The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

AI in Defence – A Partner, Not a Quick Fix

AI in Defence – A Partner, Not a Quick Fix

​AI has been making waves for years now. It has moved from the pages of science fiction into the control rooms of our defence and security agencies and critical infrastructures, watching over networks and inspecting traffic. Why wouldn’t it be when it promises to work faster than humans and spot the tiniest anomaly possible? For defence and ...
Why You Need Speed and Trust for Modern Software Delivery

Why You Need Speed and Trust for Modern Software Delivery

Introduction Businesses are creating and launching software faster than ever to keep pace with competitors and drive innovation. The focus on increased speed has created a few trends: Developer productivity is no longer only measured by speed, but quality and security as well Many development teams rely on platform engineering to build tools ...
Is GenAI Outsmarting Us or Just Making Us Lazy?

Is GenAI Outsmarting Us or Just Making Us Lazy?

 Is AI turning our brains to mush? Hosts Phoebe Goh and Mekka Williams are joined by Karissa “KB” Breen, the sharp-tongued cybersecurity journalist behind the popular podcast, KBKast, for a no-holds-barred look at how AI is rewriting the rules of the game. From the sneaky rise of unsanctioned “shadow AI” tools to the unnervingly convincing ...
The Growing Tug-of-War Between Scammers and Defenders: What Australian Businesses Need to Do to Stay Safe

The Growing Tug-of-War Between Scammers and Defenders: What Australian Businesses Need to Do to Stay Safe

Scams are no longer on the fringes of criminal activity. They have become a mainstream threat for Australians, targeting both consumers and businesses with increasing sophistication. According to Scamwatch, Australians lost $2.03 billion to scams in 2024. This year’s Scams Awareness Week (25-29 August 2025) highlights this escalating issue and shows ...
Claroty Team82 Uncovers Critical Vulnerabilities in Axis Video Surveillance Products

Claroty Team82 Uncovers Critical Vulnerabilities in Axis Video Surveillance Products

Turning Camera Surveillance on its Axis
Why Asia Pacific Organisations Must Rethink Inline Security After a Wave of Data Breaches

Why Asia Pacific Organisations Must Rethink Inline Security After a Wave of Data Breaches

Asia Pacific is in the midst of a cybersecurity reckoning following a spate of major data breaches including Qantas and Louis Vuitton in Australia, attacks on Singapore’s critical infrastructure, a surge of ransomware threats in India, and most recently a successful attack on Google. While most organisations are focused on enhancing cybersecurity, one ...
Unmasking Identity Risks Before They Become Breaches

Unmasking Identity Risks Before They Become Breaches

An effective identity security strategy must move beyond siloed tools and reactive policies. It requires unified visibility across all users and assets, contextual understanding of privilege, and automated enforcement of least-privilege principles.
Cyber-securing Enterprises, the AI Way

Cyber-securing Enterprises, the AI Way

“...Therefore, send not to know For whom the bell tolls, It tolls for thee.” John Donne, “No man is an island” Introduction No enterprise is an island of security when it comes to cyber-attacks. Australia suffered a staggering 47 million data breaches in 2024 — equivalent to one attack every second — representing a twelvefold increase ...
No results found.

In The News

NinjaOne Expands Automated Endpoint Management Platform with Native Remote Access

NinjaOne Expands Automated Endpoint Management Platform with Native Remote Access

NinjaOne recently announced NinjaOne Remote®, a remote access solution natively integrated into the NinjaOne Platform. NinjaOne Remote was built from the ground up for businesses, not consumers, with security in mind, and gives IT teams and MSPs fast, reliable, and secure control over endpoints, wherever they are. The solution is built on a ...
Australia Leads the World in Organisational Concern over Identity Driven Attacks

Australia Leads the World in Organisational Concern over Identity Driven Attacks

Rubrik Zero Labs Issues Latest Study “Identity Crisis: Understanding & Building Resilience Against Identity-Driven Threats”
Barracuda Research Introduces GhostFrame – A Super Stealthy New Phishing Kit Behind a Million Attacks

Barracuda Research Introduces GhostFrame – A Super Stealthy New Phishing Kit Behind a Million Attacks

Barracuda has published details of a new, evasive and stealthy phishing-as-a-service (PhaaS) kit that hides its malicious content in web page iframes to bypass detection and maximise flexibility. This is the first time Barracuda has seen an entire phishing framework built around the iframe technique. Threat analysts have been tracking the new PhaaS ...
Manufacturing Industry Blocks More Ransomware Attempts, While Adversaries Shift to Data Theft

Manufacturing Industry Blocks More Ransomware Attempts, While Adversaries Shift to Data Theft

Sophos has announced new findings from the Sophos State of Ransomware in Manufacturing and Production 2025 report. The study reveals that manufacturers are stopping more ransomware attacks before data can be encrypted; however, adversaries are increasingly stealing data and using extortion-only tactics to maintain pressure. As a result, more than half ...
Darktrace Releases New Innovations in Darktrace / EMAIL™ to Stop Emerging Cross-Domain Attacks and Protect Outbound Trust

Darktrace Releases New Innovations in Darktrace / EMAIL™ to Stop Emerging Cross-Domain Attacks and Protect Outbound Trust

New research finds approximately 17% of email threats bypass Secure Email Gateways but are stopped by Darktrace’s AI[1]  New enhancements strengthen protection against threats that move across channels, like email bombing campaigns, as the volume of these attacks surges 100x  New brand verification capabilities introduced as phishing attacks ...
Unveiling WARP PANDA: A New Sophisticated China-Nexus Adversary

Unveiling WARP PANDA: A New Sophisticated China-Nexus Adversary

Throughout 2025, CrowdStrike has identified multiple intrusions targeting VMware vCenter environments at U.S.-based entities, in which newly identified China-nexus adversary WARP PANDA deployed BRICKSTORM malware. WARP PANDA exhibits a high level of technical sophistication, advanced operations security (OPSEC) skills, and extensive knowledge of cloud ...
Trend Micro Predicts 2026 as the Year Scams Become AI-Driven, AI-Scaled, and Emotion-Engineered

Trend Micro Predicts 2026 as the Year Scams Become AI-Driven, AI-Scaled, and Emotion-Engineered

Trend Micro Predicts 2026 as the Year Scams Become AI-Driven, AI-Scaled, and Emotion-Engineered
Email Threat Radar – December

Email Threat Radar – December

Email Threat Radar – December 2025 Notable threats targeting organisations seen by Barracuda Managed XDR
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This