The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
Unmasking the SYS01 InfoStealer Threat: Bitdefender Labs Tracks Global Malvertising Campaign Targeting Meta Business Pages
In a digital world where advertising is king, businesses and organisations are not the only ones using this powerful tool. Cybercriminals have a knack for exploiting the engine that powers online platforms by corrupting the vast reach of advertising to distribute malware en masse.
While legitimate businesses rely on ads to reach new audiences, ...

Cybersecurity is Everyone’s Business: Navigating Our Digital Lives
As Cybersecurity Awareness Month draws to a close, the message "Cybersecurity is Everyone's Business" remains vital. Despite fewer high-profile breaches making headlines, cyber threats are still very much present. Just this month, Australian companies like Funlab, Perfection Fresh and Road Distribution Services were targeted by cyberattacks, ...

How NetApp’s Government Relations are Shaping Secure Tech
Kristen Verderame, Vice President of Global Government Relations at NetApp, shared the importance of government relations, public affairs, and cybersecurity in shaping the technology. Verderame shared a view on how companies like NetApp collaborate with various government bodies to support missions and develop cybersecurity frameworks.
Representing ...

How Quantum Random Number Generators Can Amplify the Power of Post Quantum Cryptography
The development of quantum computing is driving the need for new cryptographic methods that can resist future quantum-based attacks. Among the most promising techniques in post-quantum cryptography are Module Lattice-based Key Encapsulation Mechanisms (ML-KEM) and Module Lattice-based Digital Signature Algorithms (ML-DSA). These methods leverage the ...

What Do Gauss and Euler Handshakes Have to Do with “Infinite Microsegmentation Policy Impact Simulation”?
Explore how math concepts from Gauss and Euler solve cybersecurity challenges, enabling scalable microsegmentation with infinite policy impact simulation.

NetApp Is Committed To Helping Entities Build Their Own AI Factories
So much is going on with NetApp according to Jeff Baxter, Vice President of Product Marketing at NetApp. Baxter provided details about the latest NetApp product announcements and the future trajectory of artificial intelligence (AI) and cybersecurity within the industry.
Understanding ONTAP: The Foundation of Data Management
The introduction to ...

Revolutionising Government with a Modular, AI-Driven Platform
Utilising low-code platforms with modular features more seamlessly allow government agencies to efficiently and effectively meet the ever-changing needs of their citizens. They are contributing to government at all levels to increase cost efficiency, become more agile, whilst remaining compliant and better prepared for the future.

Debunking Three Common Myths About Data Protection
Introduction
Data protection is no longer an afterthought but a daily priority for businesses. While Australia's regulations like the Privacy Act and the Notifiable Data Breaches (NDB) scheme are crucial, the average cost of a data breach globally is now $4.45 million. For Australian enterprises, the financial hit can be devastating, especially if ...
No results found.
In The News
Turnitin Enhances Capabilities Amid Growing AI Bypasser Use
New detection feature helps educators detect potential AI misuse
Check Point Named a Leader in the 2025 Gartner Magic Quadrant for Hybrid Mesh Firewall
Delivering AI-powered network security across on-premises, cloud and SASE to prevent the most advanced threats
CyberArk Helps Optiv Transform Workforce Access, Applying Privilege Controls to Every Identity
Replaces legacy SSO with CyberArk to enable secure, frictionless workforce access
HCLTech and Rubrik to Deliver Multi-Layered Cybersecurity
HCLTech’s VaultNXT powered by Rubrik provides ransomware detection and remediation, ensuring data integrity for complete cyber resilience
Citrix NetScaler ADC and NetScaler Gateway Zero-Day Remote Code Execution Vulnerability Exploited in the Wild
Citrix has released patches to address a zero-day remote code execution vulnerability in NetScaler ADC and NetScaler Gateway that has been exploited. Organisations are urged to patch immediately as Citrix’s NetScaler ADC and Gateway appliances have been a valuable target for attackers over the last several years.
“While patches are available for ...
Exabeam Research: Insider Threats, Supercharged by AI, Set for Explosive Growth in Australia
82% of Australian respondents report that AI is making insider threats more effective, and 84% expect insider threats to increase in the next 12 months
Axis Unveils Game-Changing Security Solutions for a Safer, Smarter Future at Security & Integrate 2025
Sydney, Australia – 27 August 2025 – Axis Communications Oceania returns as headline sponsor of Security & Integrate 2025, showcasing intelligent technologies that transform insight into action.
In a world of complex security challenges, Axis is redefining safety, security, business intelligence, and operational efficiency with cutting-edge ...
Phishing Gangs Use Split and Nested QR Codes to Evade Detection In New Wave of ‘Quishing’ Attacks
Barracuda threat analysts have uncovered two innovative techniques being used by cyber attackers to help malicious QR codes evade detection in phishing attacks.
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
