The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Why Australia’s AI Ambitions Depend on Smarter Networks

Why Australia’s AI Ambitions Depend on Smarter Networks

Australia’s ambition to be a global leader in artificial intelligence (AI) is clear—from sovereign AI strategies to booming enterprise deployment. But underneath the promise lies a pressing energy challenge. Data centres already account for approximately 5% of Australia’s electricity supply today, and according to reports could consume as much as 8% by ...
Decrypting the Future: Why Post-Quantum Security Must Start Today

Decrypting the Future: Why Post-Quantum Security Must Start Today

Introduction Australia is standing at the edge of a technological shift that could redefine cyber resilience. With quantum computing on the horizon, the very foundations of data security are under threat. While this technology promises enormous advances in areas like medical research, logistics and AI, it also has the potential to break the ...
Ransomware Protection Advisory: From Cisco Flaws to SonicWall Breaches

Ransomware Protection Advisory: From Cisco Flaws to SonicWall Breaches

“Please wait, your document is loading.” That’s the message victims saw right before their systems got hijacked. Behind that digital curtain, crypto miners and information stealers worked stealthily to infiltrate networks, exfiltrate sensitive data, and plant persistent malware. In the latest ColorTokens Threat Advisory, we tracked how threat ...
Caught in the Middle – How Diverse Cyber Laws Affect Global Organisations

Caught in the Middle – How Diverse Cyber Laws Affect Global Organisations

Regulatory fragmentation has become one of the most pressing yet overlooked concerns for global organisations, particularly as governments introduce differing cybersecurity laws. The issue lies not in the creation per se, but in the fact that these rules and regulations are developed in silos. Every country has its own perspective, shaped by the ...
Overcoming the Security Risks of Using AI In Software Development

Overcoming the Security Risks of Using AI In Software Development

Development teams face relentless pressure to deliver, yet they must continue to prioritise building secure, high-quality software. Leaders play a crucial role in reinforcing how a Secure by Design approach, supported by observability, benchmarking, and ongoing education, directly enhances code quality. By embedding these practices, organisations can ...
Speed, Identity, and AI: Redefining Cybersecurity for Australian Organisations

Speed, Identity, and AI: Redefining Cybersecurity for Australian Organisations

Speed, Identity, and AI: Redefining Cybersecurity for Australian Organisations Cybersecurity teams have always grappled with emerging technologies, increasingly sophisticated attacks and new regulations. However, as organisations accelerate AI and cloud adoption, digitise services, and adapt to evolving compliance regulations, security challenges ...
How to Invest in AI to Overcome the Challenges of Identity-based Security

How to Invest in AI to Overcome the Challenges of Identity-based Security

AI is reshaping what’s possible when it comes to protecting organisations against identity-based attacks. By offering prescriptive recommendations on how to harden identity security, together with advanced detection of evolving threats, organisations can improve their ability to operate now and into the future.
How One Vendor Breach Becomes a Global Risk

How One Vendor Breach Becomes a Global Risk

Today, businesses run on an invisible thread: supply chain. It links industries and consumers through numerous pathways, whether physical or digital. From ports to airlines to healthcare and finances, organisations rely on these networks to operate efficiently and at scale. But here’s the catch, recent events revealed that the same interdependence and ...
No results found.

In The News

Nozomi Networks Enters Next Phase of Growth as Mitsubishi Electric Completes Acquisition

Nozomi Networks Enters Next Phase of Growth as Mitsubishi Electric Completes Acquisition

Operating independently as a wholly owned subsidiary, Nozomi Networks - which recently surpassed $100M in revenue - will continue delivering vendor agnostic OT/IoT cybersecurity solutions to its global customer and partner community.
LABYRINTH CHOLLIMA Evolves into Three Adversaries

LABYRINTH CHOLLIMA Evolves into Three Adversaries

LABYRINTH CHOLLIMA has evolved into three distinct adversaries with specialized malware, objectives, and tradecraft: GOLDEN CHOLLIMA and PRESSURE CHOLLIMA now likely operate separately from the core LABYRINTH CHOLLIMA group. GOLDEN CHOLLIMA and PRESSURE CHOLLIMA target cryptocurrency entities and are distinguished by the scale and scope of their ...
New ISACA Study: Privacy Teams Are Shrinking, Increasingly Stressed

New ISACA Study: Privacy Teams Are Shrinking, Increasingly Stressed

ISACA’s 2026 State of Privacy survey report warns privacy risk is becoming a broader business issue as privacy resources tighten across the region.
DigiCert Releases Q4 2025 RADAR Brief

DigiCert Releases Q4 2025 RADAR Brief

Heavy demand for online content and growing cyber threats defined the end of 2025 
New Motorola Solutions AI Offerings Help Public Safety Agencies Reclaim Hours Every Day

New Motorola Solutions AI Offerings Help Public Safety Agencies Reclaim Hours Every Day

Motorola Solutions has announced the launch of Assist Suites, a portfolio of role-based AI for public safety solutions designed to deliver the right intelligence to the right person at the right time. Assist Suites synthesise multiple sources of data from across an agency – 911 audio, body and in-car camera footage, radio transcripts and more – into a ...
xReality Group (ASX:XRG) Quarterly Activities Report

xReality Group (ASX:XRG) Quarterly Activities Report

xReality Group (ASX:XRG) has announced its Quarterly Activities Report and Appendix 4C for the quarter ending 31st December 2025, together with an Operational Update. Key Highlights: Highest Cash Receipts to date $7.4m in Q2 (up 85% QoQ) $11.4m YTD (up 20% PcP) Net Cash from Operations $3.1m Global Individual Agencies ...
Mandiant Warns of Active ShinyHunters Vishing Campaign Targeting Enterprise Identity Systems

Mandiant Warns of Active ShinyHunters Vishing Campaign Targeting Enterprise Identity Systems

Mandiant, part of Google, is warning organisations of an active and ongoing cybercrime campaign attributed to actors operating under the ShinyHunters name, leveraging advanced voice phishing (vishing) techniques to compromise enterprise identity environments. Mandiant has observed attackers using evolved social engineering methods to successfully ...
LevelBlue and Fortra Launch Strategic Managed Services Partnership to Accelerate Cybersecurity Innovation

LevelBlue and Fortra Launch Strategic Managed Services Partnership to Accelerate Cybersecurity Innovation

Strategic partnership includes LevelBlue's acquisition of Fortra's Alert Logic Managed Detection and Response business, strengthening LevelBlue's position as a global MDR leader
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This