The Voice of Cyberยฎ
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
Recorded Futureโs Latest Insikt Report: China’s Targeting of International Companies In Geopolitical Competition
Intelligence company Recorded Future today released the latest report from its threat research division Insikt Group - Chinaโs targeting of international companies in geopolitical competition.
How Visible Is My Profile on the Internet?
There are a lot of good things about being famous, but there are a few not so good things too. โ Sharon Stone What is profile visibility?Simply put, profile visibility means how โfamousโ you are on the internet and what information about you is visible publicly. A simple Google search for your name will often reveal the answer to that ...
Cloud assets the biggest targets for cyber-attacks in Australia as more sensitive data moves to cloud
Thales today announced the release of the 2023 Thales Cloud Security Study, its annual assessment on the latest cloud security threats, trends and emerging risks based on a survey of nearly 3,000 IT and security professionals across 18 countries including Australia.
Closing the Gap: How Modern Forensic Platforms Enhance Cloud Security Investigations
While data is migrating to the cloud at unprecedented rates, the number of cloud security incidents is growing rapidly in response. In its recent cloud threat report, Palo Altoโs Unit 42 concluded threat actors have become adept at exploiting common, everyday issues in the cloud. These range from misconfigurations, weak credentials and lack of ...
Rapid7 Threat Report: Japanese Companies Exposed to Increased Ransomware Risk Through Global Business Footprint
Overseas entities present a serious cyber risk of ransomware and state-sponsored threats
My Facebook is hacked โ What do I do?
I must admit that it is quite a stressful experience and for some, it may even turn out to be a harrowing one.
A basic question that you may have is:
Why would someone be interested in my Facebook account? =/
There could be various reasons why someone would want to sneak into your Facebook account.
Tarnish your image - Someone wanting to ...
LogRhythm Announces First Half 2023 Success And Expansions With Product Enhancements That Improve Visibility In The Threats That Matter Most and Reinforce The Companyโs Commitment To Being A Trusted Security Partner
LogRhythm, the company helping security teams stop breaches by turning disconnected data and signals into trustworthy insights, has announced its 20-year milestone with a renewed commitment to delivering innovative solutions.
Enterprises to Spend $12.9B on Private 5G Network Security by 2027
Organisations are looking for solutions that integrate neatly with existing technologies
In The News
Beyond the wail: deconstructing the BANSHEE infostealer
The BANSHEE malware is a macOS-based infostealer that targets system information, browser data, and cryptocurrency wallets.
Sophos Launches Dedicated Customer Success Team, Deepening Commitment to Customers and Channel Partners
Sophos is expanding its commitment to customers and channel partners with the launch of Sophos Customer Success. The new program features a team of experts who support customers throughout their post-sales experience with ongoing security resources and alerts, webinars and other educational information about cyberattacks, such as ransomware and data ...
Unit 42 Research Report Exposes Evolving Cybersecurity Risks Across Critical Industries
New insight reveals increasing complexity and exposure in attack surfaces driven by AI-generated threats
Palo Alto Networks, the global cybersecurity leader, today released its latest report, โ2024 Unit 42 Attack Surface Threat Reportโ, revealing the rapidly evolving landscape of cybersecurity threats. The study, drawn from several petabytes of data ...
Vista Group Boosts Cloud Operations and Secures IT Infrastructure with Support From ManageEngine
New-Zealand-founded Vista Group, a leading global provider of software and technology solutions across the film industry, obtainsย seamless resource management across multiple environments, proactive issue resolution, and assured compliance with help from ManageEngine.
Founded in 1996, Vista Group started when founder Murray Holdaway was tasked by a ...
Tenable Names Cloud Security Expert, Shai Morag, Chief Product Officer
Tenableยฎ, the exposure management company, today announced that it has named Shai Morag to the role of chief product officer. Morag will focus on delivering increased momentum and scale across Tenableโs entire portfolio, driving the companyโs next era of growth by building security products for a cloud-first world.
Morag joined Tenable in 2023 ...
Thalesโ 2024 Critical Infrastructure report shows a rise in attacks against critical sectors, and lack of response preparedness
Thalesย today releases the findings of itsย 2024 Critical Infrastructure report. Organisations acrossย energy and utilities, telecommunications, transportation and trucking/shippingย industries globally (including in Australia) have been surveyed.
This comes as Australiaโsย Security of Critical Infrastructure Act (SOCI)ย will come into effect on August ...
Who Knew? Domain Hijacking Is So Easy
Sydney, 13 August: ย Researchers at Infoblox and Eclypsium have discovered that a powerful attack vector in the domain name system (DNS) is being widely exploited across many DNS providers. We have found that over a dozen Russian-nexus cybercriminal actors are using this attack vector to hijack domain names without being noticed. We call this ...
Palo Alto Networks Rolls Out Secure AI by Design Portfolio
Availability of industryโs first AI-powered cybersecurity solutions to defend against AI threats, safeguard models, and enable controls and visibility
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..