The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

RedCurl’s Ransomware Debut

RedCurl’s Ransomware Debut

Introduction This research, conducted by Bitdefender Labs, presents the first documented analysis of a ransomware campaign attributed to the RedCurl group (also known as Earth Kapre or Red Wolf). RedCurl has historically maintained a low profile, relying heavily on Living-off-the-Land (LOTL) techniques for corporate cyberespionage and data ...
Countering Pockets of Resistance to Cybersecurity Action

Countering Pockets of Resistance to Cybersecurity Action

The real issue today for cybersecurity leaders is understanding and navigating the complexity and broader challenges of user adoption and resistance, bringing some key strategies to limit resistance to bear. In this way, the rate of adoption versus resistance can become a measure of success of the project, not an inhibitor to it.
Securing AI Innovation: Why the Fundamentals of Cybersecurity Still Matter

Securing AI Innovation: Why the Fundamentals of Cybersecurity Still Matter

Richard Seiersen argues that while AI continues to make waves in cybersecurity, the fundamentals of cybersecurity remain unchanged — and organisations shouldn’t be distracted by the noise, nor should the core security principles require a radical rethink. Quoting French writer Alphonse Karr, “The more things change, the more they stay the same”.
The Rise of AI-Powered Sectional and Differential Attacks: A Growing Threat to Symmetric Encryption

The Rise of AI-Powered Sectional and Differential Attacks: A Growing Threat to Symmetric Encryption

Artificial intelligence (AI) is revolutionizing cryptanalysis, making traditional symmetric key encryption increasingly vulnerable. AI-driven differential and sectional attacks can now exploit minor weaknesses in encryption schemes with unprecedented efficiency. Organizations must adopt crypto-resilient architectures like Quantum-Powered Encryption ...
Australia’s 2025 Federal Budget: Is Cybersecurity Still a Priority?

Australia’s 2025 Federal Budget: Is Cybersecurity Still a Priority?

Treasurer Jim Chalmers' 2025 federal budget marks a significant departure from previous robust commitments to cybersecurity, sparking concerns about Australia's cyber resilience. With notable investments like REDSPICE and the 2023–2030 Cybersecurity Strategy now in the past, questions arise about maintaining momentum amid escalating cyber threats.
Overcoming the Social Media Fraud Challenge With Graph Databases

Overcoming the Social Media Fraud Challenge With Graph Databases

Every year, organisations and consumers alike lose billions of dollars to online scams. Busting fraud and protecting users is all about finding and investigating the connections between various online entities, and modern technologies are helping to do so. Operating like a master detective, graph technology is capable of mapping patterns and ...
Microsoft’s Platforms and Services Prioritise Security From Inception, Rather Than as an Afterthought

Microsoft’s Platforms and Services Prioritise Security From Inception, Rather Than as an Afterthought

Overview Microsoft’s long-standing Executive, Bret Arsenault, Corporate Vice President and Chief Cybersecurity advisor at Microsoft, detailed Microsoft’s Secure Future Initiative (SFI) - their strategic approach to addressing emerging cyber threats and managing secure software development. With decades of experience at Microsoft, what Arsenault ...
Why Cybercriminals Never Take a Day Off

Why Cybercriminals Never Take a Day Off

Cyber criminals don’t take days off. They hit when we’re taking some ‘down time’. Why? Because our guards are down and it’s a perfect time to strike. Gerry Sillars, Vice President of APJ at Semperis discusses the relentless nature of cyber threats and the realities of ransomware attacks, as revealed in Semperis' latest holiday risk report.“Think ...
No results found.

In the News

Barracuda Found That 90% of Ransomware Incidents Exploit Firewalls

Barracuda Found That 90% of Ransomware Incidents Exploit Firewalls

90% of Ransomware Incidents Exploit Firewalls | New Barracuda Report Shows How Attackers Target Organisations and The Security Gaps Increasing Risk
Over 1500% Increase in New, Unique Malware Highlights Growing Security Complexity, According to WatchGuard Biannual Threat Report

Over 1500% Increase in New, Unique Malware Highlights Growing Security Complexity, According to WatchGuard Biannual Threat Report

Over 1500% Increase in New, Unique Malware Highlights Growing Security Complexity, according to WatchGuard Biannual Threat Report  MSPs must shift from reactive security to proactive threat intelligence and unified protection 
Microsoft and CrowdStrike Announce the Falcon Platform Now Available on Microsoft Marketplace

Microsoft and CrowdStrike Announce the Falcon Platform Now Available on Microsoft Marketplace

CrowdStrike (NASDAQ: CRWD) and Microsoft Corp. (NASDAQ: MSFT) today announced an expansion of their strategic alliance that allows organisations of all sizes to purchase the CrowdStrike Falcon® platform on Microsoft Marketplace using their existing Microsoft Azure Consumption Commitment. Marketplace streamlines procurement and billing, helping ...
Delinea Appoints Three Senior Leaders to Accelerate Growth Across EMEA and APAC

Delinea Appoints Three Senior Leaders to Accelerate Growth Across EMEA and APAC

Strategic hires underscore continued international expansion and investment in customer and partner success
Macquarie Technology Announces Successful Upsizing of Debt Capacity From $450m to $500m

Macquarie Technology Announces Successful Upsizing of Debt Capacity From $450m to $500m

Macquarie Technology Group Limited (ASX: MAQ) has announced the successful completion of a $50 million incremental debt facility, increasing MAQ’s secured revolving loan facility to $500 million. The newly secured $50 million will enable Macquarie Data Centres to expedite capacity delivery beyond the initial 6 megawatts (MW) at the company’s ...
Group-IB Report: Networked Supply Chain Cyber Attacks to Significantly Transform Asia-Pacific Cyber Risk Landscape in 2026

Group-IB Report: Networked Supply Chain Cyber Attacks to Significantly Transform Asia-Pacific Cyber Risk Landscape in 2026

Cyber threats like phishing and ransomware are now often links in a supply-chain attack ecosystem – a single compromise can reach thousands of downstream victims.    Group-IB uncovered 263 instances of corporate access in Asia-Pacific being sold on the dark web in 2025     Artificial Intelligence (AI) is making supply chain attacks cheaper, ...
Dragos OT Cybersecurity Report: Adversaries Increase Real-World Impact, Map Control Loops Across Industrial Infrastructure

Dragos OT Cybersecurity Report: Adversaries Increase Real-World Impact, Map Control Loops Across Industrial Infrastructure

The latest Dragos 2026 OT/ICS Cybersecurity Report finds cyber adversaries are progressing from reconnaissance to real-world operational disruption, including across Asia-Pacific.
Palo Alto Networks Unit 42 Releases Global Incident Response Report 2026

Palo Alto Networks Unit 42 Releases Global Incident Response Report 2026

AI-Driven Attacks, Identity Abuse and Supply Chain Exploitation Reshape the Cyber Threat Landscape
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This