The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Why Fighting Fraud Requires a Real-time Foundation

Why Fighting Fraud Requires a Real-time Foundation

Introduction Australia is fast becoming a hotspot for AI-generated cybercrime. Risks that were once theoretical are now costing businesses millions, even as security teams deploy advanced analytics, AI, and new approaches to keep pace. Consider this case in 2024. A finance employee in Hong Kong wired US$25 million during what appeared to be a ...
‘Tis the Season to Stay Secure: Safeguarding Your Business this Festive Period

‘Tis the Season to Stay Secure: Safeguarding Your Business this Festive Period

This holiday shopping season can make or break many Australian businesses. While consumers are shopping for bargains, attackers are searching for vulnerabilities.  The surge in shopping traffic during Black Friday, Cyber Monday and Christmas sales provides cybercriminals with the perfect cover to launch scams and fraud campaigns, exploiting the rise ...
Australia’s Next Insider Threat Might Be an Algorithm

Australia’s Next Insider Threat Might Be an Algorithm

As Australian organisations race to embed AI tools across human resources, finance and operations, they may be missing a critical security fault line. While disgruntled employees or contractors gone rogue remain a concern, the next major data breach is increasingly likely to come from an algorithm that never intended malice.
Safeguarding Australia’s Most Critical Systems: Why Cybersecurity Is a Sovereignty Issue

Safeguarding Australia’s Most Critical Systems: Why Cybersecurity Is a Sovereignty Issue

Byline from Christopher Rule, General Manager of Defence, Security, and Resilence at GME about why cybersecurity is a sovereignty issue, on the back off ASD's recent Cyber Threat Report and ASIO Director-General Mike Burgess's speech on cyber espionage against critical infrastructure no longer being a hypothetical wartime scenario.
Exploring Security In the Context of AI

Exploring Security In the Context of AI

Insights from the Cisco Live! "Redefining Security in the AI Era" Panel The rapid proliferation of Artificial Intelligence (AI) across industries has adroitly shifted the paradigm of cybersecurity. At the recent “Redefining Security in the AI Era” panel held at Cisco Live! 2025, senior leaders from Cisco, and partner organisation Logicalis, met to ...
Cybercrime to Hit $10.5 Trillion by 2025, According to Cybersecurity Ventures

Cybercrime to Hit $10.5 Trillion by 2025, According to Cybersecurity Ventures

According to research from Cybersecurity Ventures, cybercrime is projected to cost the world $10.5 trillion annually by 2025 ¹ and attacks, especially ransomware, are now an everyday fact of life. Last week in New York, at a recent press briefing before the official commencement of Commvault Shift, Commvault disclosed that 78% of respondents in the ...
‘We Let the Internet Down Today’ says Co-Founder at Cloudflare

‘We Let the Internet Down Today’ says Co-Founder at Cloudflare

​When Cloudflare goes down, the internet feels it. The recent Cloudflare outage wasn’t just ‘a blip’ - it was an unfortunate failure that took some of the world’s most heavily trafficked services offline. Cloudflare confirmed that a configuration update triggered a failure inside its control plane, specifically within systems responsible for managing ...
Like It or Not, PQC Is the Key (For Now)

Like It or Not, PQC Is the Key (For Now)

Every few months, another “quantum-safe” technology is marketed as the real answer, usually with the claim that post-quantum cryptography isn’t enough. PQC is too new, too slow, too fragile, too unproven. One person I spoke to even described adopting PQC as “shuffling the furniture on a sinking ship,” as if the standards effort itself is the ...
No results found.

In The News

CrowdStrike Achieves 100% Detection and 100% Protection in Most Challenging MITRE Evaluations

CrowdStrike Achieves 100% Detection and 100% Protection in Most Challenging MITRE Evaluations

CrowdStrike embraces MITRE’s first real-world cross-domain attack simulation, delivering perfect scores with no false positives AUSTIN, Texas – December 10, 2025 – CrowdStrike (NASDAQ: CRWD) delivered 100% detection and 100% protection with no false positives in the 2025 MITRE ATT&CK® Enterprise Evaluations – the most technically demanding in ...
Wendy Komadina Appointed Darktrace VP ANZ To Spearhead Next Phase Of Partner-Led Growth

Wendy Komadina Appointed Darktrace VP ANZ To Spearhead Next Phase Of Partner-Led Growth

Darktrace is pleased to announce the appointment of highly respected Australian technology executive, Wendy Komadina, as Vice President, Australia and New Zealand (ANZ).
Trend Micro Honours Global Leaders in Cybersecurity with 2025 Global Customer Awards

Trend Micro Honours Global Leaders in Cybersecurity with 2025 Global Customer Awards

Vantage Markets was awarded Customer Innovator for going beyond standard cybersecurity implementations SYDNEY, December 11, 2025 – Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cybersecurity leader, today announced the recipients of its 2025 Trend Global Customer Awards, celebrating organisations worldwide for their corporate leadership, ...
New Research Reveals Australians and New Zealanders are Ready for AI-Powered Emergency Response

New Research Reveals Australians and New Zealanders are Ready for AI-Powered Emergency Response

86% willing to share real-time location data; strong support for AI to detect threats and accelerate response
Fake Leonardo DiCaprio Movie Torrent Spreads Agent Tesla Trojan Through Layered PowerShell Chain

Fake Leonardo DiCaprio Movie Torrent Spreads Agent Tesla Trojan Through Layered PowerShell Chain

After noticing a spike in detections involving what looked like a movie torrent for One Battle After Another, Bitdefender researchers started an investigation and discovered that it was a complex infection chain. The film, Leonardo DiCaprio's latest, has quickly gained notoriety, making it an attractive lure for cybercriminals seeking to infect as ...
Tenable Patch Tuesday commentary – December 2025

Tenable Patch Tuesday commentary – December 2025

In the last Patch Tuesday for 2025, Microsoft addresses 56 CVEs, including two publicly disclosed vulnerabilities and one zero-day that was exploited in the wild. Elevation of privilege (EoP) vulnerabilities accounted for 50% of the vulnerabilities patched this month, followed by remote code execution (RCE) vulnerabilities at 33.9%. Please find below a ...
CrowdStrike Research: Security Flaws in DeepSeek-Generated Code Linked to Political Triggers

CrowdStrike Research: Security Flaws in DeepSeek-Generated Code Linked to Political Triggers

CrowdStrike Counter Adversary Operations identifies innocuous trigger words that lead DeepSeek to produce more vulnerable code.
BeyondTrust and Ping Identity Partner to Deliver Unified Identity Security Fabric

BeyondTrust and Ping Identity Partner to Deliver Unified Identity Security Fabric

Combined solution automates identity decisions across human and non-human identities, strengthening Zero Trust security | Joint offering eliminates identity silos by integrating PAM, IAM, and IGA into a cohesive, AI-driven framework for enhanced visibility, control and governance
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This