The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

The Persistent Challenge: Cybersecurity in the Era of Hybrid Work

The Persistent Challenge: Cybersecurity in the Era of Hybrid Work

As businesses balance between office returns and remote work, cybersecurity challenges remain a critical concern for IT managers. Strategies to secure remote workforces against evolving threats like phishing, credential theft, and ransomware remain difficult, but essential.
The Invisible Battlefield: The “Grey Zone” Warfare Threatening Global Stability

The Invisible Battlefield: The “Grey Zone” Warfare Threatening Global Stability

Recently, KBI.Media was included in the AUKUS Advanced Technology Dialogue here in Australia across Sydney and Canberra. Some of the dialogue is not allowed to be publicised, but some which can be shared premiered on podcast, KBKast. Former Deputy Director for Mission Integration at ODNI, Beth Sanner, made clear on an alarming but largely unseen ...
2025 Cybersecurity Predictions by Qualys

2025 Cybersecurity Predictions by Qualys

Richard Seiersen, Chief Risk Tech Officer at Qualys shares six key predictions for the cybersecurity industry in 2025.
2025 Cybersecurity Predictions by CyberArk

2025 Cybersecurity Predictions by CyberArk

The cybersecurity landscape is poised for transformative shifts in 2025 driven by technological innovation and evolving threats. As cybercriminals become more sophisticated, organisations must stay ahead by proactively adopting strategies that prioritise identity security and business resiliency. Thomas Fikentscher, CyberArk’s Area Vice President for ...
How Breach Readiness Will Shape Cyber Defense in 2025

How Breach Readiness Will Shape Cyber Defense in 2025

Rajesh Khazanchi, co-founder and CEO of ColorTokens, writes how breach ready strategies and AI-powered cyber defense can drive cyber resilience and protect your business.
AI Domination and Quantum Computing on the Horizon

AI Domination and Quantum Computing on the Horizon

Over the last few years we all know there has been transformative changes in the workplace, the critical role of technology, and the ongoing debate between remote and in-office work. Enterprises are still pushing for staff to come into the office more frequently and are finding persuasive ways to entice their employees back into the building. I sat ...
Human-centric Cybersecurity: The First Line of Defence

Human-centric Cybersecurity: The First Line of Defence

Introduction Australian organisations face an array of cybersecurity challenges that didn’t exist half a decade ago. And yet the reliance on traditional security and legacy systems is largely the status quo – often falling short in addressing the nuanced interplay between human behaviour and technological vulnerabilities. A New Approach Enter ...
Keeping the Public Safe From Festive Scams

Keeping the Public Safe From Festive Scams

"While the festive season should be a period of joy and goodwill, hackers are particularly active in Australia and have the ability to employ new, sophisticated tactics on consumers. One emerging trend we're seeing is the use of AI-powered tools, with deepfake technologies allowing hackers to create convincing face-swapped videos and the ability to ...
No results found.

In the News

Veeam Partners With ServiceNow to Power Data Resilience Processes and Workflows

Veeam Partners With ServiceNow to Power Data Resilience Processes and Workflows

New Veeam App helps organizations orchestrate and manage data protection for critical assets through ServiceNow, strengthening resilience and compliance Veeam® Software, the #1 global leader by market share in Data Resilience, today announced the Veeam App for ServiceNow, which helps organizations to integrate the management and ...
CrowdStrike Achieves 100% Detection and 100% Protection in Most Challenging MITRE Evaluations

CrowdStrike Achieves 100% Detection and 100% Protection in Most Challenging MITRE Evaluations

CrowdStrike embraces MITRE’s first real-world cross-domain attack simulation, delivering perfect scores with no false positives AUSTIN, Texas – December 10, 2025 – CrowdStrike (NASDAQ: CRWD) delivered 100% detection and 100% protection with no false positives in the 2025 MITRE ATT&CK® Enterprise Evaluations – the most technically demanding in ...
Wendy Komadina Appointed Darktrace VP ANZ to Spearhead Next Phase of Partner-Led Growth

Wendy Komadina Appointed Darktrace VP ANZ to Spearhead Next Phase of Partner-Led Growth

Darktrace is pleased to announce the appointment of highly respected Australian technology executive, Wendy Komadina, as Vice President, Australia and New Zealand (ANZ).
Trend Micro Honours Global Leaders in Cybersecurity With 2025 Global Customer Awards

Trend Micro Honours Global Leaders in Cybersecurity With 2025 Global Customer Awards

Vantage Markets was awarded Customer Innovator for going beyond standard cybersecurity implementations SYDNEY, December 11, 2025 – Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cybersecurity leader, today announced the recipients of its 2025 Trend Global Customer Awards, celebrating organisations worldwide for their corporate leadership, ...
New Research Reveals Australians and New Zealanders Are Ready for AI-Powered Emergency Response

New Research Reveals Australians and New Zealanders Are Ready for AI-Powered Emergency Response

86% willing to share real-time location data; strong support for AI to detect threats and accelerate response
Fake Leonardo DiCaprio Movie Torrent Spreads Agent Tesla Trojan Through Layered PowerShell Chain

Fake Leonardo DiCaprio Movie Torrent Spreads Agent Tesla Trojan Through Layered PowerShell Chain

After noticing a spike in detections involving what looked like a movie torrent for One Battle After Another, Bitdefender researchers started an investigation and discovered that it was a complex infection chain. The film, Leonardo DiCaprio's latest, has quickly gained notoriety, making it an attractive lure for cybercriminals seeking to infect as ...
Tenable Patch Tuesday Commentary – December 2025

Tenable Patch Tuesday Commentary – December 2025

In the last Patch Tuesday for 2025, Microsoft addresses 56 CVEs, including two publicly disclosed vulnerabilities and one zero-day that was exploited in the wild. Elevation of privilege (EoP) vulnerabilities accounted for 50% of the vulnerabilities patched this month, followed by remote code execution (RCE) vulnerabilities at 33.9%. Please find below a ...
CrowdStrike Research: Security Flaws in DeepSeek-Generated Code Linked to Political Triggers

CrowdStrike Research: Security Flaws in DeepSeek-Generated Code Linked to Political Triggers

CrowdStrike Counter Adversary Operations identifies innocuous trigger words that lead DeepSeek to produce more vulnerable code.
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This