The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Cybersecurity in the Age of AI

Cybersecurity in the Age of AI

Venky Raju, Field CTO, ColorTokens, writes on why AI-powered threats demand a shift in breach readiness strategies and how microsegmentation can help.
Selling Ransomware Breaches: 4 Trends Spotted on the RAMP Forum

Selling Ransomware Breaches: 4 Trends Spotted on the RAMP Forum

The sale and purchase of unauthorised access to compromised enterprise networks has become a linchpin for cybercriminal operations, particularly in facilitating ransomware attacks. Underground forums are sharing guidelines on breaching networks and selling the access they obtain, leaving the exploitation to other malicious actors. In this article, we ...
The Role Of Data Resilience In AI And Cybersecurity

The Role Of Data Resilience In AI And Cybersecurity

Good AI and Cybersecurity Relies On Resilient Data General awareness of the technology landscape is currently driven by ongoing coverage on two sectors: AI and cybersecurity. AI has captured the attention of industry leaders and media alike resulting in comprehensive research initiatives such as those of the Australian National University, and ...
Cyber-insecurity – The Contact Centre Challenge (and Solution)

Cyber-insecurity – The Contact Centre Challenge (and Solution)

Introduction Contact centres are prime targets for cyberattacks due to the vast amounts of sensitive customer information they handle. Ensuring the security of this data is more than a technical challenge, it’s a critical business imperative. Consequently, the intersection of cybersecurity, contact centres, and artificial intelligence (AI) is ...
Securing IoMT Devices: Key Steps to Implementing Microsegmentation in Healthcare

Securing IoMT Devices: Key Steps to Implementing Microsegmentation in Healthcare

Learn how to secure IoMT healthcare devices with zero trust microsegmentation. Discover key steps for visibility, segmentation, and continuous monitoring.
From Click to Chaos: Bouncing Around in Malicious Traffic Distribution Systems

From Click to Chaos: Bouncing Around in Malicious Traffic Distribution Systems

Malicious traffic distribution systems (TDSs) have flown under the radar of most cybersecurity organisations for years: they have been largely ignored and thought of as simply advertising networks or “adware”, a term associated with nuisances and not threats. Cybercriminals have used this to their advantage and have built massive networks of domains ...
Disrupting The Cost Trajectory: Five Ways To Maximise Your Digital Transformation ROI

Disrupting The Cost Trajectory: Five Ways To Maximise Your Digital Transformation ROI

Technology leaders are increasingly asked to achieve more with fewer resources. Coupled with skills shortages, limited budgets, and outdated digital assets, striking this balance has never been more critical. The question - how can technology leaders realign their resources into high-value projects that deliver more for less? Here's five ways to drive ...
How To Strike Back Against Phishing And Takedown Fraudulent Websites In The Battle Against Escalating Cyber Crime

How To Strike Back Against Phishing And Takedown Fraudulent Websites In The Battle Against Escalating Cyber Crime

Phishing takedown services are a critical element of our fight against threat actors. The ungoverned and distributed nature of the Internet makes this challenging but organisations, such as AUSCERT, are critical and take down thousands of phishing and scam sites every year.
No results found.

In The News

Hitachi Vantara Unveils New Virtual Storage Platform One Capabilities to Enable Stronger Cyber Resilience, Performance and Sustainability

Hitachi Vantara Unveils New Virtual Storage Platform One Capabilities to Enable Stronger Cyber Resilience, Performance and Sustainability

Expanded guarantees give enterprises greater control, faster recovery from cyber threats and lower energy costs
Logicalis Expand APAC SOC Services With Launch of Cisco MXDR

Logicalis Expand APAC SOC Services With Launch of Cisco MXDR

Logicalis, a leading provider of global IT solutions and managed services, has announced it is the first partner in Asia Pacific (APAC) to launch Cisco Extended Detection and Response (XDR) as a Global Managed Service (MXDR).
Microsoft Report – Fraudsters Using AI to Supercharge Their Scams – Tips to Protect Yourself

Microsoft Report – Fraudsters Using AI to Supercharge Their Scams – Tips to Protect Yourself

Today, Microsoft has released its latest Cyber Signals report on AI-assisted scams, including those targeting e-shoppers and job seekers. To read the full report, please click here. Why is this relevant now? AI-assisted scams are on the rise; over the past year alone, Microsoft has thwarted $US4 billion in fraud attempts and approximately 1.6 ...
Tenable Comment: MITRE CVE Program Funding Set To Expire

Tenable Comment: MITRE CVE Program Funding Set To Expire

MITRE’s CVE program has been an important pillar in cybersecurity for over two decades. The lack of certainty surrounding the future of the CVE program creates great uncertainty about how newly discovered vulnerabilities will be catalogued. Please find below a comment from Satnam Narang, sr. staff research engineer at Tenable and a bog here from ...
DDoS Threat Landscape Shifts: U.S. Hit Hardest, but Australia and NZ Remain on Alert

DDoS Threat Landscape Shifts: U.S. Hit Hardest, but Australia and NZ Remain on Alert

New data from Radware’s Hacktivism Unveiled Q1 2025 report underscores a sharp escalation in politically motivated cyberattacks, particularly Distributed Denial-of-Service (DDoS) campaigns. The United States emerged as the most frequently targeted nation, experiencing 558 attacks—13.5% of all incidents globally—outpacing Ukraine (400) and Israel (340). ...
Gerry Sillars is Bolstering Semperis’ Identity-Driven Cybersecurity Efforts in APJ

Gerry Sillars is Bolstering Semperis’ Identity-Driven Cybersecurity Efforts in APJ

Gerry Sillars is Bolstering Semperis’ Identity-Driven Cybersecurity Efforts in Asia Pacific and Japan
Tenable Announces Co-CEOs – Steve Vintz and Mark Thurmond

Tenable Announces Co-CEOs – Steve Vintz and Mark Thurmond

Tenable®, the exposure management company, today announced that its Board of Directors has unanimously appointed Steve Vintz and Mark Thurmond as Co-Chief Executive Officers on a permanent basis. Following an extensive search process that considered both internal and external candidates, the Board concluded that Vintz and Thurmond are best positioned ...
12th Annual Edition of the BeyondTrust Microsoft Vulnerabilities Report Reveals Record-Breaking Year for Microsoft Vulnerabilities

12th Annual Edition of the BeyondTrust Microsoft Vulnerabilities Report Reveals Record-Breaking Year for Microsoft Vulnerabilities

Total vulnerabilities reached an all-time high of 1,360 in 2024, an 11% increase from the previous record of 1,292 in 2022 Elevation of Privilege (EoP) and Remote Code Execution (RCE)—primary goals of any threat actor looking to exploit a system—continue to dominate the vulnerability categories year-over-year
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This