The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

IT-OT Convergence: What Happens When Two Worlds Collide?
Most people thought that cybersecurity is all about data breaches, suspicious links, or adversaries trying to get access to your accounts. But in recent years, the space has gone beyond computers and firewalls. Today, cybersecurity also means keeping the power on, the water safe, and hospitals operational.
Recently on the DevSecOops podcast, hosts ...

Hygiene is Hard: Why Even Security-Conscious Organisations Still Fall at the First Hurdle
Simply put, organisations need to move beyond reactive threat hunt engagements to proactive identity security and zero trust and statistics show this is one of the biggest gaps in our environments today that need attention

The Next Scammer’s Paradise
The email looks real. It sounds like your boss. Thinking it might be urgent, you click the link included therein. And just like that, it’s over.
This is the new face of cybercrime. Powered by AI, cybercrime no longer requires technical prowess nor heavy coding. All you need is the right tool and the appropriate prompt; something that can scrape ...

The PIN That Wasn’t Yours
Fintech gift card system flaw may have allowed quiet cashouts. Signs point to possible exploitation months before it was discovered.

It’s Time to Hack the Hackers
Introduction
Cybercrime in Australia is rising rapidly. From the major breachers that held headlines hostage for months, to government agencies and critical infrastructure being targeted, cyberattacks continue to hit hard and fast.
In the last few months alone, a major Australian university appears to have fallen victim to a ransomware attack, a ...

Resilience Comes from Knowing What to Prioritise
As cyber threats and disruptions grow, organisations must make data resilience a core component of their IT strategy to ensure business continuity and safeguard critical data.

Shadow AI Is The Blind Spot No Australian Board Can Ignore
Australia’s corporate leaders are sleepwalking into a technology blind spot that will cost them dearly. Shadow AI is already entrenched in workplaces, and boards that treat it as a side issue are making the same mistake they made a decade ago with shadow IT and cloud adoption. Back then, companies allowed employees to use unapproved cloud apps because ...

Scam Awareness Week Shines a Light On the Collective Effort Needed to Fight Scams
Collaborative action from individuals, businesses and the government is more important than ever, as scams become more sophisticated.
No results found.
In The News
VAST Data Unveils a Platform for Secure, Trusted, and Self-Learning Agentic AI Systems
VAST Data has announced the VAST Data PolicyEngine and VAST Data TuningEngine, two new computing services that will allow the next generation of the VAST AI Operating System to deliver key requirements for organisations looking to scale their mission-critical AI initiatives.
Specifically, PolicyEngine and TuningEngine work in tandem within the VAST ...
DroneShield Secures $21.7M Western Military Contracts
DroneShield Limited (ASX:DRO) has announced that it has received a package of six standalone contracts for $21.7 million from an in-country reseller for delivery to a western military end-customer.
The contracts are for the supply of dismounted counter-drone systems, spare kits, and software subscriptions. All items ae readily available from ...
VAST Data Introduces End-to-End Fully Accelerated AI Data Stack with NVIDIA
Today at VAST Forward 2026, VAST Data, the AI Operating System company, announced an end-to-end, fully CUDA accelerated AI data stack, delivered through an expanded collaboration with NVIDIA. With the VAST AI Operating System now running directly on NVIDIA-powered servers, customers can eliminate data bottlenecks across the AI pipeline and deliver ...
CIOs Accelerate AI-Driven Transformation Amid Rising Threat Complexity
New report finds just 20 per cent of CIOs feel highly effective at defending against AI-enabled adversaries
February 26, 2026 – LevelBlue, the world’s largest pure-play provider of managed security services, has released Persona Spotlight: CIO (Chief Information Officer), the latest report in its ongoing research examining how technology leaders ...
New Malicious npm Package Highlights the Speed at Which Supply Chain Risks Propagate
Tenable Research investigated a malicious package in the npm public registry named “amber-src” that underscores the rapid nature of modern supply chain attacks. The package, which was downloaded approximately 50,000 times before its removal, was designed to mimic a popular package “ember-source”, to infect developers’ systems across Windows, macOS, and ...
WatchGuard Marks 30 Years of Setting the MSP Security Standard
Cybersecurity leader has helped MSPs reduce complexity, scale protection, and profitably grow through every market shift
SYDNEY – February 25, 2026 — WatchGuard® Technologies, a global leader in unified cybersecurity for managed service providers (MSPs), celebrates 30 years this month of helping MSPs protect businesses through every era of threat ...
Firmus Technologies Group Selects VAST AI Operating System to Power Sovereign, Energy-Efficient AI Factories in Asia Pacific
VAST Data today announced that Firmus Technologies Group, an AI infrastructure specialist founded in Australia with operations across Asia Pacific, has selected the VAST AI Operating System as a foundational data layer for its next generation of sovereign, energy-efficient AI factories.
Firmus, a NVIDIA Cloud Partner (NCP), is building ...
2026 CrowdStrike Global Threat Report: AI Accelerates Adversaries and Reshapes the Attack Surface
AI-enabled attacks surge 89% as breakout time falls to 29 minutes; AI tools and development platforms are actively exploited
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
