The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Protecting Data From Ransomware: The Power of Advanced Encryption
Ransomware attacks have become a pressing threat to businesses worldwide, with their potential to encrypt sensitive data and hold organisations hostage. While many focus on preventing such attacks, the ability to mitigate their consequences is equally crucial. This article explores how advanced encryption techniques, including quantum-powered ...

Tackling Takedowns – How to Mitigate Risks of Fake Domains
As cyber threat actors continue to leverage more and more sophistication in phishing attacks and other cases of fraud targeting customers and consumers, organisations need to take proactive steps to stay ahead and be ready to respond when those threats are identified.

Oracle Cloud – the Late Bloomer
For years, the tech behemoth Oracle stood in the shadows of cloud giants like Amazon and Microsoft. But now, with their second-gen Oracle Cloud Infrastructure (OCI), Oracle is rewriting the cloud playbook. Oracle is far more than just the database company as most people would have memories of.Mahesh Thiagarajan, Executive Vice President of OCI, whose ...

The Invisible Siege on Our Supply Chain
Daniel Churches, Sales Director at ColorTokens, a captain in breach readiness and containment, lifts the veil on the precarious state of cybersecurity today.
"When I say breach readiness, I speak from a place of inevitability," Churches states.
The reality is that breaches aren’t just possible; they’re practically guaranteed.
"A breach is likely ...

Identity Platforms Are No Longer Just a Backend Issue
Businesses are perpetually cornered, navigating cybersecurity threats and trying to keep their head above water with their never ending laundry list of security to-do’s. Simon Hodgkinson,
Advisor from Semperis and former Chief Information Security Officer (CISO) at one of the world's largest oil companies, opened up about his experience towards ...

The Art of Mastering Cyber Risk: From Spreadsheets to Strategic Resilience in Critical Infrastructure
Critical Infrastructure leaders must move beyond compliance to integrated cyber risk management to protect services and build resilience.

Cybersecurity’s Evolution and the Shift Toward Secure-By-Design Principles
To achieve a high level of cybersecurity maturity, organisations must move beyond reliance on security tools and AppSec experts, embracing a culture of security at all levels. Effective Secure-by-Design adoption depends on building a security-conscious workforce through structured, ongoing education and incentives that encourage developers to take ...

Navigating the Identity Security Maze: Critical Challenges for Australian Financial Services in 2025
Australia's digital payments sector is booming, but many financial institutions, particularly smaller ones, face significant challenges due to outdated identity security systems. These challenges are compounded by increasing cyberattacks, stringent regulatory pressures, inefficient manual processes, and the growing complexity of machine identities. In ...
No results found.
In the News
Macquarie Technology Group Welcomes ATA’s Change in Constitution to Appoint Telecoms Company Leaders to Board
Macquarie Technology Group has welcomed the Australian Telecommunications Alliance’s (ATA) decision to change its constitution so that only telecommunications company leaders can be appointed to the Board. The decisions sees Macquarie’s own Group Executive Luke Clifton join the Board, bringing decades of technological and customer experience ...

CloudSEK Detects Over 2,000 Holiday-Themed Fake Stores Exploiting Black Friday and Festive Sales
Bengaluru, India – November 27, 2025 – As millions of shoppers gear up for Black Friday and the holiday shopping season, CloudSEK, a global leader in AI-driven digital risk protection, has uncovered an alarming rise in fake online stores.
The investigation reveals over 2,000 fraudulent holiday-themed e-commerce sites designed to exploit consumer ...
Trend Micro Predicts 2026 as the Year Cybercrime Becomes Fully Industrialised
SYDNEY, November 27, 2025 – Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cybersecurity leader, today released its annual Security Predictions Report for 2026, warning that the coming year will mark the true industrialisation of cybercrime. Artificial intelligence (AI) and automation are now enabling threat actors to run entire campaigns ...
Australia’s Boards Embrace AI, but Governance Gaps Are Widening, New Diligent Survey Reveals
Australian Organisations Balance AI Adoption with Risk Management, as Cybersecurity Emerges as a Top Priority
Datadog’s 2025 State of Cloud Security Report Reveals Increased Data Perimeters Adoption Amid Growing Credential Theft Concerns
Although data perimeters are considered an advanced practice, over one-third of organisations have already adopted them
Phishing Attempts Targeting Black Friday Shoppers Surge 620% in the Weeks Leading Into the Holiday Weekend
New data from Darktrace reveals a 54% jump in phishing attacks impersonating well-known festive retailers like Walmart, Macy’s and Best Buy in just the last week
Fake Battlefield 6 Pirated Versions and Game Trainers Used to Deploy Stealers and C2 Agents
Bitdefender Labs has identified malware campaigns exploiting the popularity of EA's Battlefield 6 first-person shooter, distributed via supposedly pirated versions, game installers, and fake game trainers across torrent websites and other easily found websites.
Electronic Arts' Battlefield 6, developed by DICE and published by Electronic Arts (EA), ...
LevelBlue Completes Acquisition of Cybereason, Expanding Global Leadership in Managed Detection and Response, XDR, and Incident Response
Acquisition bolsters LevelBlue’s position as the world’s largest pure-play MSSP; adds strategic investment from SoftBank Corp., SoftBank Vision Fund 2, and Liberty Strategic Capital
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
