyber threats, and growing business complexity, organisations need a structured, scalable approach to managing risk. Governance, Risk, and Compliance (GRC) frameworks have become vital for aligning information security with corporate objectives, ensuring operational resilience, and ...
The Korean Leaks – Analysing the Hybrid Geopolitical Campaign Targeting South Korean Financial Services with Qilin RaaS

The Korean Leaks – Analysing the Hybrid Geopolitical Campaign Targeting South Korean Financial Services with Qilin RaaS

When preparing data for the Bitdefender Threat Debrief | October 2025, Bitdefender noticed a significant departure from established ransomware trends. Typically, the top five most impacted countries are consistently the US, Canada, and major Western European nations. However, for this period, South Korea (KR) suddenly became the second most-targeted ...
Post Qantas Breach What Happens Now

Post Qantas Breach What Happens Now

​Months after a breach hit Qantas Airways, the airline recently confirmed that stolen customer information has now been released publicly by cybercriminals. This is despite the airline’s legal efforts to prevent the stolen data from being accessed, shared, and published. Experts are now helping Qantas to establish what data has been leaked, but early ...
Oracle is All in on AI Everything

Oracle is All in on AI Everything

Oracle is keeping up with the AI moment, like the rest of Silicon Valley. The database company, as we know it, is aware they need to move down the AI path to keep relevant and to keep up with customer demands. Well, truth be told, Oracle is betting big and is going all in on defining AI. Oracle’s big bet on ‘AI Native Data’ is their newest release, as ...
How the Financial Sector Is Battling New Cyber Threats

How the Financial Sector Is Battling New Cyber Threats

Graph databases are already proving their worth across fraud detection, compliance, and AI enablement. Their promise, however, extends further to a future where financial institutions can act not just faster, but smarter.
Turning Hesitation into Action

Turning Hesitation into Action

Unpacking Cisco and Governance Institute’s AI Risk Report at Cisco Live! 2025
A Polycrisis of AI Cyberattacks is Approaching. Are You Breach Ready Yet?

A Polycrisis of AI Cyberattacks is Approaching. Are You Breach Ready Yet?

Unless you have been living under a rock in the past few days, you would have seen that cybersecurity headlines have been overshadowed by reports that hackers fooled artificial intelligence agents into automating break-ins into major corporations. Anthropic, the makers of the artificial intelligence (AI) chatbot Claude, claim to run an investigation ...
The Hidden Cost of Cybersecurity Inefficiency

The Hidden Cost of Cybersecurity Inefficiency

Leaders must rethink how their teams manage data, automate response and validate defences. Consolidating platforms, investing in real-time analytics, and embedding AI into workflows can deliver both faster protection and meaningful cost reduction.
No results found.

In The News

Quorum Cyber’s 2026 Global Cyber Risk Outlook Reveals Cyber Crime Enters an Industrial Phase

Quorum Cyber’s 2026 Global Cyber Risk Outlook Reveals Cyber Crime Enters an Industrial Phase

The number of newly formed ransomware groups increased by 30% in the year to October 2025 Global vulnerability disclosures rose 21%, surpassing 35,000 Early evidence of a nation-state group using AI agents to automate up to 90% of an intrusion Cybercriminals are increasingly shifting away from encryption toward faster, lower-cost data exfiltration ...
One-click cyber flaw found in CCTV software protecting Australia’s critical infrastructure

One-click cyber flaw found in CCTV software protecting Australia’s critical infrastructure

SUMMARY - New Architecture, New Risks: One-Click to Pwn IDIS IP Cameras As part of our ongoing research into modern cloud-enabled surveillance ecosystems, we turned our attention to a major vendor in the surveillance domain, IDIS. IDIS is a global video surveillance manufacturer headquartered in South Korea. IDIS manufactures an end-to-end solution of ...
Netpoleon and Hack The Box Partner to Strengthen Cybersecurity Skills Across Australia and New Zealand

Netpoleon and Hack The Box Partner to Strengthen Cybersecurity Skills Across Australia and New Zealand

Sydney, Australia – February 3rd – Netpoleon, a leading value-added distributor of cybersecurity and networking solutions across Asia Pacific, has announced a strategic partnership with Hack The Box (HTB) to deliver advanced cybersecurity education and workforce development solutions to organisations across Australia and New Zealand. The partnership ...
Dynatrace Expands Cloud Operations Capabilities with New Integrations Across AWS, Azure, and Google Cloud

Dynatrace Expands Cloud Operations Capabilities with New Integrations Across AWS, Azure, and Google Cloud

New cloud-native integrations give enterprises a clearer, unified view across multi-cloud environments
Nozomi Networks Enters Next Phase of Growth as Mitsubishi Electric Completes Acquisition

Nozomi Networks Enters Next Phase of Growth as Mitsubishi Electric Completes Acquisition

Operating independently as a wholly owned subsidiary, Nozomi Networks - which recently surpassed $100M in revenue - will continue delivering vendor agnostic OT/IoT cybersecurity solutions to its global customer and partner community.
LABYRINTH CHOLLIMA Evolves into Three Adversaries

LABYRINTH CHOLLIMA Evolves into Three Adversaries

LABYRINTH CHOLLIMA has evolved into three distinct adversaries with specialized malware, objectives, and tradecraft: GOLDEN CHOLLIMA and PRESSURE CHOLLIMA now likely operate separately from the core LABYRINTH CHOLLIMA group. GOLDEN CHOLLIMA and PRESSURE CHOLLIMA target cryptocurrency entities and are distinguished by the scale and scope of their ...
New ISACA Study: Privacy Teams Are Shrinking, Increasingly Stressed

New ISACA Study: Privacy Teams Are Shrinking, Increasingly Stressed

ISACA’s 2026 State of Privacy survey report warns privacy risk is becoming a broader business issue as privacy resources tighten across the region.
DigiCert Releases Q4 2025 RADAR Brief

DigiCert Releases Q4 2025 RADAR Brief

Heavy demand for online content and growing cyber threats defined the end of 2025 
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This