The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Curly COMrades: Evasion and Persistence via Hidden Hyper-V Virtual Machines

Curly COMrades: Evasion and Persistence via Hidden Hyper-V Virtual Machines

Bitdefender first documented the Curly COMrades threat actor, operating to support Russian interests in geopolitical hotbeds, in August 2025. Since that initial discovery, subsequent forensics and incident response efforts have revealed critical new tools and techniques. Valuable support was provided by the Georgian CERT, whose collaboration ...
NetApp’s CEO Unveils New Strategy

NetApp’s CEO Unveils New Strategy

​Data is the cornerstone of business transformation, driving intelligence around cybersecurity, as well as informing AI models. George Kurian, CEO of NetApp, recently unveiled at their annual conference, NetApp Insight in Las Vegas, that data is king. “Data is the foundation for transforming a business,” Kurian explained. Having the data and the ...
Cybersecurity Negligence Can’t Be a Cost of Doing Business Anymore

Cybersecurity Negligence Can’t Be a Cost of Doing Business Anymore

For years, organisations viewed cybersecurity failures as costly but absorbable mishaps. That era is over. Relentless, high-impact breaches now demand evolving accountability, impacting not just technology resilience but also governance, trust, and the rule of law.
How to Select the Optimum Physical Security Solution for Your Business

How to Select the Optimum Physical Security Solution for Your Business

Robust physical security is essential for organisations of all stripes and sizes. Conducting a judicious procurement process will ensure the solutions you invest in are robust, fit for purpose and represent value for money.
Public, Profiled, and Unprotected – Event Recap

Public, Profiled, and Unprotected – Event Recap

Introduction When the panel took the stage for “Public, profiled, and unprotected: How OSINT, AI and Geolocation blur the line between privacy and surveillance” at Cyber Con 2025 on the Thursday afternoon, the tone was set for a fascinating, multidisciplinary conversation. The Three Pillars - OSINT, AI, and Legal Privacy The talks core focus was the ...
AI Fear Meets FOMO

AI Fear Meets FOMO

Introduction If you haven’t heard about AI, then you must be living on a different planet. It’s the talk of the town, with individuals using it to help them with everyday tasks, boardrooms discussing how best to implement it in their business, and more. However, behind this growing hype lies hesitation. While AI promises to boost productivity, ...
Oracle Hard Launches Into Its AI Era

Oracle Hard Launches Into Its AI Era

Oracle’s definitely in its AI era. A select group of companies have raced to build humongous models, funnelling fortunes into training complex neural networks. AI is sounding a little more like humans nowadays and less like robots with multimodal models that parallel the human brain, dividing sight, language, and classification across their digital ...
Why “Explain PQC Like I’m 5” Misses the Point

Why “Explain PQC Like I’m 5” Misses the Point

Quantum Computers = Magic, Apparently ​After spending the past couple of years talking with boards, executives, and CISOs, from lunch-and-learns to national security workshops, I’ve learned something interesting about how people approach Post-Quantum Cryptography (PQC). Everyone agrees it’s important. Everyone nods when you say “harvest now, decrypt ...
No results found.

In the News

Telstra Joins Forces With Major Banks to Tackle Money Laundering

Telstra Joins Forces With Major Banks to Tackle Money Laundering

Recent pilot reports potential to bring forward detection of suspected money mule activity by as much as 90 days, as cross-industry collaboration takes on growing threat.
Equinix Unveils the Distributed AI Hub to Simplify and Secure Enterprise AI Infrastructure

Equinix Unveils the Distributed AI Hub to Simplify and Secure Enterprise AI Infrastructure

Equinix has launched the Distributed AI Hub, a unified framework designed to help organisations scale AI efficiently, run workloads closer to data, and overcome the challenges of distributed intelligence.
Motorola Solutions Helps Victorian Search and Rescue Dog Teams Perform Safe and Successful Missions

Motorola Solutions Helps Victorian Search and Rescue Dog Teams Perform Safe and Successful Missions

Robust radio technology supports interagency collaboration in the state’s most rugged and remote terrain
Palo Alto Networks Unit 42 Uncovers Vulnerability in Google Chrome’s Gemini AI Panel

Palo Alto Networks Unit 42 Uncovers Vulnerability in Google Chrome’s Gemini AI Panel

Google confirmed the findings and released a fix in early January 2026
ControlPlane Launches Enterprise Support for OpenBao to Strengthen Secrets Security

ControlPlane Launches Enterprise Support for OpenBao to Strengthen Secrets Security

ControlPlane, a specialist AI Security and DevSecOps consultancy, today announced the launch of ControlPlane Enterprise for OpenBao, a new offering designed to help organisations across Asia Pacific and globally to securely adopt and operate the OpenBao secrets management platform.
KnowBe4 Research Reveals Over Half of Australians Prioritise Work Accounts Over Personal Security

KnowBe4 Research Reveals Over Half of Australians Prioritise Work Accounts Over Personal Security

New study finds 76% of Australians feel confident spotting cyber threats, but risky habits like password reuse and credential sharing remain widespread  
Baidam Appoints Beau Hodge as CEO

Baidam Appoints Beau Hodge as CEO

BRISBANE, QLD – [12th March 2026] – Baidam, a leading First Nations information technology provider, has announced the appointment of Beau Hodge to the role of CEO. Hodge has held a succession of senior roles within Baidam since joining nearly five years ago. For Jack Reis and Pip Jenkinson, co-founders and owners of Baidam, Hodge’s appointment will ...
“LeakyLooker” Discovery Reveals Nine Vulnerabilities in Google Looker Studio, Exposing Sensitive Cloud Data

“LeakyLooker” Discovery Reveals Nine Vulnerabilities in Google Looker Studio, Exposing Sensitive Cloud Data

Tenable Research has uncovered a series of security vulnerabilities in Google Looker Studio, dubbed "LeakyLooker," that allowed attackers to run arbitrary SQL queries on victims’ databases and exfiltrate sensitive data within organisations' Google Cloud environments.
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This