The Voice of Cyberยฎ
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
Protecting Your Heart and Wallet Against Phishing This Valentine’s Day
Phishing attacks, the most common form of social engineering, manipulate users into divulging sensitive information or clicking malicious links. With the rise of AI tools like ChatGPT, these scams have become more sophisticated, leveraging fake domains and chatbots to mimic legitimate entities or even potential romantic partners.
Chinaโs Cyber Revenge | Why the PRC Fails to Back Its Claims of Western Espionage
Why the PRC Fails to Back Its Claims of Western Espionage:
China launched an offensive media strategy to push narratives around US hacking operations following a joint statement by the US, UK, and EU in July 2021 about Chinaโs irresponsible behavior in cyberspace.
Some PRC cybersecurity companies now coordinate report publication with government ...
The Future of CISOs: Navigating Trends and Evolving Roles
With escalating cyber threats and data breaches, the need for effective cybersecurity leadership and measures has never been more important. The increasing trend of cyber criminality has placed the responsibility of Chief Information Security Officers (CISO) in the spotlight, and the role of the CISO is increasingly critical. With the rapid advancement ...
Pervasive OT and IoT Network Anomalies Raise Red Flags as Threats to Critical Infrastructure Become More Sophisticated
The latest Nozomi Networks Labs OT & IoT Security Report released today finds that network anomalies and attacks were the most prevalent threat to operational technology (OT) and internet of things (IoT) environments. Vulnerabilities within critical manufacturing also surged 230% โย a cause for concern as threat actors have far more opportunities to ...
HijackLoader Expands Techniques to Improve Defense Evasion
CrowdStrike researchers have identified a HijackLoader (aka IDAT Loader) sample that employs sophisticated evasion techniques to enhance the complexity of the threat. Think of loaders like wolves in sheep clothing. Their purpose is to sneak in, introduce and execute more sophisticated threats and tools. Our research revealed that this recent variant of ...
Boosting Confidence In Ransomware Recovery
The safeguarding of digital assets is an ongoing, uphill battle. This fight is made harder still by the gaps in cyber resilience policies and the alarming lack of confidence in ransomware recovery. The need for boosted recovery confidence underscores the importance of addressing these challenges to fortify organisations against the rising tide of ...
Video Killed the Security Star
Exploring the overlooked risk of sensitive info leaks in videos, with examples of real-world breaches like password exposures and crypto key losses.
Sophos Report Reveals 86 Per Cent Of Cybersecurity And IT Professionals In Australia Are Impacted By Burnout And Fatigue
Sophos, a global leader in innovating and delivering cybersecurity as a service, released the findings of its fourth โThe Future of Cybersecurity in Asia Pacific and Japanโ report in collaboration with Tech Research Asia (TRA). The report found that 86 per cent of Australian respondents in cybersecurity and IT roles are impacted by burnout and ...
In The News
Tecala Announces Security Operations Partnership with Arctic Wolf in Australia
Security Operations Leader Arctic Wolf will Provide Tecala Customers Industry-Leading Capabilities to Tackle the Increasing Dangers of Advanced Cyberattacks
Alex Trafton Takes Out New Title With G42 As Senior Vice President
The appointment of Alex Trafton as Senior Vice President, Technology Risk Management, G42 marks a new leaf for both the Executive and G42. His expertise in cybersecurity combined with his strategic vision promises to drive forward innovative solutions that address contemporary challenges. Trafton based out of California in the United States will be ...
Check Point Software Named a Leader in Enterprise Firewall Solutions Evaluation, According to Independent Research Firm
Check Point excels with collaborative tools, and received the highest possible score in 13 criteria, including Vision, Innovation, and Threat Intelligenceย ย ย
Forescout Finds 14 Vulnerabilities in Popular DrayTek Routers Affecting Hundreds of Thousands of Exposed Devices Globally
Forescout today published the โDRAY:BREAKโ Research Report. The report identifies 14 previously unknown vulnerabilities in routers manufactured by DrayTek, a Taiwanese networking equipment manufacturer, including one with the highest possible severity rating of 10. If left unaddressed, attackers could gain full control over these devices, opening the ...
The 2024 Elastic Global Threat Report: Basic Security Settings Are Easily Exploited by Adversaries
Off-the-shelf offensive security tools and poorly configured cloud environments create openings in the attack surface
CrowdStrike Expands CrowdStrike Marketplace to Meet Growing Demand for Integrated Cybersecurity Solutions
In its first year, CrowdStrike Marketplace expanded to over 260 listings from 140 partners, adding strategic resellers to help global customers seamlessly discover, try and buy industry-leading third-party solutions integrated with the Falcon platform
Obsidian Security Launches New Australian Data Centre Built on AWS to Strengthen Customer Data Sovereignty
Sydney, Australia, October 2, 2024 - Obsidian Security, the leader in SaaS Security, is proud to support the data sovereignty goals of its Australian customers and extend its reach into the Asia-Pacific region with the launch of a new data centre in Sydney, Australia. Built on Amazon Web Services (AWS), the new platform region is now available, giving ...
SolarWinds Closes the Marketโs Hybrid IT Observability Gap, Accelerating Transformations for Customers
The next generation of SolarWinds Observability delivers innovative and comprehensive full-stack visibility across all IT environmentsโon-premises, cloud, or hybridโwith flexible self-hosted and SaaS deployment options
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..