The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

WTF is Happening in Tech?

WTF is Happening in Tech?

In the latest episode of the DevSecOops podcast, hosts Tom Walker and Scott Fletcher discussed three of the most talked about topics in enterprise IT including Kubernetes, the March 2025 Oracle Cloud security breach, and how AI is reshaping both productivity and cybersecurity. Kubernetes - Necessary Evolution or Needless Complexity? Tom did not ...
Computer Emergency Response Teams and Their Critical Role in Protecting Australian Digital Assets

Computer Emergency Response Teams and Their Critical Role in Protecting Australian Digital Assets

Computer Emergency Response Teams (CERTs) are the unsung heroes of cybersecurity. There are many myths about their role and function. Contrary to popular belief they don’t certify cybersecurity professionals, and many don’t do emergency response.  Operating in the background, CERTs provide vital functions in anticipating and reducing the impact of ...
Don’t Let Generative AI And LLMs Become A Third-Party Vulnerability

Don’t Let Generative AI And LLMs Become A Third-Party Vulnerability

As Large language models (LLMs) are increasingly being embedded into software development, organisations must ensure they understand the cyber security risks that come with it. Developer tools that have generative AI capability integrated to assist developers when writing code are on the rise. But the LLMs they rely on could be altered by threat actors.  
Creating Infrastructure Foundations For A Scalable Future

Creating Infrastructure Foundations For A Scalable Future

Meeting the complex demands of the future - including GenAI and ML - starts with getting ‘Network As a Service’ (NaaS) fundamentals right - right now.
The Cybersecurity Paradox: Mastering a Game That Has Already Changed

The Cybersecurity Paradox: Mastering a Game That Has Already Changed

For decades, enterprises have invested billions into mastering the art of cybersecurity firewalls, antivirus programs, perimeter defenses, and compliance checklists. Many have grown adept, even excellent, at these measures. However, excellence is a moving target in a world of relentless digital transformation. What if the tools we have perfected are no ...
How Unchecked Third-Party Access is Undermining Supply Chains

How Unchecked Third-Party Access is Undermining Supply Chains

As supply chains continue to evolve, so too must the frameworks that secure them. In an era where every digital interaction carries risk, identity is not just a technical concern: it’s the foundation of trust in the modern enterprise.
Why Securing Digital Identities Is Now a Business-Wide Imperative

Why Securing Digital Identities Is Now a Business-Wide Imperative

In the face of rising cyber risks, businesses that embed identity security into the fabric of their cybersecurity strategy will be better positioned to defend against attacks, protect data, and ensure operational resilience.
The Top Cyber Movies that Shaped our View for Better or for Worse?

The Top Cyber Movies that Shaped our View for Better or for Worse?

From flickering CRT monitors to sophisticated cyber heists, the proliferation of cyber films that mirrors our growing anxiety and fascination with life online. Hollywood has long toyed with the tension between human curiosity and digital dystopia. While some cyber films exaggerate for dramatic flair, others eerily foreshadow real world breaches, hacks, ...
No results found.

In The News

LABYRINTH CHOLLIMA Evolves into Three Adversaries

LABYRINTH CHOLLIMA Evolves into Three Adversaries

LABYRINTH CHOLLIMA has evolved into three distinct adversaries with specialized malware, objectives, and tradecraft: GOLDEN CHOLLIMA and PRESSURE CHOLLIMA now likely operate separately from the core LABYRINTH CHOLLIMA group. GOLDEN CHOLLIMA and PRESSURE CHOLLIMA target cryptocurrency entities and are distinguished by the scale and scope of their ...
New ISACA Study: Privacy Teams Are Shrinking, Increasingly Stressed

New ISACA Study: Privacy Teams Are Shrinking, Increasingly Stressed

ISACA’s 2026 State of Privacy survey report warns privacy risk is becoming a broader business issue as privacy resources tighten across the region.
DigiCert Releases Q4 2025 RADAR Brief

DigiCert Releases Q4 2025 RADAR Brief

Heavy demand for online content and growing cyber threats defined the end of 2025 
New Motorola Solutions AI Offerings Help Public Safety Agencies Reclaim Hours Every Day

New Motorola Solutions AI Offerings Help Public Safety Agencies Reclaim Hours Every Day

Motorola Solutions has announced the launch of Assist Suites, a portfolio of role-based AI for public safety solutions designed to deliver the right intelligence to the right person at the right time. Assist Suites synthesise multiple sources of data from across an agency – 911 audio, body and in-car camera footage, radio transcripts and more – into a ...
xReality Group (ASX:XRG) Quarterly Activities Report

xReality Group (ASX:XRG) Quarterly Activities Report

xReality Group (ASX:XRG) has announced its Quarterly Activities Report and Appendix 4C for the quarter ending 31st December 2025, together with an Operational Update. Key Highlights: Highest Cash Receipts to date $7.4m in Q2 (up 85% QoQ) $11.4m YTD (up 20% PcP) Net Cash from Operations $3.1m Global Individual Agencies ...
Mandiant Warns of Active ShinyHunters Vishing Campaign Targeting Enterprise Identity Systems

Mandiant Warns of Active ShinyHunters Vishing Campaign Targeting Enterprise Identity Systems

Mandiant, part of Google, is warning organisations of an active and ongoing cybercrime campaign attributed to actors operating under the ShinyHunters name, leveraging advanced voice phishing (vishing) techniques to compromise enterprise identity environments. Mandiant has observed attackers using evolved social engineering methods to successfully ...
LevelBlue and Fortra Launch Strategic Managed Services Partnership to Accelerate Cybersecurity Innovation

LevelBlue and Fortra Launch Strategic Managed Services Partnership to Accelerate Cybersecurity Innovation

Strategic partnership includes LevelBlue's acquisition of Fortra's Alert Logic Managed Detection and Response business, strengthening LevelBlue's position as a global MDR leader
New Global CDO Report Shows That Closing Skills and Data Governance Gaps is Critical to Australia’s AI Success

New Global CDO Report Shows That Closing Skills and Data Governance Gaps is Critical to Australia’s AI Success

Informatica from Salesforce, a leader in AI-powered cloud data management, has published a new global study revealing that while Australian organisations are rapidly accelerating their use of AI, many lack the data skills, governance frameworks and infrastructure needed to support responsible and scalable AI.   The study, which surveyed 600 global ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This