The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Exploiting Medical Devices: Attack Vectors, Cyber Threats, and Advanced Defense Mechanisms
Explore advanced strategies to protect medical devices from cyberattacks, ensuring patient safety and healthcare integrity.

What’s New in Microsegmentation in 2025
Know what microsegmentation vendors are offering in 2025 to boost zero trust strategies and counter advanced cyber threats.

The Four Horsemen of Emerging Tech: How Quantum Computing, AI, Blockchain, and Cybersecurity Are Shaping the Future
The convergence of Quantum Computing, AI, Blockchain, and Cybersecurity is redefining the technological landscape. These interconnected innovations are revolutionizing industries and reshaping digital trust, security, and efficiency. Understanding their relationships is crucial for future preparedness.

Bret Arsenault – CVP, Global Chief Security Advisor at Microsoft
Watch The Interview
Biography
Bret Arsenault is Microsoft's Chief Cybersecurity Advisor, responsible for advancing critical security initiatives and escalating impact across the entire Microsoft ecosystem: company, partners, customers, government agencies, and important communities. As Chief Information Security Officer for 14 years, Bret was ...

Under Attack: Exposing Upscale Hacktivist DDoS Tactics
This article explores the motives of hacktivist web-DDoS attacks on Australian assets, including government websites.

Benjamin Lamont & Helen Schneider – Australian Federal Police
Watch The Interview
Biography
Benjamin (Ben) Lamont is the Manager of Technology Strategy and Data for the Australian Federal Police. He is responsible for developing the AFP Technology Strategy and associated roadmaps to address capability gaps and opportunities. Ben also oversees the development and deployment of the AFP’s information management, ...

How to Outsmart Ransomware and Build Resilience Within Your Organisation
Ransomware is growing more dangerous every day. Strains like LockBit 3.0 are leading the attack, while other groups like Clop, BlackCat/ALPHV, and Royal are constantly changing their strategies to catch businesses off guard. These ransomware groups have evolved their tactics, shifting from single to double and even triple extortion models. For example, ...

The Strategic Transformation of IT: From Cost Center to Business Catalyst
The perception of IT has undergone a remarkable transformation in recent years. What was once viewed primarily as a cost centre has transformed into a pivotal force driving business innovation and market leadership. This shift hasn’t just been about changing mindsets—it's about tangible results. Research shows that digital leaders deliver average ...
No results found.
In The News
Tenable Analysis – Cisco Zero-day Vulnerabilities
Cisco published advisories and a supplemental post about three zero-day vulnerabilities, two of which were exploited in the wild by an advanced threat actor associated with the ArcaneDoor campaign. The two flaws, CVE-2025-20333 and CVE-2025-20362, when combined or “chained” together, would give an attacker full control over the vulnerable ...
Camelot Secure and DigiFlight Named Finalists in Three Categories within Maryland’s Cybersecurity Association 2025 Cybersecurity Awards
The recognition reflects Camelot Secure’s groundbreaking work advancing its Secure360 platform, which unifies cyber and physical security to meet the growing convergence challenge. Secure360 integrates AI, machine learning, and advanced threat intelligence to provide a proactive, holistic defense—helping enterprises and government clients protect ...
Darktrace Unveils Automated Forensics Capabilities in its ActiveAI Security Platform™ to Advance Hybrid and Multi-Cloud Security
Launch of Darktrace / Forensic Acquisition & Investigation™, the industry’s first truly automated cloud forensics solution, can cut investigation times from days to minutes
The launch comes amid a widening cloud security gap, with nearly 90% of surveyed organisations across the US and UK reporting that they suffered damage before they could contain ...
Proofpoint Secures Collaboration and Data in the Agentic Workspace with Industry-First Innovations
New solutions, including AI tools and intelligent agents, enable organizations to embrace the promise of AI while mitigating unprecedented risks
Cisco Announces Splunk and Australian Signals Directorate Joining Forces to Strengthen Australia’s Cyber Threat Intelligence Sharing
SYDNEY – September 25, 2025 – Today Cisco, the worldwide leader in networking and security, announced that Splunk has partnered with the Australian Signals Directorate (ASD) to deliver a new plug-in that integrates Splunk Enterprise Security with ASD’s Cyber Threat Intelligence Sharing (CTIS) platform. This integration allows Splunk customers who are ...
ShadowLeak and the Internet of Agents: The Next Frontier in AI Exploits
The September 2025 disclosure of ShadowLeak by Radware marks a turning point in the way the security community must think about artificial intelligence. This was not just another prompt injection. It was the first service-side, zero-click indirect prompt injection (IPI) against a widely deployed AI system—OpenAI’s ChatGPT. More importantly, it ...
Lenovo Launches New IT Infrastructure Solutions to Help Australian SMBs Scale
Lenovo announced new IT infrastructure solutions tailored to help small and medium businesses (SMBs) easily deploy, scale and leverage modern IT in the era of AI. The solutions are designed to accelerate growth and innovation from day one with pre-tested and validated bundles of servers, software and consumption-based pricing options that help growing ...
Secure Code Warrior Launches Industry-First AI Traceability to Enable Secure Developers and Supercharge Safe Productivity
New capabilities in SCW Trust Agent provide visibility and control over LLM usage for security leaders and CISOs
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
