The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

From Click to Chaos: Bouncing Around in Malicious Traffic Distribution Systems

From Click to Chaos: Bouncing Around in Malicious Traffic Distribution Systems

Malicious traffic distribution systems (TDSs) have flown under the radar of most cybersecurity organisations for years: they have been largely ignored and thought of as simply advertising networks or “adware”, a term associated with nuisances and not threats. Cybercriminals have used this to their advantage and have built massive networks of domains ...
Disrupting The Cost Trajectory: Five Ways To Maximise Your Digital Transformation ROI

Disrupting The Cost Trajectory: Five Ways To Maximise Your Digital Transformation ROI

Technology leaders are increasingly asked to achieve more with fewer resources. Coupled with skills shortages, limited budgets, and outdated digital assets, striking this balance has never been more critical. The question - how can technology leaders realign their resources into high-value projects that deliver more for less? Here's five ways to drive ...
How To Strike Back Against Phishing And Takedown Fraudulent Websites In The Battle Against Escalating Cyber Crime

How To Strike Back Against Phishing And Takedown Fraudulent Websites In The Battle Against Escalating Cyber Crime

Phishing takedown services are a critical element of our fight against threat actors. The ungoverned and distributed nature of the Internet makes this challenging but organisations, such as AUSCERT, are critical and take down thousands of phishing and scam sites every year.
Rome was not Built in a Day. Security is not Built in a Day

Rome was not Built in a Day. Security is not Built in a Day

Trust and security - something we often hear hand in hand. But what does this really mean?Wendy Thomas, Chief Executive Officer from Secureworks discusses her theory around ‘rethinking trust’. Thomas voices her opinion on the dire need for companies to exhibit genuine change and sustained effort over time. You’ve got to walk the walk. Virtue ...
Lessons In Improving Cyber Defences For Australian Organisations Through People, Processes, And Technology

Lessons In Improving Cyber Defences For Australian Organisations Through People, Processes, And Technology

Australian businesses face a growing number of cyberthreats as the digital landscape evolves. Malicious threat actors have become increasingly sophisticated, particularly with the help of artificial intelligence (AI). Their attacks are also more targeted and include info stealer malware, AI powered impersonations, and ransomware. The Logicalis CIO ...
Why It Takes More Than Phishing Tests To Build A Cyber Aware Culture

Why It Takes More Than Phishing Tests To Build A Cyber Aware Culture

A strong cybersecurity posture is as much about culture as it is about technology. In the 2022-23 financial year, 78 per cent of Australian businesses offered annual cybersecurity training to their entire workforce; however, only 39 per cent of these businesses provided specialised training for privileged users who are authorised to perform ...
Cybersecurity Needs An Image Make-Over To Attract The Diverse Skills Needed To Protect Our Nation

Cybersecurity Needs An Image Make-Over To Attract The Diverse Skills Needed To Protect Our Nation

There is no single silver bullet that can solve this problem. Tackling the cybersecurity shortage requires a multi-faceted approach that attracts new workers to the industry. These efforts must provide multiple entry points to attract workers to minimise the impact of the current, acute need and create pathways to make cybersecurity attractive, so ...
Is a Vendor SOC-as-a-Service Offering Something That Should Be Seriously Considered?

Is a Vendor SOC-as-a-Service Offering Something That Should Be Seriously Considered?

Introduction In today’s increasingly complex cybersecurity landscape, organisations face an ever-growing number of threats. Cybercriminals are becoming more sophisticated, and the costs associated with a breach can be catastrophic. To combat these challenges, many organisations are turning to Security Operations Centre (SOC) as a Service, an ...
No results found.

In The News

AI-driven Cyber Attacks and Supply Chain Vulnerabilities Escalate Risk Landscape In Australia, Aon Report Finds

AI-driven Cyber Attacks and Supply Chain Vulnerabilities Escalate Risk Landscape In Australia, Aon Report Finds

Aon plc (NYSE: AON), a leading global professional services firm, has released the Australia-specific findings from its 2025 Cyber Risk Report. The report highlights the growing impact of artificial intelligence (AI)-enabled cyber attacks and the increasing exposure created by third-party technology supply chains. The report reveals that Australian ...
BioCatch Trust™ Wins Datos Insights Impact Award for Best Scam-prevention Solution

BioCatch Trust™ Wins Datos Insights Impact Award for Best Scam-prevention Solution

Trust Australia evaluates $320 billion in payments with exceptional scam-detection rates
Semperis Releases New ‘Service Account Protection Essential’ Platform to Secure Active Directory Service Accounts

Semperis Releases New ‘Service Account Protection Essential’ Platform to Secure Active Directory Service Accounts

The new edition of DSP, Semperis’ comprehensive identity threat detection and response platform, helps organisations understand and improve service account security posture with comprehensive visibility, continuous monitoring, and real-time alerting
HID Unveils Advanced Biometric Facial Recognition and New Passwordless Authentication Technology at the Security Exhibition & Conference in Sydney – HID to showcase innovative identity and access technologies

HID Unveils Advanced Biometric Facial Recognition and New Passwordless Authentication Technology at the Security Exhibition & Conference in Sydney – HID to showcase innovative identity and access technologies

HID, a global leader in trusted identity and access control solutions will unveil HID Amico™ biometric facial recognition readers and the new portable OMNIKEY® SE Plug  authentication reader at the 2025 Security Exhibition & Conference in Sydney on August 27. The newly launched FIDO-enabled cards and Mercury Intelligent controllers will also be ...
Darktrace and SB C&S Corp Enter Into Distributor Agreement

Darktrace and SB C&S Corp Enter Into Distributor Agreement

Darktrace Limited (hereinafter “Darktrace”) and SB C&S Corp. (hereinafter “SB C&S”) have entered into a distribution agreement to provide Darktrace's innovative AI-based “ActiveAI Security Platform” to companies in Japan and will begin handling the product on August 20, 2025. In recent years, the frequency of cyber security incidents has ...
Rapid7 Launches Vector Command Advanced, Empowering Security Teams to Understand and Validate Exposures with Expertise of Elite Red Teamers

Rapid7 Launches Vector Command Advanced, Empowering Security Teams to Understand and Validate Exposures with Expertise of Elite Red Teamers

Rapid7 has launched Vector Command Advanced, expanding its continuous red teaming and exposure validation service.
LevelBlue Completes Acquisition of Trustwave to Form the World’s Largest Pure-Play Managed Security Services Provider

LevelBlue Completes Acquisition of Trustwave to Form the World’s Largest Pure-Play Managed Security Services Provider

August 20, 2025 – LevelBlue, a global leader in cloud-based, artificial intelligence (AI)-driven managed security services (MSS), has completed its acquisition of Trustwave, a global provider of cybersecurity and managed detection and response (MDR) leader. Today’s acquisition establishes LevelBlue as the world’s largest pure-play MSSP with the ...
New Fastly Threat Research Reveals AI Crawlers Make Up Almost 80% of AI Bot Traffic, Meta Leads AI Crawling As ChatGPT Dominates Real-Time Web Traffic

New Fastly Threat Research Reveals AI Crawlers Make Up Almost 80% of AI Bot Traffic, Meta Leads AI Crawling As ChatGPT Dominates Real-Time Web Traffic

AI bots are driving increased content scraping, operational load, and high-frequency access patterns, revealing emerging risks from unverified automation traffic.
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This