The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Janice Le – GM, Microsoft Security, Compliance, Identity & Privacy

Janice Le – GM, Microsoft Security, Compliance, Identity & Privacy

Watch the Interview  Biography Janice is GM, Microsoft Security Compliance, Identity & Privacy at Microsoft where she oversees strategy, operations, and portfolio marketing for Microsoft Security. She has served the tech industry in Silicon Valley over the last 20+ years at enterprises and startups in product, marketing, and GM roles for ...
The End of Pentest Reporting Chaos: OWASP Standardises the Industry

The End of Pentest Reporting Chaos: OWASP Standardises the Industry

For years, penetration testing reports have been inconsistent, manual, and difficult to integrate into modern security workflows. Every provider has its own format, slowing down remediation and making automation nearly impossible. The OWASP Penetration Test Reporting Standard (OPTRS) is designed to fix this. It provides a structured, machine-readable ...
2024 Lessons Shaping 2025 Cybersecurity Trends

2024 Lessons Shaping 2025 Cybersecurity Trends

Discover key lessons from 2024 cyberattacks and how they’ll shape 2025 cybersecurity trends. Learn to build resilience with breach ready defenses.
Navigating and Combatting Scams in Banking

Navigating and Combatting Scams in Banking

By adopting a comprehensive cybersecurity strategy that integrates multiple data sources and streams and enhances the digital experience, banks can significantly bolster their defences and protect their customers.
The Two Forces Reshaping Our Cyber Defences for the Better

The Two Forces Reshaping Our Cyber Defences for the Better

Introduction It’s very hard to catch a ball in flight without being able to make real-time calculations based on a continuous and uninterrupted stream of information from your eyes to your brain. The same can be said for cyber security. It’s tough to catch threats in play without truly real-time data. The need for real-time data and data processing ...
Understanding the Risks Associated With ‘Shadow AI’ in Software Development

Understanding the Risks Associated With ‘Shadow AI’ in Software Development

There are ways for CISOs to bring AI-assisted coding out of the shadows, allowing staff to get the most out of productivity benefits while avoiding vulnerabilities. This can be done by embracing it – as opposed to blanket suppression – and pursuing a three-point plan to establish reasonable guardrails and raise security awareness capabilities among ...
Six Trends Shaping the Future of the Security Industry in 2025

Six Trends Shaping the Future of the Security Industry in 2025

In 2025, security will be transformed by hybrid architectures, advanced AI, and high-resolution imaging, enabling smarter, more flexible systems. Security technologies will deliver business intelligence, while software-driven solutions and core technology ownership ensure resilience, efficiency, and innovation.
Malicious AdTech and Compromised Websites: A Dangerous Combination

Malicious AdTech and Compromised Websites: A Dangerous Combination

In the security industry, we rarely tell a story from the victim’s perspective. Instead, we focus on a malicious actor’s perspective: their tactics, techniques, and procedures (TTPs). So, I decided to take a turn as a victim and see what happened after visiting a compromised website with malicious adtech.
No results found.

In the News

Aon Appoints Alistair Clarke as Head of Specialty in Australia

Aon Appoints Alistair Clarke as Head of Specialty in Australia

Aon plc (NYSE: AON), a leading global professional services firm, has announced the appointment of Alistair Clarke as Head of Specialty for Aon in Australia. Clarke will lead Aon’s national Specialty portfolio, supporting clients across complex, high‑risk and regulated industries including cyber, mergers and acquisitions, trade credit, surety and ...
Quorum Cyber’s 2026 Global Cyber Risk Outlook Reveals Cyber Crime Enters an Industrial Phase

Quorum Cyber’s 2026 Global Cyber Risk Outlook Reveals Cyber Crime Enters an Industrial Phase

The number of newly formed ransomware groups increased by 30% in the year to October 2025 Global vulnerability disclosures rose 21%, surpassing 35,000 Early evidence of a nation-state group using AI agents to automate up to 90% of an intrusion Cybercriminals are increasingly shifting away from encryption toward faster, lower-cost data exfiltration ...
One-click Cyber Flaw Found in CCTV Software Protecting Australia’s Critical Infrastructure

One-click Cyber Flaw Found in CCTV Software Protecting Australia’s Critical Infrastructure

SUMMARY - New Architecture, New Risks: One-Click to Pwn IDIS IP Cameras As part of our ongoing research into modern cloud-enabled surveillance ecosystems, we turned our attention to a major vendor in the surveillance domain, IDIS. IDIS is a global video surveillance manufacturer headquartered in South Korea. IDIS manufactures an end-to-end solution of ...
Netpoleon and Hack the Box Partner to Strengthen Cybersecurity Skills Across Australia and New Zealand

Netpoleon and Hack the Box Partner to Strengthen Cybersecurity Skills Across Australia and New Zealand

Sydney, Australia – February 3rd – Netpoleon, a leading value-added distributor of cybersecurity and networking solutions across Asia Pacific, has announced a strategic partnership with Hack The Box (HTB) to deliver advanced cybersecurity education and workforce development solutions to organisations across Australia and New Zealand. The partnership ...
Dynatrace Expands Cloud Operations Capabilities With New Integrations Across AWS, Azure, and Google Cloud

Dynatrace Expands Cloud Operations Capabilities With New Integrations Across AWS, Azure, and Google Cloud

New cloud-native integrations give enterprises a clearer, unified view across multi-cloud environments
Nozomi Networks Enters Next Phase of Growth as Mitsubishi Electric Completes Acquisition

Nozomi Networks Enters Next Phase of Growth as Mitsubishi Electric Completes Acquisition

Operating independently as a wholly owned subsidiary, Nozomi Networks - which recently surpassed $100M in revenue - will continue delivering vendor agnostic OT/IoT cybersecurity solutions to its global customer and partner community.
LABYRINTH CHOLLIMA Evolves Into Three Adversaries

LABYRINTH CHOLLIMA Evolves Into Three Adversaries

LABYRINTH CHOLLIMA has evolved into three distinct adversaries with specialized malware, objectives, and tradecraft: GOLDEN CHOLLIMA and PRESSURE CHOLLIMA now likely operate separately from the core LABYRINTH CHOLLIMA group. GOLDEN CHOLLIMA and PRESSURE CHOLLIMA target cryptocurrency entities and are distinguished by the scale and scope of their ...
New ISACA Study: Privacy Teams Are Shrinking, Increasingly Stressed

New ISACA Study: Privacy Teams Are Shrinking, Increasingly Stressed

ISACA’s 2026 State of Privacy survey report warns privacy risk is becoming a broader business issue as privacy resources tighten across the region.
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This