The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

How Adopting Maturity Models Can Improve Enterprise IT Security
Having developers well trained in security techniques is vital for the production of resilient code. Taking time to achieve this now can avoid significant disruption and losses in the future.

Why Web Application Firewalls are a Critical Shield for Fintech Security
The implementation of AI-driven, cloud-native WAF solutions offers financial institutions a robust defence mechanism against cyber threats.

The Real Corporate Penetration Testing Process: How Companies Get Hacked Before The Hackers Do! 🚀
Hey guys, I’m sn0x — a cybersecurity researcher, bug hunter, and security enthusiast. I hold multiple certifications, including CNSP, EWPTXv2, CEH v11–12, GRC, RHCSA, and Cisco Cyber Threat Management. I’ve been ranked #1 in India and #2 globally on TryHackMe, secured #134 on Hack The Box in 2021, and even won HTB Battlegrounds twice.
But hey, this ...

What in the DeepSeek?
DeepSeek, the tool designed to exploit vulnerabilities in AI systems, raises significant concerns amongst the security industry, particularly OpenAI. The DeepSeek competitor discussed the potential for DeepSeek to undermine the security of AI applications, which could have far-reaching consequences for technology as we know it.
Satnam Narang, Senior ...

AI First, Human Second: The New Cybersecurity Command Structure
"Man is the measure of all things." ― Protagora - pre-Socratic Greek philosopher
It’s an ancient idea, yet it feels more relevant than ever as machines start making decisions that were once left to human minds. In today’s high-stakes cybersecurity landscape, artificial intelligence is no longer a future wager; it’s a frontline asset. AI systems detect ...

Data Management – It’s A High-stakes Game
This article explores the security risks associated with poorly managed data, and details how regulations from OAIC and APRA are raising the stakes for both professionals and organisations alike.
Account Takeover Attacks on Social Media: A Rising Threat for Content Creators and Influencers
In 2024 and continuing into 2025, social media platforms were prime targets for cybercriminals, with content creators facing the brunt of the malicious attacks, including a surge in account takeovers, malicious live streams, and sophisticated phishing campaigns.
Bitdefender Labs has been at the forefront in analysing these threats, and the numbers ...

The Growing Nexus of Cyber Security and Financial Warfare – An Australian’s Perspective
Opening Remarks
Sadly, it has become an undeniable reality that the traditional boundaries between conventional warfare and economic statecraft are rapidly dissolving. Cyber security and financial warfare have evolved into critical instruments of geopolitical influence and power projection, with significant implications for nations like Australia. The ...
No results found.
In The News
Cloudflare Just Changed How AI Crawlers Scrape the Internet-at-Large; Permission-Based Approach Makes Way for A New Business Model
Empowers leading publishers and AI companies to stop the scraping and use of original content without permission
Sydney, July 2, 2025 – Cloudflare, Inc. (NYSE: NET), the leading connectivity cloud company, today announced it is now the first Internet infrastructure provider to block AI crawlers accessing content without permission or compensation, by ...
Exabeam Nova Delivers the First Cybersecurity Strategy Agent for SOC Leadership
Agentic AI that breaks the cycle of reactive reporting by helping security leaders pinpoint gaps, tune their strategies, and justify investments
LevelBlue to Acquire Trustwave, Becoming Largest Pure-play Managed Security Services Provider
LevelBlue strengthens market-leading managed detection and response services with advanced artificial intelligence (AI) capabilities, while adding prestigious FedRAMP and StateRAMP authorisations
F5 Introduces Post-Quantum Cryptography Solutions To Protect Customers From Emerging Threats
Organisations require proactive PQC readiness strategies to safeguard assets, preserve customer trust, and uphold compliance mandates
SYDNEY, Australia, July 1, 2025 – F5 (NASDAQ: FFIV), the global leader in delivering and securing every app and API, is helping customers prepare for the foundational cybersecurity shift presented by quantum computing. ...
Tenable Finds AI Workloads Driving New Cloud Security Challenges
Cloud AI workloads riskier than traditional with 70% containing critical vulnerabilities compared to 50% in non-AI workloads
Excite Cyber Provides Essential Tips to Medical Specialists to Bolster Their Cybersecurity Defences Following Leaking of Patient Data On the Dark Web
“Hospitals may have stronger defences, but attackers know the weak link often lies in the smaller, less protected third-party medical providers. Medical professionals running small or private clinics should urgently review their cybersecurity protections and enhance them.
Wavelink Enters New Zealand Market With Strategic Local Investment and Leadership Appointment
July 01, 2025 – Wavelink, an Infinigate Group company and leader in technology distribution, services, and business development in Australia and New Zealand (ANZ), has officially launched operations in the New Zealand market. As part of this strategic expansion, the company has appointed Danny Meadows as regional manager, New Zealand. This marks a ...
OVHcloud Partners With Crayon to Deliver Transformative, Cost-effective Technology Solutions Across the World
Sydney – June 30th 2025 – OVHcloud, a global cloud player and the European Cloud leader, today announced a partnership agreement with Crayon, a global leader in innovation and IT services.
The agreement enables organisations to access and build in more than 45 regions* including Australia, on the cost-effective, secure and powerful cloud ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..