The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

The Kids Aren’t Alright: Vulnerabilities in Edulog Portal Revealed K-12 Student Location Data

The Kids Aren’t Alright: Vulnerabilities in Edulog Portal Revealed K-12 Student Location Data

Tenable Research discovered security flaws in a popular transportation management app that allowed access to student location data. While these issues have been fixed, the findings again prove the importance of strong authentication and access control.
Smarttech247, Cybersecurity Trends in 2024

Smarttech247, Cybersecurity Trends in 2024

As we enter 2024, Raluca Saceanu, CEO of Smarttech247, a London-listed company specialising in AI-enhanced cybersecurity services with a focus on automated managed detection and response, offers insights into the evolving threat landscape and the four key global cybersecurity themes for the year ahead. AI's Evolution and Dominance In 2023, ...
Investigating Worldwide SMS Scams, and Tens of Millions of Dollars in Fraud

Investigating Worldwide SMS Scams, and Tens of Millions of Dollars in Fraud

SMS services remain a critical part of telecommunications; they don't require Internet access, and companies use them to inform their customers. This combination of features makes them incredibly useful for criminals who use the technology as a stepping stone in their never-ending campaigns. And if you think that the new RCS messaging standard will ...
Data Privacy Week – Taking Control of Data

Data Privacy Week – Taking Control of Data

Jason du Preez, Vice President of Privacy and Security at Informatica, comments on why the companies that collect our data have the power and the responsibility to take control of data and use it for the common good.
Over Half Of Privacy Pros – 56 Percent In Oceania – Expecting Reduced Budgets In 2024, Sparking Concerns

Over Half Of Privacy Pros – 56 Percent In Oceania – Expecting Reduced Budgets In 2024, Sparking Concerns

Jo Stewart-Rattray: “It is paramount that organisations understand what is expected of them in order to devise an effective privacy policy and implement accordingly. Then will they be able to realise the benefits of embedding privacy practices in digital transformation from the outset, including customer loyalty, reputational and financial performance.”
People Are An Essential Element In Your Cybersecurity Incident Response Plan

People Are An Essential Element In Your Cybersecurity Incident Response Plan

Introduction While threat actors lean heavily on technology to execute cyber-attacks, much of their focus is on exploiting individuals. Focused on exfiltrating data and stealing money, criminals manipulate people through deception. Developing a security culture that helps people identify potential threats and encourages behaviours that decrease ...
Navigating Critical Infrastructure Cybersecurity: Your Business Imperative

Navigating Critical Infrastructure Cybersecurity: Your Business Imperative

The severe consequences of recent high-profile breaches, particularly among critical infrastructure industries, demonstrate the clear imperative for enterprises to fortify both their critical infrastructure systems and their cybersecurity posture. Today, almost every business deploys software, which means cyber risk is business risk.  However, many ...
Ransomware Attacks: No Sector is Safe

Ransomware Attacks: No Sector is Safe

Ransomware attacks have been spreading like wildfire, infiltrating various sectors and leaving devastation in their wake. While industries like finance, critical infrastructure, and healthcare have long been the prime targets, a recent study reveals that the arts, entertainment, and recreation industry is not immune to these cyber threats. In this ...

In The News

Launches Privileged Task Automation Capability For Automating And Delegating The Execution Of Privileged Tasks

Launches Privileged Task Automation Capability For Automating And Delegating The Execution Of Privileged Tasks

Privileged Task Automation revolutionises the way organisations manage the execution of tasks that require privileged access
New Relic Study Reveals Outages in Australia and New Zealand Can Cost Businesses $2.2M USD Per Hour

New Relic Study Reveals Outages in Australia and New Zealand Can Cost Businesses $2.2M USD Per Hour

The findings demonstrate a strong correlation between full-stack observability and reduced downtime, fewer interruptions, and lower annual outage costs—reinforcing the critical role observability plays in maximising operational efficiencies and business performance.
Tenable Research Discovers SMB Force-Authentication Vulnerability in Widely Used Open-Source Software

Tenable Research Discovers SMB Force-Authentication Vulnerability in Widely Used Open-Source Software

Tenable, the exposure management company, has disclosed that its Tenable Cloud Security Research team has discovered a medium-severity Server Message Block (SMB) force-authentication vulnerability that exists in all versions of Open Policy Agent (OPA) for Windows prior to v0.68.0. OPA is one of the most widely used policy engines built on open-source ...
AI-driven Attacks Targeting Retailers Ahead Of The Holiday Shopping Season

AI-driven Attacks Targeting Retailers Ahead Of The Holiday Shopping Season

With sales beginning as early as October and extending through late December, Imperva warns that the holiday shopping season represents a critical time for online retailers. AI-driven attacks originate from AI tools like ChatGPT, Claude, and Gemini, alongside specialised bots that are designed to scrape websites for LLM (Large Language Model) training data.
Trustwave Expands Partnership With Dicker Data To Resell Complete Suite Of Security Services

Trustwave Expands Partnership With Dicker Data To Resell Complete Suite Of Security Services

Trustwave, a global leader in cybersecurity and managed security services, has announced an expanded partnership with Dicker Data, Australia’s premier IT distributor, which has long been a Trustwave solutions distributor. Dicker Data will now offer the entire portfolio of Trustwave’s cutting-edge cybersecurity services to its resellers as part of this ...
Sophos to Acquire Secureworks to Accelerate Cybersecurity Services and Technology for Organisations Worldwide

Sophos to Acquire Secureworks to Accelerate Cybersecurity Services and Technology for Organisations Worldwide

Sophos today announced a definitive agreement for Sophos to acquire Secureworks. The all-cash transaction is valued at approximately $859 million. Sophos is backed by Thoma Bravo, a leading software investment firm. Sophos’ experience and reputation as a leading provider of managed security services and end-to-end security products, combined with ...
Camelot Secure Wins APT Solution Provider of the Year, Leading the Charge in Proactive Cybersecurity Defense

Camelot Secure Wins APT Solution Provider of the Year, Leading the Charge in Proactive Cybersecurity Defense

Camelot’s Advanced Persistent Threat (APT) Hunt Service offers organizations a means to proactively identify potential threats through advanced technological innovations before they can inflict harm. This approach represents a significant departure from traditional cybersecurity practices, shifting towards a more offensive, proactive strategy in ...
BeyondTrust Releases Cybersecurity Predictions for 2025 and Beyond

BeyondTrust Releases Cybersecurity Predictions for 2025 and Beyond

BeyondTrust experts predict a paradigm shift in security strategies as identity risks and quantum threats take centre stage Top cybersecurity threats include the evolution of the AI2, quantum computing, and cyber insurance

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This