The Voice of Cyberยฎ
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
How Safe are bit.ly (or Tiny URL) Links?
What are shortened or tiny URLs?In the world of shortcuts, how could URLs stay behind. With domain names getting stranger and web links getting obnoxiously longer, tiny URLs come to the rescue. These are like capsule covers that make medicines easy to digest. Usually web addresses are attached with a lot of information (called query string) that helps ...
How to remove the roadblocks to going passwordless
The road to passwordless authentication is one most organisations will tread, but they may require guidance in some key areas along the way, writes Ash Diffey, Vice President Asia Pacific and Japan, Ping Identity
How to remove the roadblocks to going passwordless
The road to passwordless authentication is one most organisations will tread, but they may require guidance in some key areas along the way, writes Ash Diffey, Vice President Asia Pacific and Japan, Ping Identity
How to protect against double-extortion ransomware attacks
Of all the cybersecurity challenges facing organisations today, one of the most pervasive is ransomware attacks.
How to protect against double-extortion ransomware attacks
Of all the cybersecurity challenges facing organisations today, one of the most pervasive is ransomware attacks.
Insikt Report – Deepfakes : I Have No Mouth, And I Must Do Crime
Intelligence company Recorded Future today released the findings of its latest deepfakes research. Titled โI Have No Mouth, And I Must Do Crimeโ, the report looks at how the spread of deepfake technologies, specifically through advancements in AI-based voice cloning, is pushing scams to a new level.
Shadow API Usage Surges 900%, Revealing Alarming Lack of API Visibility Among Enterprise
New Research Highlights APIs are Now a Leading Attack Vector, Posing New and Significant Threats to Organisation
Rethinking how to engage Australian directors in security budget discussions
Boards are still fractured when it comes to cybersecurity capability, skills and buy-in, but there are ways for CISOs to navigate this to keep their programs funded.
In The News
The National Vulnerability Database (NVD) Crisis: Defend Against Unpatched Vulnerabilities
Update on the National Vulnerability Database (NVD) Crisis and urgent need for virtual patching alternatives to cover the gap
Qualys Advances Enterprise TruRisk Platform to De-Risk Generative AI and LLM Usage from Security and Compliance Challenges
New solution, Qualys TotalAI, enables holistic discovery and vulnerability assessment of AI workloads to detect data leaks, injection issues and model theft
Qualys, Inc. (NASDAQ: QLYS), a leading provider of disruptive cloud-based IT, security and compliance solutions announced it is expanding its portfolio with Qualys TotalAI, designed to address ...
Rapid7 Launches the Command Platform, A Unified Attack Defense and Response Platform That Provides Better Visibility Across The Attack Surface
Rapid7 Command Platform provides a unified threat exposure, detection, and response platform so customers can integrate their critical security data to provide a unified view of vulnerabilities, exposures, and threats from endpoint to cloud to close security gaps and prevent attacks.
Tenable Unveils Industry Leading Vulnerability Intelligence Data and Response Capabilities to Expose and Close Priority Threats that Drive Up Risk
First-of-their-kind Vulnerability Intelligence and Exposure Response features deliver actionable intelligence across IT and cloud environments
BITS and Bytes: Analysing BITSLOTH, a newly identifiedย backdoor
Elastic Security Labs identified a novel Windows backdoor leveraging the Background Intelligent Transfer Service (BITS) for C2. This malware was found during a recent activity group tracked as REF8747.
Carers ACT Protects Vulnerable Australiansโ Health Information With YubiKeys
Carers ACT, a major non-profit support provider for unpaid family and friend carers in the Australian Capital Territory (ACT), has deployed YubiKeys to its support workers to protect vulnerable Australians' health information.
For over 30 years, Carers ACT has provided family and friend carers with a wide range of services to support their caring ...
blueAPACHE Appoints Pat Devlin To Leadership Team, Bringing Global Expertise To Local Operations
Australian MSP hires Senior Director from HPE to head strategic growth ambitions
Fastly Reinforces Presence in Australia and New Zealand By Appointing Nueva as First Managed Security Partner
The partnership aims to deepen Fastly market penetration across both public and private sector enterprises
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..