The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Ransomware Attacks: No Sector is Safe

Ransomware Attacks: No Sector is Safe

Ransomware attacks have been spreading like wildfire, infiltrating various sectors and leaving devastation in their wake. While industries like finance, critical infrastructure, and healthcare have long been the prime targets, a recent study reveals that the arts, entertainment, and recreation industry is not immune to these cyber threats. In this ...
Prioritising Data Protection: A Conversation with Rad Kanapathipillai on KBKast

Prioritising Data Protection: A Conversation with Rad Kanapathipillai on KBKast

Introduction In a recent episode of KBKast, Host Karissa Breen engaged in an interview with Rad Kanapathipillai, who works in the field of data protection. The episode delved deep into the critical importance of safeguarding sensitive data across all stages of development, shedding light on the challenges organisations face and the strategies needed ...
Australia Sanctions Russian Hacker

Australia Sanctions Russian Hacker

Australia has boldly stepped into the cyber battlefield, wielding its autonomous cyber sanctions framework as a weapon against cybercrime. This decisive move came after a Russian individual, Aleksandr Ermakov, was implicated in the cyberattack on Medibank Private, one of the country's largest healthcare networks. The sanctions, a first of their kind to ...
AI for Cybersecurity: Use With Caution

AI for Cybersecurity: Use With Caution

This article discusses the challenges and opportunities that AI poses to cybersecurity, specifically looking into how companies can approach it with caution.
Why Humans Are No Longer The Weakest Link In The Cyber Chain

Why Humans Are No Longer The Weakest Link In The Cyber Chain

We’ve all heard the mantra that ‘humans are the weakest link’ in any organisation’s cybersecurity defences, but with generative AI technology making exploits such as phishing email campaigns more convincing and scalable, it’s no longer fair — or effective — to blame individuals for succumbing to attacks. It’s Andrew’s view that while cyber training ...
Stream-Jacking 2.0: Deep fakes power account takeovers on YouTube to maximise crypto-doubling scams

Stream-Jacking 2.0: Deep fakes power account takeovers on YouTube to maximise crypto-doubling scams

Stream-Jacking & Deep fakes. If you ever observe content promoting giveaways or other events from well-known companies, always make sure to double-check the promotions on official websites.
Credential Stuffing – Industry Commentary from Tenable

Credential Stuffing – Industry Commentary from Tenable

Commentary on a new tactic scammers are employing called credential stuffing which is affecting the retail sector and can result in fraudulent transactions being made using payment information saved on popular retail sites.
Why Effective Digital ID Management is Vital in Financial Services

Why Effective Digital ID Management is Vital in Financial Services

Institutions that take digital ID seriously and put it at the forefront of application planning and deployment will be best placed to secure an increasing share of a rapidly growing market.
No results found.

In The News

Check Point and Wiz Enter Strategic Partnership to Deliver End-to-End Cloud Security

Check Point and Wiz Enter Strategic Partnership to Deliver End-to-End Cloud Security

The partnership integrates some of the best-in-class cloud network and CNAPP security through seamless technology integration and a strategic business alliance, setting a new standard for enterprise protection
Nozomi Networks Welcomes Schneider Electric to Its MSSP Elite Partner Program to Deliver Advanced Managed Security Services Worldwide

Nozomi Networks Welcomes Schneider Electric to Its MSSP Elite Partner Program to Deliver Advanced Managed Security Services Worldwide

New Full-Scale, Industrial-Focused Security Management Service Designed to Safeguard the Most Complex Operational Environments
New AI-Enhanced Romance Scams Are Stealing Aussie Hearts And Bank Accounts This Valentine’s Day

New AI-Enhanced Romance Scams Are Stealing Aussie Hearts And Bank Accounts This Valentine’s Day

Be cautious not to “swipe right” into scams as Valentine’s Day approaches. Researchers at Tenable®, Inc., the exposure management company, warn that romance scams continue to be the biggest consumer threat today.
Armis, the Cyber Exposure Management & Security Company appoints Alex Mosher as President

Armis, the Cyber Exposure Management & Security Company appoints Alex Mosher as President

Armis, the US$4.2b valued cybersecurity company, makes strategic unifying GTM change, as it continues to drive record growth
Pax8 Names Marianne Wolf as Chief Ethics and Compliance Officer

Pax8 Names Marianne Wolf as Chief Ethics and Compliance Officer

SYDNEY, AU (February 12, 2025) – Pax8, the leading cloud commerce marketplace, announced the appointment of Marianne Wolf as its Chief Ethics and Compliance Officer. In this role, Wolf is responsible for leading the global ethics and compliance program, which includes overseeing cross-functional internal teams responsible for managing the company’s ...
Data Security And Quality Challenges Slow Liquidity Ambitions As Australian Companies’ AI Plans Progress: Boomi Report

Data Security And Quality Challenges Slow Liquidity Ambitions As Australian Companies’ AI Plans Progress: Boomi Report

Sydney, Australia — February 12, 2025 — Boomi™, the intelligent integration and automation leader, has unveiled the Australian findings of its Data Liquidity Index Study, conducted by Hanover Research. The survey found strong data integration capabilities within Australian organisations, but identified gaps in liquidity as companies battle challenges ...
Tenable February 2025 Patch Tuesday Comment

Tenable February 2025 Patch Tuesday Comment

Microsoft patched 55 CVEs in its February 2025 Patch Tuesday release, with three rated critical and 52 rated as important. Our counts omitted one vulnerability reported by HackerOne. Remote code execution (RCE) vulnerabilities accounted for 38.2% of the vulnerabilities patched this month, followed by elevation of privilege (EoP) vulnerabilities at ...
Two Thirds of Australian Teens Experienced Online Risk Last Year, According to New Research From Microsoft

Two Thirds of Australian Teens Experienced Online Risk Last Year, According to New Research From Microsoft

64 percent of Australian teens experienced a risk online last year including cyberbullying, misinformation and disinformation, and threats of violence, according to Microsoft’s annual Global Online Safety Survey, released today.   The ninth iteration of Microsoft’s annual report, launched today on Safer Internet Day, reveals insights into how teens ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This