The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Organisations Must Adapt Defences To 2025’s Dynamic Ransomware Threat

Organisations Must Adapt Defences To 2025’s Dynamic Ransomware Threat

Ransomware has entered a new phase in 2025—faster, more unpredictable, and increasingly targeting APAC. Reactive security no longer works and organisations must adopt intelligence-led, multi-layered defences to keep pace.
IT-OT Convergence: What Happens When Two Worlds Collide?

IT-OT Convergence: What Happens When Two Worlds Collide?

​Most people thought that cybersecurity is all about data breaches, suspicious links, or adversaries trying to get access to your accounts. But in recent years, the space has gone beyond computers and firewalls. Today, cybersecurity also means keeping the power on, the water safe, and hospitals operational. Recently on the DevSecOops podcast, hosts ...
Hygiene is Hard: Why Even Security-Conscious Organisations Still Fall at the First Hurdle

Hygiene is Hard: Why Even Security-Conscious Organisations Still Fall at the First Hurdle

Simply put, organisations need to move beyond reactive threat hunt engagements to proactive identity security and zero trust and statistics show this is one of the biggest gaps in our environments today that need attention
The Next Scammer’s Paradise

The Next Scammer’s Paradise

The email looks real. It sounds like your boss. Thinking it might be urgent, you click the link included therein. And just like that, it’s over. This is the new face of cybercrime. Powered by AI, cybercrime no longer requires technical prowess nor heavy coding. All you need is the right tool and the appropriate prompt; something that can scrape ...
The PIN That Wasn’t Yours

The PIN That Wasn’t Yours

Fintech gift card system flaw may have allowed quiet cashouts. Signs point to possible exploitation months before it was discovered.
It’s Time to Hack the Hackers

It’s Time to Hack the Hackers

Introduction Cybercrime in Australia is rising rapidly. From the major breachers that held headlines hostage for months, to government agencies and critical infrastructure being targeted, cyberattacks continue to hit hard and fast. In the last few months alone, a major Australian university appears to have fallen victim to a ransomware attack, a ...
Resilience Comes from Knowing What to Prioritise

Resilience Comes from Knowing What to Prioritise

As cyber threats and disruptions grow, organisations must make data resilience a core component of their IT strategy to ensure business continuity and safeguard critical data.
Shadow AI Is The Blind Spot No Australian Board Can Ignore

Shadow AI Is The Blind Spot No Australian Board Can Ignore

Australia’s corporate leaders are sleepwalking into a technology blind spot that will cost them dearly. Shadow AI is already entrenched in workplaces, and boards that treat it as a side issue are making the same mistake they made a decade ago with shadow IT and cloud adoption. Back then, companies allowed employees to use unapproved cloud apps because ...
No results found.

In The News

CrowdStrike Achieves ISO 42001 Certification for Responsible AI-Powered Cybersecurity

CrowdStrike Achieves ISO 42001 Certification for Responsible AI-Powered Cybersecurity

Certification accelerates leadership in trusted AI governance, enabling organizations to outpace AI-accelerated threats with speed and control
Rapid7 MDR Integrates Microsoft Defender Signals to Create Tangible Security Outcomes

Rapid7 MDR Integrates Microsoft Defender Signals to Create Tangible Security Outcomes

Rapid7 announces the availability of Rapid7 MDR for Microsoft – a pre-emptive threat detection, investigation, and response service that brings together Rapid7’s global SOC, our market-leading SIEM technology, and deeper bi-directional Microsoft Defender integrations.
Check Point Introduces AI-Driven Exposure Management to Close the Cyber Security Remediation Gap

Check Point Introduces AI-Driven Exposure Management to Close the Cyber Security Remediation Gap

Designed for AI-era attacks, Exposure Management helps organisations reduce risk faster using existing security controls 
Black Kite’s 2026 Wholesale & Retail Report Reveals Over 70% of Major Retailers, Nearly 60% of Wholesalers, and 52% of the Supply Chain Have Exposed Credentials

Black Kite’s 2026 Wholesale & Retail Report Reveals Over 70% of Major Retailers, Nearly 60% of Wholesalers, and 52% of the Supply Chain Have Exposed Credentials

Report finds the sectors’ shared supply chain is the greatest risk, as attackers view wholesale and retail as an interconnected target landscape
Hiring Season Is Scam Season: How Fake Recruiters Exploit Job Seekers with Trusted Brand Names

Hiring Season Is Scam Season: How Fake Recruiters Exploit Job Seekers with Trusted Brand Names

According to Bitdefender’s Antispam Lab latest data, a wave of fake recruitment emails is actively circulating, timed to coincide with the early-year hiring surge. These scams impersonate well-known employers and staffing companies, promising easy jobs, fast interviews, and flexible work. ‘Your interview is confirmed’ These scams open with good ...
Total Economic Impact Study: JFrog Unifies and Accelerates the Secure Software Supply Chain from Code to AI

Total Economic Impact Study: JFrog Unifies and Accelerates the Secure Software Supply Chain from Code to AI

New Industry Analyst Study Shows that JFrog Delivered 282% ROI in Three Years, Reducing Risk While Accelerating Safer Software Releases for Enterprises
Check Point Software Technologies Reinforces New Zealand Presence with Local Check Point Harmony SASE Data Residency Instance

Check Point Software Technologies Reinforces New Zealand Presence with Local Check Point Harmony SASE Data Residency Instance

New Point of Presence Enhances Web application and API protection with low latency and delivers Industry-Leading Threat Prevention and Cloud-Ready Security Architecture
Sophos Expands Portfolio with Workspace Protection to Secure Hybrid Work and Govern Employee AI Use

Sophos Expands Portfolio with Workspace Protection to Secure Hybrid Work and Govern Employee AI Use

Sophos today announced Sophos Workspace Protection, expanding its portfolio to help organisations secure hybrid work and govern the use of emerging technologies, including AI. Built around the Sophos Protected Browser, powered by Island, the solution enables organisations to protect applications, data, users, and guests wherever work takes place, while ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This