The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Account Takeover Attacks on Social Media: A Rising Threat for Content Creators and Influencers

Account Takeover Attacks on Social Media: A Rising Threat for Content Creators and Influencers

In 2024 and continuing into 2025, social media platforms were prime targets for cybercriminals, with content creators facing the brunt of the malicious attacks, including a surge in account takeovers, malicious live streams, and sophisticated phishing campaigns. Bitdefender Labs has been at the forefront in analysing these threats, and the numbers ...
The Growing Nexus of Cyber Security and Financial Warfare – An Australian’s Perspective

The Growing Nexus of Cyber Security and Financial Warfare – An Australian’s Perspective

Opening Remarks Sadly, it has become an undeniable reality that the traditional boundaries between conventional warfare and economic statecraft are rapidly dissolving. Cyber security and financial warfare have evolved into critical instruments of geopolitical influence and power projection, with significant implications for nations like Australia. The ...
Security Is An Arms Race, and The Bad Guys Are Two Steps Ahead

Security Is An Arms Race, and The Bad Guys Are Two Steps Ahead

Cloud environments are a notorious ransomware attack hot spot. It’s a calculated strategy on the part of the cybercriminals. As the old adage goes, ‘follow the money’, and that’s exactly what they’re doing. Predictions suggest cloud infrastructure spend will reach over US$135 billion in 2026, accounting for over 67 per cent of total compute and ...
The Challenges of Underfunding Data Teams: How Data Drives AI and Security

The Challenges of Underfunding Data Teams: How Data Drives AI and Security

This article delves into the critical role of data teams in supporting AI and security initiatives within organisations. It highlights the challenges that arise from underfunding these teams, emphasising the importance of data quality, governance, and management. The piece explores the imbalance in budget allocation, potential risks, and inefficiencies ...
Google’s Acquisition of Wiz Signals a Shift in Cloud Security

Google’s Acquisition of Wiz Signals a Shift in Cloud Security

The cloud security landscape is facing a seismic shift. With Google’s recent acquisition of Wiz, one of the industry’s most prominent cloud security providers, many in the industry are considering the implications of cloud providers also serving as vendors. Organisations operating in multi-cloud and hybrid environments must carefully evaluate how these ...
Super Fund Hacks: Are We Seeing Warning Signs or the Full Crisis?

Super Fund Hacks: Are We Seeing Warning Signs or the Full Crisis?

Australia faces another significant cybersecurity breach, this time targeting superannuation funds managing trillions in retirement savings. This attack highlights a severe erosion of public trust and underscores the gap between Australia's ambitious cybersecurity goals and actual readiness. Discover how lax security protocols, regulatory shortcomings, ...
Microsoft’s Cybersecurity Vet to Vendor Visionary

Microsoft’s Cybersecurity Vet to Vendor Visionary

Tech giant, Microsoft, is heavily focused on building long-term trust with customers and re-establishing how cybersecurity leaders engage with the company. Mick Dunne, Chief Security Adviser for Asia Pacific at Microsoft, shared insights into the newly established Customer Security Officer (CSO) team, a strategic initiative. Dunne, who transitioned ...
How Organisations Can Achieve Secure-By-Design By 2030

How Organisations Can Achieve Secure-By-Design By 2030

Secure-by-design is no longer a futuristic ideal - it is an imperative for organisations aiming to fortify their cybersecurity defences by 2030. Achieving this transformation requires leadership commitment, developer education, and a shift in corporate culture.
No results found.

In The News

Darktrace Brings Industry First Endpoint Visibility And Enhanced Agentic AI To ActiveAI Security Platform™, Closing The Gaps In Cyber Defences

Darktrace Brings Industry First Endpoint Visibility And Enhanced Agentic AI To ActiveAI Security Platform™, Closing The Gaps In Cyber Defences

These innovations provide a new level of understanding across an organisation’s digital footprint, enabling security teams to close the seams attackers exploit as they cross IT domain boundaries, stop emerging threats and act with the speed, context, and confidence needed to stay ahead of attackers.
New Report: Indo-Pacific Faces Growing AI Risks in Critical Infrastructure

New Report: Indo-Pacific Faces Growing AI Risks in Critical Infrastructure

Study Calls for cross-sector collaboration to safely scale AI without slowing innovation
Oracle Database@Google Cloud is Now Available in Australia

Oracle Database@Google Cloud is Now Available in Australia

Powerful multicloud database service will help customers in Australia improve analytics and AI productivity, support data hosting residency regulations, and accelerate IT modernisation | Oracle Exadata Database Service on Dedicated Infrastructure will be the first Oracle Database@Google Cloud service supported | Industry-first reseller program enables ...
Bitdefender and CYPFER Partner to Deliver End-to-End Cyber Resilience for Businesses Throughout the Entire Attack Lifecycle

Bitdefender and CYPFER Partner to Deliver End-to-End Cyber Resilience for Businesses Throughout the Entire Attack Lifecycle

Partnership Combines Bitdefender Solutions and Advanced Incident Response Expertise to Deliver Comprehensive Protection, Rapid Response, and Recovery for Organisations of Any Size
Updog.ai Unleashed: Public, Real-time Provider Status from Datadog

Updog.ai Unleashed: Public, Real-time Provider Status from Datadog

When external SaaS providers or cloud services degrade or go down, engineers often find themselves wondering if the issue they're encountering is local or more widespread. The answers they find are usually slow to surface, limited in detail, or entirely dependent on the provider's updates. Vendor-controlled status pages and third-party aggregators ...
DroneShield Expands Airspace Security with ADS-B Integration into its DroneSentry-C2 Software

DroneShield Expands Airspace Security with ADS-B Integration into its DroneSentry-C2 Software

Dual-band ADS-B reception enhances airspace safety awareness, supporting mixed-domain operations
New Rubrik Agent Cloud Simplifies Enterprise AI Deployment at Scale

New Rubrik Agent Cloud Simplifies Enterprise AI Deployment at Scale

• Industry's first solution to enable organisations to adopt agents at scale with the ability to monitor, govern and remediate • Discovers agents built on platforms such as OpenAI, Microsoft Copilot Studio, and Amazon Bedrock to provide a single pane of glass for AI operations • Where most tools stop at observability, only Rubrik empowers organisations ...
Mobile Danger Zone: AI-Powered Attacks and Human Error Create “Perfect Storm” for Organisations

Mobile Danger Zone: AI-Powered Attacks and Human Error Create “Perfect Storm” for Organisations

Verizon’s 2025 Mobile Security Index (MSI) reveals how AI-powered threats and human error are converging to reshape mobile risk across every sector — from government and enterprise to manufacturing and SMBs.
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This