The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Your Secrets Aren’t Safe – Frightening Flaws in Modern Messaging Apps
Imagine pouring your country’s most sensitive secrets into a messaging app you downloaded for free. Now imagine those messages in the hands of your adversary. Sounds far-fetched? Not according to David Wiseman, VP of Secure Communications at BlackBerry, who warns that governments, businesses, and everyday people alike are hurtling towards a ...

From Gallipoli to the Digital Frontier: The ANZAC Spirit in Cybersecurity
Context
As dawn breaks on ANZAC Day, Australians and New Zealanders pause to remember the sacrifices of the soldiers who stormed the beaches of Gallipoli in 1915. However, in a hyperconnected 21st-century world, the fight for national sovereignty has shifted from trenches and shores to servers and silicon. Today, a new generation of defenders stands ...

The Shadowy Threats Stalking Australia’s Ballot Box
As Australia edges toward another election, a new and invisible threat stalks our democratic process, not from hackers in dark rooms, but from sophisticated, well-funded nation states wielding artificial intelligence.
According to Ginny Badanes, General Manager of Democracy Forward at Microsoft, 2024 has seen democracy itself placed in the ...

How Adopting Maturity Models Can Improve Enterprise IT Security
Having developers well trained in security techniques is vital for the production of resilient code. Taking time to achieve this now can avoid significant disruption and losses in the future.

Why Web Application Firewalls are a Critical Shield for Fintech Security
The implementation of AI-driven, cloud-native WAF solutions offers financial institutions a robust defence mechanism against cyber threats.

The Real Corporate Penetration Testing Process: How Companies Get Hacked Before The Hackers Do! 🚀
Hey guys, I’m sn0x — a cybersecurity researcher, bug hunter, and security enthusiast. I hold multiple certifications, including CNSP, EWPTXv2, CEH v11–12, GRC, RHCSA, and Cisco Cyber Threat Management. I’ve been ranked #1 in India and #2 globally on TryHackMe, secured #134 on Hack The Box in 2021, and even won HTB Battlegrounds twice.
But hey, this ...

What in the DeepSeek?
DeepSeek, the tool designed to exploit vulnerabilities in AI systems, raises significant concerns amongst the security industry, particularly OpenAI. The DeepSeek competitor discussed the potential for DeepSeek to undermine the security of AI applications, which could have far-reaching consequences for technology as we know it.
Satnam Narang, Senior ...

AI First, Human Second: The New Cybersecurity Command Structure
"Man is the measure of all things." ― Protagora - pre-Socratic Greek philosopher
It’s an ancient idea, yet it feels more relevant than ever as machines start making decisions that were once left to human minds. In today’s high-stakes cybersecurity landscape, artificial intelligence is no longer a future wager; it’s a frontline asset. AI systems detect ...
No results found.
In The News
Microsoft and ACTU Sign Landmark Agreement to Put Workers’ Voices and Skilling at the Heart of Australia’s AI Transformation
Microsoft Australia and the Australian Council of Trade Unions (ACTU) today announced a landmark Framework Agreement to prioritise skilling and elevate workers’ voices in the design, development and deployment of artificial intelligence (AI) across Australian workplaces. This Australian-first agreement outlines a set of commitments that recognise the ...
Threat Spotlight: The number of phishing kits doubled in 2025, bringing stealth, innovation and the same old themes
SYDNEY, Australia – 13 January 2026 – In 2025, the number of known phishing-as-a-service (PhaaS) kits doubled in number, increasing the pressure on security teams trying to defend against this ever-evolving threat, according to Barracuda’s phishing review of 2025.
Aggressive newcomers such as Whisper 2FA and GhostFrame introduced inventive ...
Nozomi Networks Announces Major Investment in Singapore
Nozomi Networks, the leader in OT, IoT and CPS security, today announced it has established its new Asia Pacific & Japan headquarters in Singapore.
The company chose Singapore as its regional headquarters as its location and skilled workforce will enable Nozomi to accelerate innovation and provide enhanced local support to a growing customer ...
Infoblox Expands Its Preemptive Security Offering to Combat Brand Abuse, Credential Exposure and External Threats with Planned Acquisition of Axur
Infoblox, a leader in hybrid, multi-cloud networking and preemptive security, today announced that it has entered into a definitive agreement to acquire Axur, a global provider of AI-powered security solutions that protect businesses from a wide range of threats beyond the perimeter. This planned acquisition is subject to regulatory approvals and ...
Rapid7 and ARMO Enable Organisations to Stop Cloud Attacks Earlier with Runtime Security
Rapid7 has announced a new partnership with ARMO to bring full cloud and application runtime security to the Command Platform,
NinjaOne Announced as Official Endpoint Management Partner for Audi Revolut F1 Team
NinjaOne has announced a new multi-year partnership with Audi Revolut F1 Team, who named NinjaOne as the team’s official endpoint management, mobile device management, and SaaS backup partner, as the team continues to build the foundations of its Formula 1 program ahead of its debut in the FIA Formula One World Championship in March.
As ...
ColorTokens Achieves FedRAMP® Moderate Authorization, Accelerating Secure Zero Trust Adoption Across Federal Agencies
Xshield Now Listed on the FedRAMP Marketplace, Expanding Access to Zero Trust Microsegmentation for Federal Agencies
CrowdStrike and Nord Security Announce Strategic Partnership to Redefine SMB Cybersecurity
The partnership combines Nord Security’s secure access and credential management solutions with the CrowdStrike Falcon platform, delivering enterprise-grade protection that’s simple, accessible, and built for every business
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
