The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

‘We Let the Internet Down Today’ says Co-Founder at Cloudflare

‘We Let the Internet Down Today’ says Co-Founder at Cloudflare

​When Cloudflare goes down, the internet feels it. The recent Cloudflare outage wasn’t just ‘a blip’ - it was an unfortunate failure that took some of the world’s most heavily trafficked services offline. Cloudflare confirmed that a configuration update triggered a failure inside its control plane, specifically within systems responsible for managing ...
Like It or Not, PQC Is the Key (For Now)

Like It or Not, PQC Is the Key (For Now)

Every few months, another “quantum-safe” technology is marketed as the real answer, usually with the claim that post-quantum cryptography isn’t enough. PQC is too new, too slow, too fragile, too unproven. One person I spoke to even described adopting PQC as “shuffling the furniture on a sinking ship,” as if the standards effort itself is the ...
The ABCs of GRC

The ABCs of GRC

Introduction In the face of increasing regulatory pressure, rising cyber threats, and growing business complexity, organisations need a structured, scalable approach to managing risk. Governance, Risk, and Compliance (GRC) frameworks have become vital for aligning information security with corporate objectives, ensuring operational resilience, and ...
The Korean Leaks – Analysing the Hybrid Geopolitical Campaign Targeting South Korean Financial Services with Qilin RaaS

The Korean Leaks – Analysing the Hybrid Geopolitical Campaign Targeting South Korean Financial Services with Qilin RaaS

When preparing data for the Bitdefender Threat Debrief | October 2025, Bitdefender noticed a significant departure from established ransomware trends. Typically, the top five most impacted countries are consistently the US, Canada, and major Western European nations. However, for this period, South Korea (KR) suddenly became the second most-targeted ...
Post Qantas Breach What Happens Now

Post Qantas Breach What Happens Now

​Months after a breach hit Qantas Airways, the airline recently confirmed that stolen customer information has now been released publicly by cybercriminals. This is despite the airline’s legal efforts to prevent the stolen data from being accessed, shared, and published. Experts are now helping Qantas to establish what data has been leaked, but early ...
Oracle is All in on AI Everything

Oracle is All in on AI Everything

Oracle is keeping up with the AI moment, like the rest of Silicon Valley. The database company, as we know it, is aware they need to move down the AI path to keep relevant and to keep up with customer demands. Well, truth be told, Oracle is betting big and is going all in on defining AI. Oracle’s big bet on ‘AI Native Data’ is their newest release, as ...
How the Financial Sector Is Battling New Cyber Threats

How the Financial Sector Is Battling New Cyber Threats

Graph databases are already proving their worth across fraud detection, compliance, and AI enablement. Their promise, however, extends further to a future where financial institutions can act not just faster, but smarter.
Turning Hesitation into Action

Turning Hesitation into Action

Unpacking Cisco and Governance Institute’s AI Risk Report at Cisco Live! 2025
No results found.

In The News

CIOs Accelerate AI-Driven Transformation Amid Rising Threat Complexity

CIOs Accelerate AI-Driven Transformation Amid Rising Threat Complexity

New report finds just 20 per cent of CIOs feel highly effective at defending against AI-enabled adversaries  February 26, 2026 – LevelBlue, the world’s largest pure-play provider of managed security services, has released Persona Spotlight: CIO (Chief Information Officer), the latest report in its ongoing research examining how technology leaders ...
New Malicious npm Package Highlights the Speed at Which Supply Chain Risks Propagate

New Malicious npm Package Highlights the Speed at Which Supply Chain Risks Propagate

Tenable Research investigated a malicious package in the npm public registry named “amber-src” that underscores the rapid nature of modern supply chain attacks. The package, which was downloaded approximately 50,000 times before its removal, was designed to mimic a popular package “ember-source”, to infect developers’ systems across Windows, macOS, and ...
WatchGuard Marks 30 Years of Setting the MSP Security Standard

WatchGuard Marks 30 Years of Setting the MSP Security Standard

Cybersecurity leader has helped MSPs reduce complexity, scale protection, and profitably grow through every market shift  SYDNEY – February 25, 2026 — WatchGuard® Technologies, a global leader in unified cybersecurity for managed service providers (MSPs), celebrates 30 years this month of helping MSPs protect businesses through every era of threat ...
Firmus Technologies Group Selects VAST AI Operating System to Power Sovereign, Energy-Efficient AI Factories in Asia Pacific

Firmus Technologies Group Selects VAST AI Operating System to Power Sovereign, Energy-Efficient AI Factories in Asia Pacific

VAST Data today announced that Firmus Technologies Group, an AI infrastructure specialist founded in Australia with operations across Asia Pacific, has selected the VAST AI Operating System as a foundational data layer for its next generation of sovereign, energy-efficient AI factories.   Firmus, a NVIDIA Cloud Partner (NCP), is building ...
2026 CrowdStrike Global Threat Report: AI Accelerates Adversaries and Reshapes the Attack Surface

2026 CrowdStrike Global Threat Report: AI Accelerates Adversaries and Reshapes the Attack Surface

AI-enabled attacks surge 89% as breakout time falls to 29 minutes; AI tools and development platforms are actively exploited
Exabeam Research: AI Accountability Becomes the New Mandate as Cybersecurity Economics Shift

Exabeam Research: AI Accountability Becomes the New Mandate as Cybersecurity Economics Shift

95% of organisations are increasing cybersecurity budgets in 2026 with AI as the top spending driver despite being the hardest investment to justify BROOMFIELD, Colo. – February 24, 2026 – Exabeam, a global leader in intelligence and automation that powers security operations, today announced the findings of its new multinational report, From Adoption ...
Appointment: Zepto Creates New Chief Business Resilience Officer Role to Lead Security and Risk

Appointment: Zepto Creates New Chief Business Resilience Officer Role to Lead Security and Risk

Zepto appoints Mariana Paun as Chief Business Resilience Officer. The newly created role will unify teams to strengthen security, risk and compliance under Paun’s leadership.
Sophos Active Adversary Report Finds Identity Attacks Dominate as Threat Groups Proliferate

Sophos Active Adversary Report Finds Identity Attacks Dominate as Threat Groups Proliferate

Sophos has released the 2026 Sophos Active Adversary Report, which reveals that 67% of all incidents investigated by Sophos Incident Response (IR) and Managed Detection and Response (MDR) teams last year were rooted in identity-related attacks. The findings highlight how attackers continue to exploit compromised credentials, weak or missing multifactor ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This