The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
Enhancing And Democratising DevSecOps With Generative AI And ClickOps
While still nascent, generative AI and no-code ClickOps solutions show immense promise for augmenting and spreading DevSecOps capabilities more widely in 2024, enabling enhanced delivery, and scalability across critical systems.
Protecting Your Heart and Wallet Against Phishing This Valentine’s Day
Phishing attacks, the most common form of social engineering, manipulate users into divulging sensitive information or clicking malicious links. With the rise of AI tools like ChatGPT, these scams have become more sophisticated, leveraging fake domains and chatbots to mimic legitimate entities or even potential romantic partners.
China’s Cyber Revenge | Why the PRC Fails to Back Its Claims of Western Espionage
Why the PRC Fails to Back Its Claims of Western Espionage:
China launched an offensive media strategy to push narratives around US hacking operations following a joint statement by the US, UK, and EU in July 2021 about China’s irresponsible behavior in cyberspace.
Some PRC cybersecurity companies now coordinate report publication with government ...
The Future of CISOs: Navigating Trends and Evolving Roles
With escalating cyber threats and data breaches, the need for effective cybersecurity leadership and measures has never been more important. The increasing trend of cyber criminality has placed the responsibility of Chief Information Security Officers (CISO) in the spotlight, and the role of the CISO is increasingly critical. With the rapid advancement ...
Pervasive OT and IoT Network Anomalies Raise Red Flags as Threats to Critical Infrastructure Become More Sophisticated
The latest Nozomi Networks Labs OT & IoT Security Report released today finds that network anomalies and attacks were the most prevalent threat to operational technology (OT) and internet of things (IoT) environments. Vulnerabilities within critical manufacturing also surged 230% – a cause for concern as threat actors have far more opportunities to ...
HijackLoader Expands Techniques to Improve Defense Evasion
CrowdStrike researchers have identified a HijackLoader (aka IDAT Loader) sample that employs sophisticated evasion techniques to enhance the complexity of the threat. Think of loaders like wolves in sheep clothing. Their purpose is to sneak in, introduce and execute more sophisticated threats and tools. Our research revealed that this recent variant of ...
Boosting Confidence In Ransomware Recovery
The safeguarding of digital assets is an ongoing, uphill battle. This fight is made harder still by the gaps in cyber resilience policies and the alarming lack of confidence in ransomware recovery. The need for boosted recovery confidence underscores the importance of addressing these challenges to fortify organisations against the rising tide of ...
Video Killed the Security Star
Exploring the overlooked risk of sensitive info leaks in videos, with examples of real-world breaches like password exposures and crypto key losses.
In The News
New CrowdStrike Partnerships Accelerate Adoption Of Industry-Leading Falcon Threat Intelligence
AUSTIN, Texas – October 8, 2024 — CrowdStrike (NASDAQ: CRWD) today announced new strategic partnerships with CardinalOps, Nagomi Security and Veriti to deliver intelligence-led threat defense across the enterprise.
Intelligence-led decision making is crucial to effective cybersecurity. With security teams often using a wide range of solutions—each ...
Tenable Research Finds 74% of Organisations Have Publicly Exposed Storage Assets, Increasing Risk of Ransomware Attacks
The Tenable Cloud Risk Report 2024, published today, reveals that a staggering 74% of organisations have publicly exposed storage assets, including those containing sensitive data, making them vulnerable to ransomware attacks. This exposure is often caused by unnecessary or excessive permissions, granting wider access to cloud-stored information than ...
From AustCyber to ACN: A New Era of Cyber Security Collaboration and Innovation for Australia
Canberra, 9 October 2024 – Over 94,000 cybercrime incidents were reported in Australia last financial year. Equivalent to one every six minutes and with the Australian Signals Directorate contacting businesses 620 times during this period to warn of potential threats, can you believe 280 of those calls went unanswered.
Something needs to change in ...
Tecala Announces Security Operations Partnership with Arctic Wolf in Australia
Security Operations Leader Arctic Wolf will Provide Tecala Customers Industry-Leading Capabilities to Tackle the Increasing Dangers of Advanced Cyberattacks
Alex Trafton Takes Out New Title With G42 As Senior Vice President
The appointment of Alex Trafton as Senior Vice President, Technology Risk Management, G42 marks a new leaf for both the Executive and G42. His expertise in cybersecurity combined with his strategic vision promises to drive forward innovative solutions that address contemporary challenges. Trafton based out of California in the United States will be ...
Check Point Software Named a Leader in Enterprise Firewall Solutions Evaluation, According to Independent Research Firm
Check Point excels with collaborative tools, and received the highest possible score in 13 criteria, including Vision, Innovation, and Threat Intelligence
Forescout Finds 14 Vulnerabilities in Popular DrayTek Routers Affecting Hundreds of Thousands of Exposed Devices Globally
Forescout today published the “DRAY:BREAK” Research Report. The report identifies 14 previously unknown vulnerabilities in routers manufactured by DrayTek, a Taiwanese networking equipment manufacturer, including one with the highest possible severity rating of 10. If left unaddressed, attackers could gain full control over these devices, opening the ...
The 2024 Elastic Global Threat Report: Basic Security Settings Are Easily Exploited by Adversaries
Off-the-shelf offensive security tools and poorly configured cloud environments create openings in the attack surface
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..