The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Ransom Data Should Be Made Public

Ransom Data Should Be Made Public

The Government should consider making data on ransoms paid for cyber attacks public to educate industry about the scale of the problem.
Cybersecurity in the Age of AI

Cybersecurity in the Age of AI

Venky Raju, Field CTO, ColorTokens, writes on why AI-powered threats demand a shift in breach readiness strategies and how microsegmentation can help.
Selling Ransomware Breaches: 4 Trends Spotted on the RAMP Forum

Selling Ransomware Breaches: 4 Trends Spotted on the RAMP Forum

The sale and purchase of unauthorised access to compromised enterprise networks has become a linchpin for cybercriminal operations, particularly in facilitating ransomware attacks. Underground forums are sharing guidelines on breaching networks and selling the access they obtain, leaving the exploitation to other malicious actors. In this article, we ...
The Role Of Data Resilience In AI And Cybersecurity

The Role Of Data Resilience In AI And Cybersecurity

Good AI and Cybersecurity Relies On Resilient Data General awareness of the technology landscape is currently driven by ongoing coverage on two sectors: AI and cybersecurity. AI has captured the attention of industry leaders and media alike resulting in comprehensive research initiatives such as those of the Australian National University, and ...
Cyber-insecurity – The Contact Centre Challenge (and Solution)

Cyber-insecurity – The Contact Centre Challenge (and Solution)

Introduction Contact centres are prime targets for cyberattacks due to the vast amounts of sensitive customer information they handle. Ensuring the security of this data is more than a technical challenge, it’s a critical business imperative. Consequently, the intersection of cybersecurity, contact centres, and artificial intelligence (AI) is ...
Securing IoMT Devices: Key Steps to Implementing Microsegmentation in Healthcare

Securing IoMT Devices: Key Steps to Implementing Microsegmentation in Healthcare

Learn how to secure IoMT healthcare devices with zero trust microsegmentation. Discover key steps for visibility, segmentation, and continuous monitoring.
From Click to Chaos: Bouncing Around in Malicious Traffic Distribution Systems

From Click to Chaos: Bouncing Around in Malicious Traffic Distribution Systems

Malicious traffic distribution systems (TDSs) have flown under the radar of most cybersecurity organisations for years: they have been largely ignored and thought of as simply advertising networks or “adware”, a term associated with nuisances and not threats. Cybercriminals have used this to their advantage and have built massive networks of domains ...
Disrupting The Cost Trajectory: Five Ways To Maximise Your Digital Transformation ROI

Disrupting The Cost Trajectory: Five Ways To Maximise Your Digital Transformation ROI

Technology leaders are increasingly asked to achieve more with fewer resources. Coupled with skills shortages, limited budgets, and outdated digital assets, striking this balance has never been more critical. The question - how can technology leaders realign their resources into high-value projects that deliver more for less? Here's five ways to drive ...
No results found.

In The News

Qualys Unveils Industry’s First Agentic AI-Powered Risk Operations Centre Delivering Autonomous Risk Management

Qualys Unveils Industry’s First Agentic AI-Powered Risk Operations Centre Delivering Autonomous Risk Management

New approach introduces a marketplace of Cyber Risk AI Agents that autonomously drive every step of Cyber Risk Operations—dramatically improving risk posture and reducing operational costs
BeyondTrust Research Exposes Hidden Privilege Threats: Secrets Are the New Identity Crisis Awaiting Agent

BeyondTrust Research Exposes Hidden Privilege Threats: Secrets Are the New Identity Crisis Awaiting Agent

New data from Identity Security Risk Assessments reveals critical blind spots in non-human identity posture BeyondTrust’s latest solution brings secrets into full view, just as Agentic AI spins up at scale
2025 CrowdStrike Threat Hunting Report: Adversaries Weaponize and Target AI at Scale

2025 CrowdStrike Threat Hunting Report: Adversaries Weaponize and Target AI at Scale

DPRK-nexus adversaries infiltrate 320+ companies using GenAI accelerated attacks; threat actors exploit AI agents, exposing autonomous systems as the next enterprise attack surface
Ransomware in the Crosshairs: Sophos and Halcyon Announce New Intelligence-Sharing and Mutual Anti-Tamper Protection Initiative

Ransomware in the Crosshairs: Sophos and Halcyon Announce New Intelligence-Sharing and Mutual Anti-Tamper Protection Initiative

Joint Collaboration Enables Real-Time Intelligence Sharing and Mutual Anti-Tamper Protections to Accelerate Ransomware Detection and Response
ASX Listed Excite Cyber Urges Australian Organisations to Adopt ISO 42001 Now to Prepare For Coming AI Regulation

ASX Listed Excite Cyber Urges Australian Organisations to Adopt ISO 42001 Now to Prepare For Coming AI Regulation

ASX listed cybersecurity firm, Excite Cyber is today urging Australian organisations to adopt ISO 42001 to ensure they are prepared for coming AI regulation.  
Barracuda Researchers Reveal New Emerging Email Threats Targeting Organisations Worldwide

Barracuda Researchers Reveal New Emerging Email Threats Targeting Organisations Worldwide

Email Threat Radar – July 2025 - During July, Barracuda threat analysts identified several notable email-based threats targeting organisations around the world. Many of them leveraged popular phishing-as-a-service (PhaaS) kits. The threats include: Tycoon PhaaS impersonating the Autodesk Construction Cloud for a credential phishing attack A ...
Trend Micro Reinvents Proactive Security with Digital Twin Technology

Trend Micro Reinvents Proactive Security with Digital Twin Technology

Innovation at the speed of agentic AI, built on NVIDIA AI, provides a data-driven foundation for supercharged decision-making
Nozomi Networks Names David Hope as Regional Vice President for APJ

Nozomi Networks Names David Hope as Regional Vice President for APJ

Industry veteran to lead APJ as Nozomi Networks expands regional investment to support growing demand in APJ.
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This