The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Organisations Must Adapt Defences to 2025’s Dynamic Ransomware Threat

Organisations Must Adapt Defences to 2025’s Dynamic Ransomware Threat

Ransomware has entered a new phase in 2025—faster, more unpredictable, and increasingly targeting APAC. Reactive security no longer works and organisations must adopt intelligence-led, multi-layered defences to keep pace.
IT-OT Convergence: What Happens When Two Worlds Collide?

IT-OT Convergence: What Happens When Two Worlds Collide?

​Most people thought that cybersecurity is all about data breaches, suspicious links, or adversaries trying to get access to your accounts. But in recent years, the space has gone beyond computers and firewalls. Today, cybersecurity also means keeping the power on, the water safe, and hospitals operational. Recently on the DevSecOops podcast, hosts ...
Hygiene Is Hard: Why Even Security-Conscious Organisations Still Fall at the First Hurdle

Hygiene Is Hard: Why Even Security-Conscious Organisations Still Fall at the First Hurdle

Simply put, organisations need to move beyond reactive threat hunt engagements to proactive identity security and zero trust and statistics show this is one of the biggest gaps in our environments today that need attention
The Next Scammer’s Paradise

The Next Scammer’s Paradise

The email looks real. It sounds like your boss. Thinking it might be urgent, you click the link included therein. And just like that, it’s over. This is the new face of cybercrime. Powered by AI, cybercrime no longer requires technical prowess nor heavy coding. All you need is the right tool and the appropriate prompt; something that can scrape ...
The PIN That Wasn’t Yours

The PIN That Wasn’t Yours

Fintech gift card system flaw may have allowed quiet cashouts. Signs point to possible exploitation months before it was discovered.
It’s Time to Hack the Hackers

It’s Time to Hack the Hackers

Introduction Cybercrime in Australia is rising rapidly. From the major breachers that held headlines hostage for months, to government agencies and critical infrastructure being targeted, cyberattacks continue to hit hard and fast. In the last few months alone, a major Australian university appears to have fallen victim to a ransomware attack, a ...
Resilience Comes From Knowing What to Prioritise

Resilience Comes From Knowing What to Prioritise

As cyber threats and disruptions grow, organisations must make data resilience a core component of their IT strategy to ensure business continuity and safeguard critical data.
Shadow AI Is the Blind Spot No Australian Board Can Ignore

Shadow AI Is the Blind Spot No Australian Board Can Ignore

Australia’s corporate leaders are sleepwalking into a technology blind spot that will cost them dearly. Shadow AI is already entrenched in workplaces, and boards that treat it as a side issue are making the same mistake they made a decade ago with shadow IT and cloud adoption. Back then, companies allowed employees to use unapproved cloud apps because ...
No results found.

In the News

CrowdStrike Delivers Industry’s First Adversary-Informed Cloud Risk Prioritisation to Stop AI-Powered Adversaries

CrowdStrike Delivers Industry’s First Adversary-Informed Cloud Risk Prioritisation to Stop AI-Powered Adversaries

New Falcon Cloud Security innovations unify application behaviour and adversary tradecraft to eliminate the exposures AI-fortified attackers exploit
HPE Introduces Sweeping Security Advancements to Secure AI Adoption and Strengthen Enterprise Resiliency

HPE Introduces Sweeping Security Advancements to Secure AI Adoption and Strengthen Enterprise Resiliency

New HPE Juniper Networking SRX400 Series Firewalls extend consistent protection from core to edge as AI expands across distributed sites Expanded hybrid mesh firewall puts enterprise guardrails around AI to reduce exposure without slowing productivity Built-in security enhancements support resilience as a core business requirement across the ...
KnowBe4 Accelerates the Future of Human Risk Management With Expanding Suite of AI Agents

KnowBe4 Accelerates the Future of Human Risk Management With Expanding Suite of AI Agents

AI Defence Agents reduce administrative burden and transform security operations from a cost centre to a competitive advantage 
Saviynt Unveils Industry’s First Identity Control Plane for AI Agents

Saviynt Unveils Industry’s First Identity Control Plane for AI Agents

Saviynt delivers the first enterprise-grade platform with the full capabilities to govern AI agents from discovery through runtime
Phantom Labs Analysis of BeyondTrust’s Identity Security Insights Data Finds Enterprise AI Agents Growing 466.7% Year Over Year

Phantom Labs Analysis of BeyondTrust’s Identity Security Insights Data Finds Enterprise AI Agents Growing 466.7% Year Over Year

BeyondTrust researchers warn of a rapidly expanding “shadow AI workforce” creating new identity security risks, based on data uncovered through Identity Security Insights® | Some organisations operate well over 1,000 AI agents, many of which security teams were not aware existed within their environments
Ping Identity Defines the Runtime Identity Standard for Autonomous AI

Ping Identity Defines the Runtime Identity Standard for Autonomous AI

General Availability of Identity for AI establishes continuous, contextual enforcement and real-time control over AI agents 
Interactive Secures IT Managed Services Agreement With Major Superannuation Fund

Interactive Secures IT Managed Services Agreement With Major Superannuation Fund

The leading Australian IT service provider will support the delivery of Hostplus’ technology strategy to enhance service delivery and operational resilience.
15,500 Malicious Domains: How Threat Actors Abuse a Popular Ad Tracker for Cloaked AI Investment Scams

15,500 Malicious Domains: How Threat Actors Abuse a Popular Ad Tracker for Cloaked AI Investment Scams

New research from Infoblox Threat Intel and Confiant reveals that cybercriminals are abusing Keitaro, a widely used advertising performance tracker, to hide (“cloak”) scams and malware behind ordinary web traffic; with many posing specifically as AI investment opportunities. Cloaking has become a foundational block of modern cybercrime, allowing ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This