The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

The New Secure Communications Realities for Governments
With the security of messaging apps once again in question, find out everything you need to know about ensuring the highest levels of security for high-stakes government communications. Only one solution is certified to meet all the requirements for modern, government-grade communications security: BlackBerry® SecuSUITE® from BlackBerry Secure Communications.
RedCurl’s Ransomware Debut
Introduction
This research, conducted by Bitdefender Labs, presents the first documented analysis of a ransomware campaign attributed to the RedCurl group (also known as Earth Kapre or Red Wolf). RedCurl has historically maintained a low profile, relying heavily on Living-off-the-Land (LOTL) techniques for corporate cyberespionage and data ...

Countering Pockets of Resistance to Cybersecurity Action
The real issue today for cybersecurity leaders is understanding and navigating the complexity and broader challenges of user adoption and resistance, bringing some key strategies to limit resistance to bear. In this way, the rate of adoption versus resistance can become a measure of success of the project, not an inhibitor to it.

Securing AI Innovation: Why the Fundamentals of Cybersecurity Still Matter
Richard Seiersen argues that while AI continues to make waves in cybersecurity, the fundamentals of cybersecurity remain unchanged — and organisations shouldn’t be distracted by the noise, nor should the core security principles require a radical rethink. Quoting French writer Alphonse Karr, “The more things change, the more they stay the same”.

The Rise of AI-Powered Sectional and Differential Attacks: A Growing Threat to Symmetric Encryption
Artificial intelligence (AI) is revolutionizing cryptanalysis, making traditional symmetric key encryption increasingly vulnerable. AI-driven differential and sectional attacks can now exploit minor weaknesses in encryption schemes with unprecedented efficiency. Organizations must adopt crypto-resilient architectures like Quantum-Powered Encryption ...

Australia’s 2025 Federal Budget: Is Cybersecurity Still a Priority?
Treasurer Jim Chalmers' 2025 federal budget marks a significant departure from previous robust commitments to cybersecurity, sparking concerns about Australia's cyber resilience. With notable investments like REDSPICE and the 2023–2030 Cybersecurity Strategy now in the past, questions arise about maintaining momentum amid escalating cyber threats.

Overcoming the Social Media Fraud Challenge with Graph Databases
Every year, organisations and consumers alike lose billions of dollars to online scams. Busting fraud and protecting users is all about finding and investigating the connections between various online entities, and modern technologies are helping to do so. Operating like a master detective, graph technology is capable of mapping patterns and ...

Microsoft’s Platforms and Services Prioritise Security from Inception, Rather than as an Afterthought
Overview
Microsoft’s long-standing Executive, Bret Arsenault, Corporate Vice President and Chief Cybersecurity advisor at Microsoft, detailed Microsoft’s Secure Future Initiative (SFI) - their strategic approach to addressing emerging cyber threats and managing secure software development.
With decades of experience at Microsoft, what Arsenault ...
No results found.
In The News
Latest Darktrace Investigations Uncover Novel & Emerging DDoS Botnet For Hire – ShadowV2
Darktrace's latest investigation uncovered a novel campaign that blends traditional malware with modern devops technology. At the center of this campaign is a Python-based command-and-control (C2) framework hosted on GitHub CodeSpaces. This campaign also utilizes a Python based spreader with a multi-stage Docker deployment as the initial access vector. ...
BeyondTrust Strengthens Innovation Leadership with Appointment of Felix Gaehtgens as VP of Product Strategy
Strategic leadership addition accelerates BeyondTrust’s innovation in identity security, machine IAM, and privileged access management (PAM).
Gaehtgens brings over a decade of Gartner expertise in identity security to BeyondTrust.
Dragos Platform 3.0 Delivers Industry’s Fastest Path to Effective OT Cyber Defence
Dragos has launched Dragos Platform 3.0, which provides breakthrough capabilities that empower industrial defenders to act even faster and more confidently to protect against intensifying cyber threats.
Tenable Unites Top CISOs to Forge Exposure Management Framework for Proactive Risk Management
Exposure Management Leadership Council created to mature exposure management into a proactive security discipline
Vection Technologies Secures $22.3m AI Defence Deal With NATO-approved Partner
INTEGRATEDXR company Vection Technologies Ltd (ASX:VR1) has announced has executed a $22.3m (scalable up to $29.5m at same conditions) multi-year master framework agreement with a repeat NATO-approved customer and partner operating within the European defence sector.
Highlights
$22.3m framework agreement executed with a repeat NATO-approved ...
Genetec Delivers Faster, Smarter Investigations In Security Center SaaS
New intelligent automation-powered investigation capabilities enable operators to quickly locate video evidence, understand context, and close cases in minutes.
Check Point Software Technologies Celebrates 2025 APAC Partner Excellence Awarding Australia’s DXC Technology as APAC Top Partner of The Year and S5 Technology Group as Workspace Security Partner of The Year
Sydney, 22 September 2025 - Check Point® Software Technologies Ltd., a pioneer and global leader of cyber security solutions, has announced its top-performing partners across the Asia Pacific region at the 2025 Check Point Software Technologies Asia Pacific Partner Conference held earlier this month in Hanoi, Vietnam.
The annual conference brought ...
Falcon Next-Gen Identity Security Innovations Expand Unified Protection for Every Identity, Closing the Gaps Legacy Solutions Create
Phishing-resistant MFA, enhanced privileged access, and identity-driven case management strengthen unified initial access, privilege control, and SOC response across human and agent identities
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
