The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

How Consumer Data Rights Are Changing the Way Australian Businesses Operate

How Consumer Data Rights Are Changing the Way Australian Businesses Operate

Introduction Consumer data rights reforms in Australia are reshaping how enterprises handle personal information by introducing operational, legal, and technical responsibilities that apply across every part of the business. That includes how data is collected, how it is stored, and how it moves between internal teams and external systems. John ...
The Rising Role of Citizen Automators In Business Innovation

The Rising Role of Citizen Automators In Business Innovation

Australia is facing a deepening shortage of technology skills in the coming years, putting pressure on businesses that need developers and other ICT professionals to innovate successfully. But new tools are enabling the rise of citizen developers to fill these tech gaps, here’s how.
Identity: The New Currency in Cybersecurity

Identity: The New Currency in Cybersecurity

Digital identity is now cybercriminals' top target. With data breaches up 78% globally, businesses must invest in Identity & Access Management to protect employees and customers—it's both a security imperative and ethical obligation.
Qantas Breached and Customers are Fuming

Qantas Breached and Customers are Fuming

Earlier today it was announced across mainstream media channels that Qantas suffered a data breach, affecting approximately six million customers. The breach was linked to a cyber attack targeting a third-party platform used by the prominent airline’s contact centre. Exposed information includes names, email addresses, phone numbers, and frequent ...
What Happens When the World’s Biggest Vulnerability Database Goes Dark?

What Happens When the World’s Biggest Vulnerability Database Goes Dark?

MITRE, the cornerstone of global vulnerability tracking, announcing it could go dark. For years, the field had relied on this single repository, the bedrock for tracking software vulnerabilities. What happens when that rug is pulled from beneath an entire industry? Tal Zarfati, Architect Lead at JFrog Security, still recalls the tremor this news sent ...
Minimising Third-party Risk

Minimising Third-party Risk

Minimise third-party risk with smart vendor management. Learn how to protect data, ensure compliance, and streamline reviews with automation.
The Blind Spot In Your Cyber Strategy

The Blind Spot In Your Cyber Strategy

 Recently on the DevSecOops podcast, Hosts Tom Walker, James Vincent, and Scott Fletcher unpacked the modern threats in the cybersecurity space. With years of experience in IT and cybersecurity, the hosts shared real world experiences, from everyday technical mishaps to nation sponsored cyberattacks, offering practical advice for staying secure amid ...
How Wiz Is Rewriting the Cloud Security Story

How Wiz Is Rewriting the Cloud Security Story

In Episode 7 of the DevSecOops podcast, hosts Tom Walker, Scott Fletcher, and James Vincent sat down with Matt Preswick, Principal Solutions Engineer at Wiz APJ, to unpack how Wiz has become an emerging favourite of both engineering teams and the executive suite. Beyond that, they also discussed the broader issue of the everyday realities of cloud ...
No results found.

In The News

Australia Leads the World in Organisational Concern over Identity Driven Attacks

Australia Leads the World in Organisational Concern over Identity Driven Attacks

Rubrik Zero Labs Issues Latest Study “Identity Crisis: Understanding & Building Resilience Against Identity-Driven Threats”
Barracuda Research Introduces GhostFrame – A Super Stealthy New Phishing Kit Behind a Million Attacks

Barracuda Research Introduces GhostFrame – A Super Stealthy New Phishing Kit Behind a Million Attacks

Barracuda has published details of a new, evasive and stealthy phishing-as-a-service (PhaaS) kit that hides its malicious content in web page iframes to bypass detection and maximise flexibility. This is the first time Barracuda has seen an entire phishing framework built around the iframe technique. Threat analysts have been tracking the new PhaaS ...
Manufacturing Industry Blocks More Ransomware Attempts, While Adversaries Shift to Data Theft

Manufacturing Industry Blocks More Ransomware Attempts, While Adversaries Shift to Data Theft

Sophos has announced new findings from the Sophos State of Ransomware in Manufacturing and Production 2025 report. The study reveals that manufacturers are stopping more ransomware attacks before data can be encrypted; however, adversaries are increasingly stealing data and using extortion-only tactics to maintain pressure. As a result, more than half ...
Darktrace Releases New Innovations in Darktrace / EMAIL™ to Stop Emerging Cross-Domain Attacks and Protect Outbound Trust

Darktrace Releases New Innovations in Darktrace / EMAIL™ to Stop Emerging Cross-Domain Attacks and Protect Outbound Trust

New research finds approximately 17% of email threats bypass Secure Email Gateways but are stopped by Darktrace’s AI[1]  New enhancements strengthen protection against threats that move across channels, like email bombing campaigns, as the volume of these attacks surges 100x  New brand verification capabilities introduced as phishing attacks ...
Unveiling WARP PANDA: A New Sophisticated China-Nexus Adversary

Unveiling WARP PANDA: A New Sophisticated China-Nexus Adversary

Throughout 2025, CrowdStrike has identified multiple intrusions targeting VMware vCenter environments at U.S.-based entities, in which newly identified China-nexus adversary WARP PANDA deployed BRICKSTORM malware. WARP PANDA exhibits a high level of technical sophistication, advanced operations security (OPSEC) skills, and extensive knowledge of cloud ...
Trend Micro Predicts 2026 as the Year Scams Become AI-Driven, AI-Scaled, and Emotion-Engineered

Trend Micro Predicts 2026 as the Year Scams Become AI-Driven, AI-Scaled, and Emotion-Engineered

Trend Micro Predicts 2026 as the Year Scams Become AI-Driven, AI-Scaled, and Emotion-Engineered
Email Threat Radar – December

Email Threat Radar – December

Email Threat Radar – December 2025 Notable threats targeting organisations seen by Barracuda Managed XDR
Dynatrace Expands AWS Integrations at re:Invent 2025

Dynatrace Expands AWS Integrations at re:Invent 2025

BOSTON, Mass., December 3, 2025 — Today at Amazon Web Services (AWS) re:Invent 2025, Dynatrace (NYSE: DT) announced expanded integrations with advanced AWS technologies and new achievements with AWS that deliver enhanced AI-driven observability, automation, and security to customers worldwide. These advancements help enterprises running workloads on ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This