The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Detecting Script-Based Attacks Against SAP

Cyberattacks against SAP systems have become more common with SAP customers generating 87% of total global commerce ($46 trillion), according to SAP.com. Attackers gain network access and then explore critical applications through port scanning and script-based exploration, and two two easy to identify attack examples are the password lock attack and ...

How AI Can Advance Your SAP Security Posture

This article explores AI’s role in SAP Security, highlighting some SAP security platform challenges and the importance of system hardening against exploit chains within SAP vulnerabilities.
QR Code Phishing Attacks (Quishing): What To Know and How To Stay Secure

QR Code Phishing Attacks (Quishing): What To Know and How To Stay Secure

Another new kind of phishing attack is on the rise and it’s coming from an unexpected source: QR codes. Like with other kinds of phishing, this kind of attack leverages trust—trust in the QR code itself as well as the brand attached to it. So what does a QR-based phishing attack look like and how can you protect yourself one? Josh Cigna from Yubico ...
How Generative AI Can Lend A Helping Hand To IT Security Teams

How Generative AI Can Lend A Helping Hand To IT Security Teams

As security teams continue their constant battle against evolving threats and attackers, growing numbers are exploring the assistance that can be provided by new generative AI tools.
Why Taking A Customer-Centric Approach To Cybersecurity Incident Response Is Critical To Maintain Customer Trust

Why Taking A Customer-Centric Approach To Cybersecurity Incident Response Is Critical To Maintain Customer Trust

Introduction Cybersecurity is no longer just an IT issue; it directly impacts customer trust and loyalty. Customers expect their data to be secure and any breach can lead to a significant loss of customer confidence that impacts a company’s reputation and profitability. The increasing importance of regulatory compliance and legal obligations (1) mean ...
Why Agile Learning is Vital for Secure Software Development

Why Agile Learning is Vital for Secure Software Development

Agile learning has emerged as a critical training methodology for high-impact upskilling of software development teams
Romantic Chatbots – To Be, or Not To Be

Romantic Chatbots – To Be, or Not To Be

‘Digital companionship’ has transcended science fiction. It’s now in a fledgling state, driven by a flourishing, if somewhat opportunistic, zeitgeist of AI-driven everything. Chatbots have been around for a long time, digitally speaking - nearly 60 years in fact since ELIZA was first created. And like most technologies, it eventually - and ...
Modern Threats Need Modern Defences – Why We Need To Modernise Cybersecurity

Modern Threats Need Modern Defences – Why We Need To Modernise Cybersecurity

With the benefit of hindsight, we can now look back and understand some of the cyber security missteps of 2023 to understand what we’re missing and how we can learn from our mistakes. We see artificial intelligence adding real tangible value in our efforts to increase defences around risk scoring and create efficiencies in threat hunting – meaning ...
No results found.

In The News

Aus3C Calls On Australian Businesses To Help Strengthen The Nation’s Data Protection In Partnership With CSIRO & Australian Government

Aus3C Calls On Australian Businesses To Help Strengthen The Nation’s Data Protection In Partnership With CSIRO & Australian Government

Businesses will learn from cyber experts and voice their concerns at a free workshop or in a research study nationwide in December
Wavelink Expands SecurePath Initiative To Address Cybersecurity Skills Shortage

Wavelink Expands SecurePath Initiative To Address Cybersecurity Skills Shortage

Industry-backed initiative connects future talent with industry leaders to strengthen Australia’s cybersecurity workforce. 
Tenable Comment: RomCom Zero-Day Exploit Chain

Tenable Comment: RomCom Zero-Day Exploit Chain

Russia-aligned threat actor known as RomCom has leveraged two zero-day vulnerabilities, one in Mozilla Firefox and the other in Microsoft Windows. A successful attack can spread the RomCom backdoor to anyone who visited an infected website, without the need for any clicks. Please find below a comment from Satnam Narang, sr. staff research engineer ...
Two-Thirds of Australia’s Leading Banks Put Consumers at Risk of Email Fraud

Two-Thirds of Australia’s Leading Banks Put Consumers at Risk of Email Fraud

Proofpoint analysis reveals Australian banks are falling behind US counterparts in protecting their customers
Cybersecurity Unicorn Semperis Bolsters Identity-Driven Solutions in Australia Following Major Funding Round

Cybersecurity Unicorn Semperis Bolsters Identity-Driven Solutions in Australia Following Major Funding Round

Semperis, a pioneer in identity-driven cyber resilience, has reaffirmed its commitment to supporting Australian businesses in safeguarding their cybersecurity environment. This initiative follows the latest US$125 million funding round raised in June 2024, aimed at accelerating product innovation and expanding Semperis' presence across the ANZ ...
CrowdStrike Reports Third Quarter Fiscal Year 2025 Financial Results

CrowdStrike Reports Third Quarter Fiscal Year 2025 Financial Results

Surpasses $4 billion ending ARR milestone, grows 27% year-over-year to reach $4.02 billion Exceeds $1 billion quarterly total revenue milestone, grows 29% year-over-year to reach $1.01 billion Delivers cash flow from operations of $326 million and free cash flow of $231 million, achieving a free cash flow rule of 51 AUSTIN, Texas, November 26, ...
Cyberthreat Predictions For 2025 From Barracuda’s Security Frontline

Cyberthreat Predictions For 2025 From Barracuda’s Security Frontline

Predicting the future isn’t easy, but you can anticipate what is likely to happen by looking at how things have evolved over the past year. This year again, Barracuda asked colleagues who work on the security frontlines about the things they witnessed in 2024 and expect to see in 2025. According to their insight, 2025 will be the year when: ...
Pegasystems Passes IRAP Assessment, Expanding Secure Service Delivery for Australian Government Organisations

Pegasystems Passes IRAP Assessment, Expanding Secure Service Delivery for Australian Government Organisations

Pegasystems recently announced its completion of IRAP (Information Security Registered Assessors Program), achieving Protected status. This milestone enables Australian government organisations and regulated industries to utilise Pega's industry-leading enterprise AI decisioning and workflow automation solutions while meeting stringent security ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This