The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

The Scattered Spider, Airline Attacks and How to Be Breach Ready!

The Scattered Spider, Airline Attacks and How to Be Breach Ready!

Introduction On July 2, 2025, Qantas, Australia's flagship airline, disclosed a cyberattack that compromised the personal information of up to six million customers, first detected on June 30, 2025. Touted as one of the most significant data breaches in Australia's recent history, the attack is suspected to be the work of the notorious Scattered ...
Enough with the Optics: It is Time for Cyber Accountability, Not Publicity Stunts

Enough with the Optics: It is Time for Cyber Accountability, Not Publicity Stunts

Summary Following the recent Qantas data breach, which once again exposes our national cybersecurity vulnerabilities, we are met with press releases and performative outrage from prominent government officials. The breach reveals a fundamental issue that no amount of media statements or vague reassurances can hide. Despite the hype surrounding the ...
Why Does Recovery Take So Long? But It Doesn’t Have To

Why Does Recovery Take So Long? But It Doesn’t Have To

Recently, Commvault released the State of Data Readiness Report, which surveyed more than 400 leaders from across Australia and New Zealand. Executives believe their companies must recover within 24-48 hours. IT and security teams estimate five to seven days if they are to be realistic. The actual global average is about 24 days offline. I sat down ...
NBN Or Mobile Broadband? How To Choose The Right Business Internet Setup

NBN Or Mobile Broadband? How To Choose The Right Business Internet Setup

Introduction Setting up internet for your business is not a one size fits all exercise. Whether you're running a solo consultancy, managing a busy retail outlet, or coordinating a remote team, choosing between NBN and mobile broadband can significantly impact your daily operations. With digital connectivity now critical for everything from cloud ...
Alleged Russian Hackers Target Norwegian Dam

Alleged Russian Hackers Target Norwegian Dam

Why this cyber attack on a Norwegian dam should have you paying attention
How Consumer Data Rights Are Changing the Way Australian Businesses Operate

How Consumer Data Rights Are Changing the Way Australian Businesses Operate

Introduction Consumer data rights reforms in Australia are reshaping how enterprises handle personal information by introducing operational, legal, and technical responsibilities that apply across every part of the business. That includes how data is collected, how it is stored, and how it moves between internal teams and external systems. John ...
The Rising Role of Citizen Automators In Business Innovation

The Rising Role of Citizen Automators In Business Innovation

Australia is facing a deepening shortage of technology skills in the coming years, putting pressure on businesses that need developers and other ICT professionals to innovate successfully. But new tools are enabling the rise of citizen developers to fill these tech gaps, here’s how.
Identity: The New Currency in Cybersecurity

Identity: The New Currency in Cybersecurity

Digital identity is now cybercriminals' top target. With data breaches up 78% globally, businesses must invest in Identity & Access Management to protect employees and customers—it's both a security imperative and ethical obligation.
No results found.

In The News

Australia Leads the World in Organisational Concern over Identity Driven Attacks

Australia Leads the World in Organisational Concern over Identity Driven Attacks

Rubrik Zero Labs Issues Latest Study “Identity Crisis: Understanding & Building Resilience Against Identity-Driven Threats”
Barracuda Research Introduces GhostFrame – A Super Stealthy New Phishing Kit Behind a Million Attacks

Barracuda Research Introduces GhostFrame – A Super Stealthy New Phishing Kit Behind a Million Attacks

Barracuda has published details of a new, evasive and stealthy phishing-as-a-service (PhaaS) kit that hides its malicious content in web page iframes to bypass detection and maximise flexibility. This is the first time Barracuda has seen an entire phishing framework built around the iframe technique. Threat analysts have been tracking the new PhaaS ...
Manufacturing Industry Blocks More Ransomware Attempts, While Adversaries Shift to Data Theft

Manufacturing Industry Blocks More Ransomware Attempts, While Adversaries Shift to Data Theft

Sophos has announced new findings from the Sophos State of Ransomware in Manufacturing and Production 2025 report. The study reveals that manufacturers are stopping more ransomware attacks before data can be encrypted; however, adversaries are increasingly stealing data and using extortion-only tactics to maintain pressure. As a result, more than half ...
Darktrace Releases New Innovations in Darktrace / EMAIL™ to Stop Emerging Cross-Domain Attacks and Protect Outbound Trust

Darktrace Releases New Innovations in Darktrace / EMAIL™ to Stop Emerging Cross-Domain Attacks and Protect Outbound Trust

New research finds approximately 17% of email threats bypass Secure Email Gateways but are stopped by Darktrace’s AI[1]  New enhancements strengthen protection against threats that move across channels, like email bombing campaigns, as the volume of these attacks surges 100x  New brand verification capabilities introduced as phishing attacks ...
Unveiling WARP PANDA: A New Sophisticated China-Nexus Adversary

Unveiling WARP PANDA: A New Sophisticated China-Nexus Adversary

Throughout 2025, CrowdStrike has identified multiple intrusions targeting VMware vCenter environments at U.S.-based entities, in which newly identified China-nexus adversary WARP PANDA deployed BRICKSTORM malware. WARP PANDA exhibits a high level of technical sophistication, advanced operations security (OPSEC) skills, and extensive knowledge of cloud ...
Trend Micro Predicts 2026 as the Year Scams Become AI-Driven, AI-Scaled, and Emotion-Engineered

Trend Micro Predicts 2026 as the Year Scams Become AI-Driven, AI-Scaled, and Emotion-Engineered

Trend Micro Predicts 2026 as the Year Scams Become AI-Driven, AI-Scaled, and Emotion-Engineered
Email Threat Radar – December

Email Threat Radar – December

Email Threat Radar – December 2025 Notable threats targeting organisations seen by Barracuda Managed XDR
Dynatrace Expands AWS Integrations at re:Invent 2025

Dynatrace Expands AWS Integrations at re:Invent 2025

BOSTON, Mass., December 3, 2025 — Today at Amazon Web Services (AWS) re:Invent 2025, Dynatrace (NYSE: DT) announced expanded integrations with advanced AWS technologies and new achievements with AWS that deliver enhanced AI-driven observability, automation, and security to customers worldwide. These advancements help enterprises running workloads on ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This