The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Prioritising Data Protection: A Conversation with Rad Kanapathipillai on KBKast
Introduction
In a recent episode of KBKast, Host Karissa Breen engaged in an interview with Rad Kanapathipillai, who works in the field of data protection. The episode delved deep into the critical importance of safeguarding sensitive data across all stages of development, shedding light on the challenges organisations face and the strategies needed ...

Australia Sanctions Russian Hacker
Australia has boldly stepped into the cyber battlefield, wielding its autonomous cyber sanctions framework as a weapon against cybercrime. This decisive move came after a Russian individual, Aleksandr Ermakov, was implicated in the cyberattack on Medibank Private, one of the country's largest healthcare networks. The sanctions, a first of their kind to ...
AI for Cybersecurity: Use With Caution
This article discusses the challenges and opportunities that AI poses to cybersecurity, specifically looking into how companies can approach it with caution.
Why Humans Are No Longer The Weakest Link In The Cyber Chain
We’ve all heard the mantra that ‘humans are the weakest link’ in any organisation’s cybersecurity defences, but with generative AI technology making exploits such as phishing email campaigns more convincing and scalable, it’s no longer fair — or effective — to blame individuals for succumbing to attacks. It’s Andrew’s view that while cyber training ...
Stream-Jacking 2.0: Deep fakes power account takeovers on YouTube to maximise crypto-doubling scams
Stream-Jacking & Deep fakes. If you ever observe content promoting giveaways or other events from well-known companies, always make sure to double-check the promotions on official websites.

Credential Stuffing – Industry Commentary from Tenable
Commentary on a new tactic scammers are employing called credential stuffing which is affecting the retail sector and can result in fraudulent transactions being made using payment information saved on popular retail sites.
Why Effective Digital ID Management is Vital in Financial Services
Institutions that take digital ID seriously and put it at the forefront of application planning and deployment will be best placed to secure an increasing share of a rapidly growing market.

Improving Cybersecurity Within Australia’s Water Utilities
In a world of unceasing cyberattacks, security is no longer a luxury but a vital investment. By taking action now, utilities can ensure the uninterrupted flow of water to their customers at all times.
In The News
SentinelOne Expands Strategic Collaboration With AWS To Deliver AI-Powered Cybersecurity
SentinelOne capitalises on AWS AI infrastructure and Amazon Bedrock to solve customers’ cloud security, endpoint security and AI-SIEM needs with Purple AI
MOUNTAIN VIEW, CA AND LAS VEGAS, NV - October 17, 2024 - SentinelOne (NYSE: S) today announced an extension of its strategic collaboration agreement (SCA) with Amazon Web Services (AWS), designed ...
Progress AI-Powered Flowmon Introduces Up to 10x Search Acceleration for Faster Cyberthreat Hunting and Network Troubleshooting
IP Address Indexing is the first in a series of major performance and scalability enhancements to the Flowmon AI-powered Network Detection and Response & Network Visibility offerings
Kyndryl Readiness Report: 87% Confident in IT, but 38% Say It’s Future-Ready
Inaugural global study, with exclusive data from AI-powered Kyndryl Bridge, shows how executives, including Australian business leaders, rank risks, prioritise investments, and balance technology and talent
Gathid Software Strengthens Security Posture With ISO 27001:2022 Certification
The global certification reinforces Gathid’s commitment to data integrity and privacy, and highlights its leadership in the identity and access governance market
Recorded Future and Singapore’s Cyber Security Agency Sign Memorandum of Collaboration At Singapore International Cyber Week 2024
Landmark Agreement Establishes New Framework to Augment Singapore’s Cybersecurity Efforts
CrowdStrike Appoints Proven Leader Louis Tague To Accelerate Growth, Drive Cybersecurity Transformation In Australia And New Zealand
Tague brings nearly three decades of cybersecurity and IT leadership experience to new role as VP of sales for ANZ; will drive growth and accelerate adoption of AI-native Falcon platform to meet regional cybersecurity requirements
ExtraHop® Accelerates Threat Hunting with New Capabilities to Counter Escalating Ransomware Threat
Empowers enterprises to detect, investigate, and respond to malicious files with more speed and precision
Seattle, 16 October 2024 – ExtraHop®, a leader in cloud-native network detection and response (NDR), today unveiled new network-based file analysis capabilities in ExtraHop RevealX™ to detect malware, combat ransomware, and help prevent data ...
CrowdStrike Supports U.S. DOJ’s Anonymous Sudan Indictment And Reveals Motivations Behind DDoS Attacks
Outside of its high-profile technology sector targets, Anonymous Sudan frequently targeted entities in the telecommunications, healthcare, academic, aviation, government, media and financial sectors — often including critical infrastructure such as hospitals, airports, banks and telecommunications providers. The group's geographic targeting scope was ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..