The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

The Next Scammer’s Paradise

The Next Scammer’s Paradise

The email looks real. It sounds like your boss. Thinking it might be urgent, you click the link included therein. And just like that, it’s over. This is the new face of cybercrime. Powered by AI, cybercrime no longer requires technical prowess nor heavy coding. All you need is the right tool and the appropriate prompt; something that can scrape ...
The PIN That Wasn’t Yours

The PIN That Wasn’t Yours

Fintech gift card system flaw may have allowed quiet cashouts. Signs point to possible exploitation months before it was discovered.
It’s Time to Hack the Hackers

It’s Time to Hack the Hackers

Introduction Cybercrime in Australia is rising rapidly. From the major breachers that held headlines hostage for months, to government agencies and critical infrastructure being targeted, cyberattacks continue to hit hard and fast. In the last few months alone, a major Australian university appears to have fallen victim to a ransomware attack, a ...
Resilience Comes from Knowing What to Prioritise

Resilience Comes from Knowing What to Prioritise

As cyber threats and disruptions grow, organisations must make data resilience a core component of their IT strategy to ensure business continuity and safeguard critical data.
Shadow AI Is The Blind Spot No Australian Board Can Ignore

Shadow AI Is The Blind Spot No Australian Board Can Ignore

Australia’s corporate leaders are sleepwalking into a technology blind spot that will cost them dearly. Shadow AI is already entrenched in workplaces, and boards that treat it as a side issue are making the same mistake they made a decade ago with shadow IT and cloud adoption. Back then, companies allowed employees to use unapproved cloud apps because ...
Scam Awareness Week Shines a Light On the Collective Effort Needed to Fight Scams

Scam Awareness Week Shines a Light On the Collective Effort Needed to Fight Scams

Collaborative action from individuals, businesses and the government is more important than ever, as scams become more sophisticated.
AI in Defence – A Partner, Not a Quick Fix

AI in Defence – A Partner, Not a Quick Fix

​AI has been making waves for years now. It has moved from the pages of science fiction into the control rooms of our defence and security agencies and critical infrastructures, watching over networks and inspecting traffic. Why wouldn’t it be when it promises to work faster than humans and spot the tiniest anomaly possible? For defence and ...
Why You Need Speed and Trust for Modern Software Delivery

Why You Need Speed and Trust for Modern Software Delivery

Introduction Businesses are creating and launching software faster than ever to keep pace with competitors and drive innovation. The focus on increased speed has created a few trends: Developer productivity is no longer only measured by speed, but quality and security as well Many development teams rely on platform engineering to build tools ...
No results found.

In The News

CrowdStrike Research: Security Flaws in DeepSeek-Generated Code Linked to Political Triggers

CrowdStrike Research: Security Flaws in DeepSeek-Generated Code Linked to Political Triggers

CrowdStrike Counter Adversary Operations identifies innocuous trigger words that lead DeepSeek to produce more vulnerable code.
BeyondTrust and Ping Identity Partner to Deliver Unified Identity Security Fabric

BeyondTrust and Ping Identity Partner to Deliver Unified Identity Security Fabric

Combined solution automates identity decisions across human and non-human identities, strengthening Zero Trust security | Joint offering eliminates identity silos by integrating PAM, IAM, and IGA into a cohesive, AI-driven framework for enhanced visibility, control and governance
Honeywell Selected by Fitzroy River Water to Advance Digital Transformation and Automation of Rockhampton’s Water Infrastructure

Honeywell Selected by Fitzroy River Water to Advance Digital Transformation and Automation of Rockhampton’s Water Infrastructure

Honeywell (NASDAQ: HON) has been selected by Fitzroy River Water, part of Rockhampton Regional Council, to modernise and automate key water treatment facilities, as part of the Council’s long-term infrastructure improvement program. Rockhampton, located in Central Queensland, relies on Fitzroy River Water to deliver essential water and sewerage ...
Genetec Releases 2026 Global State of Physical Security Report

Genetec Releases 2026 Global State of Physical Security Report

Survey of more than 7,300 professionals reveals: Physical security has evolved into a strategic business function, strengthening IT collaboration and decision-making | Interest in adopting AI more than doubled among end users since last year | Organisations want flexibility to deploy workloads on premises, in the cloud, or in a hybrid model
NinjaOne Expands Automated Endpoint Management Platform with Native Remote Access

NinjaOne Expands Automated Endpoint Management Platform with Native Remote Access

NinjaOne recently announced NinjaOne Remote®, a remote access solution natively integrated into the NinjaOne Platform. NinjaOne Remote was built from the ground up for businesses, not consumers, with security in mind, and gives IT teams and MSPs fast, reliable, and secure control over endpoints, wherever they are. The solution is built on a ...
Australia Leads the World in Organisational Concern over Identity Driven Attacks

Australia Leads the World in Organisational Concern over Identity Driven Attacks

Rubrik Zero Labs Issues Latest Study “Identity Crisis: Understanding & Building Resilience Against Identity-Driven Threats”
Barracuda Research Introduces GhostFrame – A Super Stealthy New Phishing Kit Behind a Million Attacks

Barracuda Research Introduces GhostFrame – A Super Stealthy New Phishing Kit Behind a Million Attacks

Barracuda has published details of a new, evasive and stealthy phishing-as-a-service (PhaaS) kit that hides its malicious content in web page iframes to bypass detection and maximise flexibility. This is the first time Barracuda has seen an entire phishing framework built around the iframe technique. Threat analysts have been tracking the new PhaaS ...
Manufacturing Industry Blocks More Ransomware Attempts, While Adversaries Shift to Data Theft

Manufacturing Industry Blocks More Ransomware Attempts, While Adversaries Shift to Data Theft

Sophos has announced new findings from the Sophos State of Ransomware in Manufacturing and Production 2025 report. The study reveals that manufacturers are stopping more ransomware attacks before data can be encrypted; however, adversaries are increasingly stealing data and using extortion-only tactics to maintain pressure. As a result, more than half ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This