The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

The New Secure Communications Realities for Governments
With the security of messaging apps once again in question, find out everything you need to know about ensuring the highest levels of security for high-stakes government communications. Only one solution is certified to meet all the requirements for modern, government-grade communications security: BlackBerry® SecuSUITE® from BlackBerry Secure Communications.
RedCurl’s Ransomware Debut
Introduction
This research, conducted by Bitdefender Labs, presents the first documented analysis of a ransomware campaign attributed to the RedCurl group (also known as Earth Kapre or Red Wolf). RedCurl has historically maintained a low profile, relying heavily on Living-off-the-Land (LOTL) techniques for corporate cyberespionage and data ...

Countering Pockets of Resistance to Cybersecurity Action
The real issue today for cybersecurity leaders is understanding and navigating the complexity and broader challenges of user adoption and resistance, bringing some key strategies to limit resistance to bear. In this way, the rate of adoption versus resistance can become a measure of success of the project, not an inhibitor to it.

Securing AI Innovation: Why the Fundamentals of Cybersecurity Still Matter
Richard Seiersen argues that while AI continues to make waves in cybersecurity, the fundamentals of cybersecurity remain unchanged — and organisations shouldn’t be distracted by the noise, nor should the core security principles require a radical rethink. Quoting French writer Alphonse Karr, “The more things change, the more they stay the same”.

The Rise of AI-Powered Sectional and Differential Attacks: A Growing Threat to Symmetric Encryption
Artificial intelligence (AI) is revolutionizing cryptanalysis, making traditional symmetric key encryption increasingly vulnerable. AI-driven differential and sectional attacks can now exploit minor weaknesses in encryption schemes with unprecedented efficiency. Organizations must adopt crypto-resilient architectures like Quantum-Powered Encryption ...

Australia’s 2025 Federal Budget: Is Cybersecurity Still a Priority?
Treasurer Jim Chalmers' 2025 federal budget marks a significant departure from previous robust commitments to cybersecurity, sparking concerns about Australia's cyber resilience. With notable investments like REDSPICE and the 2023–2030 Cybersecurity Strategy now in the past, questions arise about maintaining momentum amid escalating cyber threats.

Overcoming the Social Media Fraud Challenge with Graph Databases
Every year, organisations and consumers alike lose billions of dollars to online scams. Busting fraud and protecting users is all about finding and investigating the connections between various online entities, and modern technologies are helping to do so. Operating like a master detective, graph technology is capable of mapping patterns and ...

Microsoft’s Platforms and Services Prioritise Security from Inception, Rather than as an Afterthought
Overview
Microsoft’s long-standing Executive, Bret Arsenault, Corporate Vice President and Chief Cybersecurity advisor at Microsoft, detailed Microsoft’s Secure Future Initiative (SFI) - their strategic approach to addressing emerging cyber threats and managing secure software development.
With decades of experience at Microsoft, what Arsenault ...
No results found.
In The News
LevelBlue to Acquire Cybereason, Expanding Global Leadership in Managed Detection and Response, XDR, Incident Response, and Threat Intelligence
Acquisition strengthens LevelBlue’s position as the world’s largest pure-play managed security service provider (MSSP); adds investment from SoftBank Corp., SoftBank Vision Fund 2, and Liberty Strategic Capital
Tenable Cloud Security Completed IRAP Assessment at the PROTECTED Level and cites largest Patch Tuesday release to date
Australian government agencies can now confidently deploy Tenable Cloud Security following its assessment against PROTECTED level controls under the IRAP framework.
Cloudflare Integrates Services with Oracle Cloud Infrastructure to Help Customers Supercharge Applications and AI Workloads
Integration enables businesses to run faster and more securely across cloud environments
Boomi Recognised as a Leader in the 2025 Gartner® Magic Quadrant™ for API Management
Boomi’s recognition as a Leader in API management reflects its execution and vision
Exabeam Named a Leader in the 2025 Gartner Magic Quadrant for SIEM for the Sixth Time
ROOMFIELD, Colo. & FOSTER CITY, Calif. – October 13, 2025 – Exabeam, a global leader in intelligence and automation that powers security operations, today announced it has been named a Leader in the 2025 Gartner® Magic Quadrant™ for Security Information and Event Management (SIEM). This marks the sixth time that Exabeam has been recognised by ...
Datadog Announces Expanded Offerings for Oracle Cloud Infrastructure
New integrations for Cloud Cost Management, GPU Monitoring and Cloud SIEM help teams gain full-stack visibility and security across their OCI environments, including AI and machine learning applications
Gen Z Staff Lead Workplace AI Adoption Despite Job Fears – Microsoft Australia Study
Gen Z workers are enthusiastically embracing AI at work – and doing so with cautious optimism – according to a new Microsoft Australia study.
DroneShield Releases RfPatrol-Plugin for the TAK Ecosystem
DroneShield today announced the release of its RfPatrol-Plugin for the Team Awareness Kit (TAK) ecosystem, now available for RfPatrol Mk2 users via the DroneShield Access Portal. The plugin integrates DroneShield’s counter-drone intelligence directly into the civilian TAK command-and-control (C2) environment, supplementing existing data streams, gRPC ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
