The Voice of Cyberยฎ

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Chinaโ€™s Cyber Revenge | Why the PRC Fails to Back Its Claims of Western Espionage

Chinaโ€™s Cyber Revenge | Why the PRC Fails to Back Its Claims of Western Espionage

Why the PRC Fails to Back Its Claims of Western Espionage: China launched an offensive media strategy to push narratives around US hacking operations following a joint statement by the US, UK, and EU in July 2021 about Chinaโ€™s irresponsible behavior in cyberspace. Some PRC cybersecurity companies now coordinate report publication with government ...
The Future of CISOs: Navigating Trends and Evolving Roles

The Future of CISOs: Navigating Trends and Evolving Roles

With escalating cyber threats and data breaches, the need for effective cybersecurity leadership and measures has never been more important. The increasing trend of cyber criminality has placed the responsibility of Chief Information Security Officers (CISO) in the spotlight, and the role of the CISO is increasingly critical. With the rapid advancement ...
Pervasive OT and IoT Network Anomalies Raise Red Flags as Threats to Critical Infrastructure Become More Sophisticated

Pervasive OT and IoT Network Anomalies Raise Red Flags as Threats to Critical Infrastructure Become More Sophisticated

The latest Nozomi Networks Labs OT & IoT Security Report released today finds that network anomalies and attacks were the most prevalent threat to operational technology (OT) and internet of things (IoT) environments. Vulnerabilities within critical manufacturing also surged 230% โ€“ย a cause for concern as threat actors have far more opportunities to ...
HijackLoader Expands Techniques to Improve Defense Evasion

HijackLoader Expands Techniques to Improve Defense Evasion

CrowdStrike researchers have identified a HijackLoader (aka IDAT Loader) sample that employs sophisticated evasion techniques to enhance the complexity of the threat. Think of loaders like wolves in sheep clothing. Their purpose is to sneak in, introduce and execute more sophisticated threats and tools. Our research revealed that this recent variant of ...
Boosting Confidence In Ransomware Recovery

Boosting Confidence In Ransomware Recovery

The safeguarding of digital assets is an ongoing, uphill battle. This fight is made harder still by the gaps in cyber resilience policies and the alarming lack of confidence in ransomware recovery. The need for boosted recovery confidence underscores the importance of addressing these challenges to fortify organisations against the rising tide of ...
Video Killed the Security Star

Video Killed the Security Star

Exploring the overlooked risk of sensitive info leaks in videos, with examples of real-world breaches like password exposures and crypto key losses.
Sophos Report Reveals 86 Per Cent Of Cybersecurity And IT Professionals In Australia Are Impacted By Burnout And Fatigue

Sophos Report Reveals 86 Per Cent Of Cybersecurity And IT Professionals In Australia Are Impacted By Burnout And Fatigue

Sophos, a global leader in innovating and delivering cybersecurity as a service, released the findings of its fourth โ€œThe Future of Cybersecurity in Asia Pacific and Japanโ€ report in collaboration with Tech Research Asia (TRA). The report found that 86 per cent of Australian respondents in cybersecurity and IT roles are impacted by burnout and ...
Compliance and Security: The AI-Powered Identity Revolution

Compliance and Security: The AI-Powered Identity Revolution

The cyber security landscape is grappling with an expanding attack vector as the rise in identities from digitisation has exposed organisations to increased vulnerabilities. The challenge is most organisations havenโ€™t yet implemented a comprehensive identity security strategy to help manage the access for hundreds to thousands of identities, with ...

In The News

Tenable Enhances Nessus Risk Prioritisation To Help Customers Expose And Close Exposures – Integration of EPSS Into Tenable Exposure Solutions Ensures Compliance And Accelerates Prioritisation Efforts

Tenable Enhances Nessus Risk Prioritisation To Help Customers Expose And Close Exposures – Integration of EPSS Into Tenable Exposure Solutions Ensures Compliance And Accelerates Prioritisation Efforts

Tenableยฎ, the exposure management company, today announced new risk prioritisation and compliance features forย Tenable Nessus, the #1 vulnerability assessment solution in accuracy, coverage and adoption. Nessus supports new and updated vulnerability scoring systems โ€“ Exploit Prediction Scoring System (EPSS) and Common Vulnerability Scoring System ...
ManageEngine to Host CyberCon Roadshow 2024 In Australia And New Zealand

ManageEngine to Host CyberCon Roadshow 2024 In Australia And New Zealand

ManageEngine will provide deep insights on cybersecurity trends and IT management solutions
Veeam Expands Worldโ€™s #1 Data Resilience Solution For Microsoft 365

Veeam Expands Worldโ€™s #1 Data Resilience Solution For Microsoft 365

Already protecting 21 million Microsoft 365 users, Veeam Backup for Microsoft 365 v8 delivers comprehensive immutabilityย and enterprise-scale capabilities
Check Point Software Unveils New MSSP Portal For Partners: Vastly Simplifying Service Delivery And Ease Of Doing Business

Check Point Software Unveils New MSSP Portal For Partners: Vastly Simplifying Service Delivery And Ease Of Doing Business

Sydney, 4 September 2024 - Check Pointยฎ Software Technologies Ltd. (NASDAQ: CHKP), a leading cyber security platform provider of AI-powered, cloud delivered solutions, has unveiled its innovative Portal designed for both managed security service providers (MSSPs) and distributors. This platform significantly simplifies service delivery and enhances the ...
Perils In The Periphery – Forescout’s 2024 H1 Threat Review

Perils In The Periphery – Forescout’s 2024 H1 Threat Review

Forescout published its โ€œ2024H1 Threat Reviewโ€. The new report reviews the current state of vulnerabilities, threat actors, and ransomware attacks in the first half of 2024 and compares them to H1 2023. โ€œAttackers are looking for any weak point to breach IT, IoT, and OT devices, and organisations that donโ€™t know what they have connected to their ...
Fortinet Partners With Police Veterans Victoria To Offer Cybersecurity Training To Police Veterans

Fortinet Partners With Police Veterans Victoria To Offer Cybersecurity Training To Police Veterans

Fortinet reaffirms its commitment to train one million people in cybersecurity by 2026 through a first-of-its-kind partnership to equip Victoria Police veterans with essential cybersecurity skillsย 
F5 Collaborates With Intel To Simplify The Security And Delivery Of AI Services

F5 Collaborates With Intel To Simplify The Security And Delivery Of AI Services

Enhancing the protection and performance of enterprise AI inference solutions with F5 NGINX Plus, Intel OpenVINO, and Intel IPUs
Elastic Announces Open Source License For Elasticsearch And Kibana Source Code

Elastic Announces Open Source License For Elasticsearch And Kibana Source Code

OSI-approved AGPL license will be added for a subset of Elasticsearch and Kibana source code

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This