The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

AI Coding Assistants Boost Productivity … But At What Cost to Security?

AI Coding Assistants Boost Productivity … But At What Cost to Security?

As the pressure mounts to ship faster and innovate more aggressively, development teams must remember that code security is no longer optional but a business-critical necessity.
Baseline Compliance Is Just The Starting Line

Baseline Compliance Is Just The Starting Line

For years, compliance has been the word that quickly put anyone on the back foot. Compliance is one of those words that often carries a negative connotation, but it doesn’t have to. Some forward-thinking leaders are looking to rewrite the compliance script entirely. Jadee Hanson, Chief Information Security Officer at Vanta, has no patience for ...
How Emerging Technologies In Critical Infrastructure Are Expanding Cyber Risks

How Emerging Technologies In Critical Infrastructure Are Expanding Cyber Risks

Introduction Emerging technologies like industrial Internet of Things, unified platform architectures, and cloud-integrated operational technology are transforming the critical infrastructure landscape. This transformation, driven by the need for greater agility and pursuit of competitive advantage, is unlocking unprecedented levels of automation, ...
Privacy by Design: Future-proofing Data Security From the Ground Up

Privacy by Design: Future-proofing Data Security From the Ground Up

Introduction As AI reshapes how many of today’s enterprises operate, concerns over data privacy are accelerating. The pace of innovation is outstripping the capabilities of many legacy systems, and Australian businesses are grappling with issues related to transparency, access control and data security as a result. The core issue isn’t just the ...
The Price of Going Mobile App Viral

The Price of Going Mobile App Viral

The Tea app, a platform for women to rate and review dating experiences, recently went viral on the US App Store but suffered a severe data breach. Due to insecure Firebase storage and poor application security hygiene, over 72,000 private images including ID cards and selfies were exposed, with no access control or rate limiting in place. Metadata ...
Database 23ai: Innovation or Mere Iteration?

Database 23ai: Innovation or Mere Iteration?

Discover how Oracle's Database 23ai is transforming business data by integrating AI, bridging the gap traditional databases couldn’t. Unlock personalized, context-aware insights effortlessly with cutting-edge technology.
Repatriating the Cloud – Why Cybersecurity Must Now Take Center Stage

Repatriating the Cloud – Why Cybersecurity Must Now Take Center Stage

“The cloud is just someone else’s computer,” goes the old tech joke, and like many good jokes, it conceals a sobering truth. For years, organizations eagerly adopted public cloud platforms for the sake of agility, cost savings, and unlimited scalability. But today, that enthusiasm is being tempered by a harsh reality: those “someone else’s” computers ...
Rethinking Security: Why Ethical Curiosity Belongs at the Core of Cyber Defence

Rethinking Security: Why Ethical Curiosity Belongs at the Core of Cyber Defence

Introduction  In 2023, the Latitude Financial cyberattack exposed over 14 million customer records, including driver  licences, passport numbers, and financial details. While remediation focused on containment and  response, one quiet question lingered for many defenders:  "Why didn’t we ask, 'what if?' sooner?"  That single moment underscores ...
No results found.

In The News

Group-IB Report: Networked Supply Chain Cyber Attacks to Significantly Transform Asia-Pacific Cyber Risk Landscape in 2026

Group-IB Report: Networked Supply Chain Cyber Attacks to Significantly Transform Asia-Pacific Cyber Risk Landscape in 2026

Cyber threats like phishing and ransomware are now often links in a supply-chain attack ecosystem – a single compromise can reach thousands of downstream victims.    Group-IB uncovered 263 instances of corporate access in Asia-Pacific being sold on the dark web in 2025     Artificial Intelligence (AI) is making supply chain attacks cheaper, ...
Dragos OT Cybersecurity Report: Adversaries Increase Real-World Impact, Map Control Loops Across Industrial Infrastructure

Dragos OT Cybersecurity Report: Adversaries Increase Real-World Impact, Map Control Loops Across Industrial Infrastructure

The latest Dragos 2026 OT/ICS Cybersecurity Report finds cyber adversaries are progressing from reconnaissance to real-world operational disruption, including across Asia-Pacific.
Palo Alto Networks Unit 42 Releases Global Incident Response Report 2026

Palo Alto Networks Unit 42 Releases Global Incident Response Report 2026

AI-Driven Attacks, Identity Abuse and Supply Chain Exploitation Reshape the Cyber Threat Landscape
Arctic Wolf Threat Report Highlights 11x Growth in Data Extortion Incidents and Continued Dominance of Ransomware

Arctic Wolf Threat Report Highlights 11x Growth in Data Extortion Incidents and Continued Dominance of Ransomware

New insights reveal the pivot to data-only extortion, attacker abuse of remote access tools, and how early detection is reshaping ransomware outcomes
New Report Finds APAC Enterprises Facing Agentic AI Technical Challeneges

New Report Finds APAC Enterprises Facing Agentic AI Technical Challeneges

Sydney, 18 February 2026 - Dynatrace, the leading AI-powered observability platform, has today released the regional findings of The Pulse of Agentic AI 2026. The inaugural survey of 919 senior global leaders responsible for agentic AI implementation reveals that enterprises are not stalling because they doubt AI, but because they cannot yet ...
Check Point Software Earns Leader & Fast Mover Position in GigaOm Radar for Cloud Network Security

Check Point Software Earns Leader & Fast Mover Position in GigaOm Radar for Cloud Network Security

Analyst firm highlights Check Point’s prevention‑first architecture, strong ecosystem integrations, unified cloud security platform, and continued pace of innovation REDWOOD CITY, CA. February 17, 2026 -- Check Point Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced that it has been ...
LummaStealer Is Back At Scale as Fake CAPTCHA Campaigns Drive Global Resurgence

LummaStealer Is Back At Scale as Fake CAPTCHA Campaigns Drive Global Resurgence

Bitdefender researchers have identified a significant resurgence of one of the world’s most prolific information-stealing malware operations, less than a year after a major global law enforcement action disrupted more than 2,300 of its command-and-control domains. Despite the 2025 takedown effort, LummaStealer was not dismantled. Instead, the ...
Macquarie Tech Appoints Kate Vidgen as Independent Non-Executive Director

Macquarie Tech Appoints Kate Vidgen as Independent Non-Executive Director

Macquarie Technology Group (ASX: MAQ) has announced Kate Vidgen will join the Company’s board as an Independent Non-executive Director following the release of the Company’s FY26 half-year results. Kate will bring more than 30 years’ experience to the company as a senior finance executive and non-executive director with a demonstrated history of ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This