The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Unmasking the Digital Puppet Masters

Unmasking the Digital Puppet Masters

In a world where the line between truth and deception blurs with every click, the silent warriors of the digital realm rise to combat an unseen enemy. Malcolm Purcell, Vice President of APAC at Fivecast, unravels the tangled web of open-source intelligence (OSINT) and its pivotal role in upholding national security.The Digital Haystack: Easier Said ...
Why Our Cybersecurity Defences Are Crumbling

Why Our Cybersecurity Defences Are Crumbling

According to Michael Loewy, Co-Founder of Tide and a veteran in the field of cybersecurity, the reality is that our cybersecurity defences are crumbling."The industry is broken," he declares.What's broken about it?"Just open the news," he urges, pointing to the incessant barrage of headlines detailing mass data breaches and ...
From Reactive To Proactive Defence In Critical Infrastructure: How AI-Powered Threat Intelligence Uncovers The Unknown

From Reactive To Proactive Defence In Critical Infrastructure: How AI-Powered Threat Intelligence Uncovers The Unknown

Nadir Izrael, Co-Founder & CTO, Armis explains how AI-powered threat intelligence can better protect critical infrastructure and national security, as Australian organisations face enhanced cyber security obligations.
Data Privacy Day – Qualys Shares Insights For Effective Data Security

Data Privacy Day – Qualys Shares Insights For Effective Data Security

Sam Salehi, Managing Director ANZ at Qualys shares insights for effective data security.
Phishing-as-a-Service (PhaaS) Kits Growing In Sophistication to Evade Detection

Phishing-as-a-Service (PhaaS) Kits Growing In Sophistication to Evade Detection

Phishing-as-a-Service (PhaaS) provides attackers with advanced toolsets and templates that enable them to quickly deploy phishing campaigns. The rapid rise and evolution of PhaaS is driving a fundamental change in the phishing ecosystem, making the threat increasingly complex and sophisticated. The developers behind these phishing kits invest ...
Data Privacy Day – CyberArk’s Insights For Organisations To Protect Privacy

Data Privacy Day – CyberArk’s Insights For Organisations To Protect Privacy

Olly Stimpson, Senior Security Strategy Adviser ANZ at CyberArk provides his recommendations for organisations to protect privacy in the lead up to Data Privacy Day.
Cybersecurity In 2025: What Will And Needs To Transpire

Cybersecurity In 2025: What Will And Needs To Transpire

In 2025, there will be a shift in cybersecurity focus as companies examine how they address the operational demands involving the ever-present threats from bad actors. Many companies will renew their emphasis on organizational resilience and prioritize it over third-party software. They will strengthen their in-house security frameworks to withstand ...
Data Transfer Secrets Revealed

Data Transfer Secrets Revealed

From the battlefields of war to the boardrooms of civilian enterprises, Antony Reynolds, Vice President of Federal and National Security at Bridgeworks, or "Tony" as I’ve come to know him, delivers revelations on the technology transforming data transfer from a sluggish chore to a lightning-fast marvel. Reynolds’ belief and metaphor he goes by is: ...
No results found.

In The News

Motorola Solutions Offers Assist Chat to all U.S. Public Safety Agencies Cost-Free and Expands AI Across Portfolio to Deliver Priority Intelligence to More Roles

Motorola Solutions Offers Assist Chat to all U.S. Public Safety Agencies Cost-Free and Expands AI Across Portfolio to Deliver Priority Intelligence to More Roles

Motorola Solutions today kicked off Summit 2025, its premier technology users conference, by announcing it is extending the capabilities of Assist, its public safety AI, to more people in more roles – from dispatch to investigations – to help prioritise what’s most important. The company will enable all public safety agencies with a complimentary ...
May Patch Tuesday Commentary from Tenable

May Patch Tuesday Commentary from Tenable

Microsoft patched 71 CVEs in its May 2025 Patch Tuesday release, with five rated critical and 66 rated as important. Remote code execution (RCE) vulnerabilities accounted for 39.4% of the vulnerabilities patched this month, followed by elevation of privilege (EoP) vulnerabilities at 25.4%. “For May 2025, Microsoft patched seven zero-day ...
First-Party Fraud Surpasses Scams to Become the Leading Form of Global Attacks

First-Party Fraud Surpasses Scams to Become the Leading Form of Global Attacks

Periods of inflation and rising living costs likely contribute to an increase in opportunistic fraud against financial services, ecommerce and other sectors AI-powered fraud expected to increase in 2025
JFrog Redefines Universal Artifact Management with Industry’s Widest Native Support for Software Packages, ML Models and AI Artifacts 

JFrog Redefines Universal Artifact Management with Industry’s Widest Native Support for Software Packages, ML Models and AI Artifacts 

Report Shows JFrog SaaS Customers Added 7M+ New Software Packages to their Enterprise Environments 
Fortinet Expands Hybrid Mesh Firewall Portfolio With FortiGate 700G

Fortinet Expands Hybrid Mesh Firewall Portfolio With FortiGate 700G

New FortiGate series delivers scalable, high-performance security for the modern campus, now enhanced with FortiOS post-quantum capabilities and FortiAI-Protect for advanced threat detection and generative artificial intelligence risk mitigation 
ColorTokens and Nozomi Networks Join Forces to Deliver Unmatched OT and IoT Security Through Zero Trust Microsegmentation

ColorTokens and Nozomi Networks Join Forces to Deliver Unmatched OT and IoT Security Through Zero Trust Microsegmentation

SAN JOSE, Calif., May 8, 2025 – ColorTokens Inc., a leader in zero trust microsegmentation, today announced a powerful new integration with Nozomi Networks, the leader in OT and IoT cybersecurity. This collaboration delivers unparalleled visibility and protection across operational environments - seamlessly uniting Nozomi Networks’ AI-powered threat ...
Weaponizing Facebook Ads: Inside The Multi-Stage Malware Campaign Exploiting Cryptocurrency Brands.

Weaponizing Facebook Ads: Inside The Multi-Stage Malware Campaign Exploiting Cryptocurrency Brands.

A persistent malvertising campaign is plaguing Facebook, leveraging the reputations of well-known cryptocurrency exchanges to lure victims into a maze of malware. Since Bitdefender Labs started investigating, this evolving threat has posed a serious risk by deploying cleverly disguised front-end scripts and custom payloads on users’ devices, all under ...
F5 2025 State of Application Strategy Report Reveals Talk Becomes Action as AI Gets to Work

F5 2025 State of Application Strategy Report Reveals Talk Becomes Action as AI Gets to Work

F5 Report Highlights AI-Driven Transformation Amid Operational Complexity 96 per cent of surveyed IT decision-makers have deployed AI models, up from a quarter in 2023
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This