The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Your Secrets Aren’t Safe – Frightening Flaws in Modern Messaging Apps

Your Secrets Aren’t Safe – Frightening Flaws in Modern Messaging Apps

Imagine pouring your country’s most sensitive secrets into a messaging app you downloaded for free. Now imagine those messages in the hands of your adversary. Sounds far-fetched? Not according to David Wiseman, VP of Secure Communications at BlackBerry, who warns that governments, businesses, and everyday people alike are hurtling towards a ...
From Gallipoli to the Digital Frontier: The ANZAC Spirit in Cybersecurity

From Gallipoli to the Digital Frontier: The ANZAC Spirit in Cybersecurity

Context As dawn breaks on ANZAC Day, Australians and New Zealanders pause to remember the sacrifices of the soldiers who stormed the beaches of Gallipoli in 1915. However, in a hyperconnected 21st-century world, the fight for national sovereignty has shifted from trenches and shores to servers and silicon. Today, a new generation of defenders stands ...
The Shadowy Threats Stalking Australia’s Ballot Box

The Shadowy Threats Stalking Australia’s Ballot Box

As Australia edges toward another election, a new and invisible threat stalks our democratic process, not from hackers in dark rooms, but from sophisticated, well-funded nation states wielding artificial intelligence. According to Ginny Badanes, General Manager of Democracy Forward at Microsoft, 2024 has seen democracy itself placed in the ...
How Adopting Maturity Models Can Improve Enterprise IT Security

How Adopting Maturity Models Can Improve Enterprise IT Security

Having developers well trained in security techniques is vital for the production of resilient code. Taking time to achieve this now can avoid significant disruption and losses in the future.
Why Web Application Firewalls are a Critical Shield for Fintech Security

Why Web Application Firewalls are a Critical Shield for Fintech Security

The implementation of AI-driven, cloud-native WAF solutions offers financial institutions a robust defence mechanism against cyber threats.
The Real Corporate Penetration Testing Process: How Companies Get Hacked Before The Hackers Do! 🚀

The Real Corporate Penetration Testing Process: How Companies Get Hacked Before The Hackers Do! 🚀

Hey guys, I’m sn0x — a cybersecurity researcher, bug hunter, and security enthusiast. I hold multiple certifications, including CNSP, EWPTXv2, CEH v11–12, GRC, RHCSA, and Cisco Cyber Threat Management. I’ve been ranked #1 in India and #2 globally on TryHackMe, secured #134 on Hack The Box in 2021, and even won HTB Battlegrounds twice. But hey, this ...
What in the DeepSeek?

What in the DeepSeek?

DeepSeek, the tool designed to exploit vulnerabilities in AI systems, raises significant concerns amongst the security industry, particularly OpenAI. The DeepSeek competitor discussed the potential for DeepSeek to undermine the security of AI applications, which could have far-reaching consequences for technology as we know it. Satnam Narang, Senior ...
AI First, Human Second: The New Cybersecurity Command Structure

AI First, Human Second: The New Cybersecurity Command Structure

"Man is the measure of all things." ― Protagora - pre-Socratic Greek philosopher It’s an ancient idea, yet it feels more relevant than ever as machines start making decisions that were once left to human minds. In today’s high-stakes cybersecurity landscape, artificial intelligence is no longer a future wager; it’s a frontline asset. AI systems detect ...
No results found.

In The News

Microsoft and ACTU Sign Landmark Agreement to Put Workers’ Voices and Skilling at the Heart of Australia’s AI Transformation

Microsoft and ACTU Sign Landmark Agreement to Put Workers’ Voices and Skilling at the Heart of Australia’s AI Transformation

Microsoft Australia and the Australian Council of Trade Unions (ACTU) today announced a landmark Framework Agreement to prioritise skilling and elevate workers’ voices in the design, development and deployment of artificial intelligence (AI) across Australian workplaces. This Australian-first agreement outlines a set of commitments that recognise the ...
Threat Spotlight: The number of phishing kits doubled in 2025, bringing stealth, innovation and the same old themes 

Threat Spotlight: The number of phishing kits doubled in 2025, bringing stealth, innovation and the same old themes 

SYDNEY, Australia – 13 January 2026 – In 2025, the number of known phishing-as-a-service (PhaaS) kits doubled in number, increasing the pressure on security teams trying to defend against this ever-evolving threat, according to Barracuda’s phishing review of 2025. Aggressive newcomers such as Whisper 2FA and GhostFrame introduced inventive ...
Nozomi Networks Announces Major Investment in Singapore

Nozomi Networks Announces Major Investment in Singapore

Nozomi Networks, the leader in OT, IoT and CPS security, today announced it has established its new Asia Pacific & Japan headquarters in Singapore. The company chose Singapore as its regional headquarters as its location and skilled workforce will enable Nozomi to accelerate innovation and provide enhanced local support to a growing customer ...
Infoblox Expands Its Preemptive Security Offering to Combat Brand Abuse, Credential Exposure and External Threats with Planned Acquisition of Axur

Infoblox Expands Its Preemptive Security Offering to Combat Brand Abuse, Credential Exposure and External Threats with Planned Acquisition of Axur

Infoblox, a leader in hybrid, multi-cloud networking and preemptive security, today announced that it has entered into a definitive agreement to acquire Axur, a global provider of AI-powered security solutions that protect businesses from a wide range of threats beyond the perimeter. This planned acquisition is subject to regulatory approvals and ...
Rapid7 and ARMO Enable Organisations to Stop Cloud Attacks Earlier with Runtime Security

Rapid7 and ARMO Enable Organisations to Stop Cloud Attacks Earlier with Runtime Security

Rapid7 has announced a new partnership with ARMO to bring full cloud and application runtime security to the Command Platform,
NinjaOne Announced as Official Endpoint Management Partner for Audi Revolut F1 Team

NinjaOne Announced as Official Endpoint Management Partner for Audi Revolut F1 Team

NinjaOne has announced a new multi-year partnership with Audi Revolut F1 Team, who named NinjaOne as the team’s official endpoint management, mobile device management, and SaaS backup partner, as the team continues to build the foundations of its Formula 1 program ahead of its debut in the FIA Formula One World Championship in March. As ...
ColorTokens Achieves FedRAMP® Moderate Authorization, Accelerating Secure Zero Trust Adoption Across Federal Agencies

ColorTokens Achieves FedRAMP® Moderate Authorization, Accelerating Secure Zero Trust Adoption Across Federal Agencies

Xshield Now Listed on the FedRAMP Marketplace, Expanding Access to Zero Trust Microsegmentation for Federal Agencies
CrowdStrike and Nord Security Announce Strategic Partnership to Redefine SMB Cybersecurity

CrowdStrike and Nord Security Announce Strategic Partnership to Redefine SMB Cybersecurity

The partnership combines Nord Security’s secure access and credential management solutions with the CrowdStrike Falcon platform, delivering enterprise-grade protection that’s simple, accessible, and built for every business
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This