The Voice of Cyberยฎ

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

How Safe are bit.ly (or Tiny URL) Links?

How Safe are bit.ly (or Tiny URL) Links?

What are shortened or tiny URLs?In the world of shortcuts, how could URLs stay behind. With domain names getting stranger and web links getting obnoxiously longer, tiny URLs come to the rescue. These are like capsule covers that make medicines easy to digest. Usually web addresses are attached with a lot of information (called query string) that helps ...
How to remove the roadblocks to going passwordless

How to remove the roadblocks to going passwordless

The road to passwordless authentication is one most organisations will tread, but they may require guidance in some key areas along the way, writes Ash Diffey, Vice President Asia Pacific and Japan, Ping Identity
How to remove the roadblocks to going passwordless

How to remove the roadblocks to going passwordless

The road to passwordless authentication is one most organisations will tread, but they may require guidance in some key areas along the way, writes Ash Diffey, Vice President Asia Pacific and Japan, Ping Identity
How to protect against double-extortion ransomware attacks

How to protect against double-extortion ransomware attacks

Of all the cybersecurity challenges facing organisations today, one of the most pervasive is ransomware attacks.
How to protect against double-extortion ransomware attacks

How to protect against double-extortion ransomware attacks

Of all the cybersecurity challenges facing organisations today, one of the most pervasive is ransomware attacks.
Insikt Report – Deepfakes : I Have No Mouth, And I Must Do Crime

Insikt Report – Deepfakes : I Have No Mouth, And I Must Do Crime

Intelligence company Recorded Future today released the findings of its latest deepfakes research. Titled โ€œI Have No Mouth, And I Must Do Crimeโ€, the report looks at how the spread of deepfake technologies, specifically through advancements in AI-based voice cloning, is pushing scams to a new level.
Shadow API Usage Surges 900%, Revealing Alarming Lack of API Visibility Among Enterprise

Shadow API Usage Surges 900%, Revealing Alarming Lack of API Visibility Among Enterprise

New Research Highlights APIs are Now a Leading Attack Vector, Posing New and Significant Threats to Organisation
Rethinking how to engage Australian directors in security budget discussions

Rethinking how to engage Australian directors in security budget discussions

Boards are still fractured when it comes to cybersecurity capability, skills and buy-in, but there are ways for CISOs to navigate this to keep their programs funded.

In The News

The National Vulnerability Database (NVD) Crisis: Defend Against Unpatched Vulnerabilities

The National Vulnerability Database (NVD) Crisis: Defend Against Unpatched Vulnerabilities

Update on the National Vulnerability Database (NVD) Crisis and urgent need for virtual patching alternatives to cover the gap
Qualys Advances Enterprise TruRisk Platform to De-Risk Generative AI and LLM Usage from Security and Compliance Challenges

Qualys Advances Enterprise TruRisk Platform to De-Risk Generative AI and LLM Usage from Security and Compliance Challenges

New solution, Qualys TotalAI, enables holistic discovery and vulnerability assessment of AI workloads to detect data leaks, injection issues and model theft Qualys, Inc. (NASDAQ: QLYS), a leading provider of disruptive cloud-based IT, security and compliance solutions announced it is expanding its portfolio with Qualys TotalAI, designed to address ...
Rapid7 Launches the Command Platform, A Unified Attack Defense and Response Platform That Provides Better Visibility Across The Attack Surface

Rapid7 Launches the Command Platform, A Unified Attack Defense and Response Platform That Provides Better Visibility Across The Attack Surface

Rapid7 Command Platform provides a unified threat exposure, detection, and response platform so customers can integrate their critical security data to provide a unified view of vulnerabilities, exposures, and threats from endpoint to cloud to close security gaps and prevent attacks.
Tenable Unveils Industry Leading Vulnerability Intelligence Data and Response Capabilities to Expose and Close Priority Threats that Drive Up Risk

Tenable Unveils Industry Leading Vulnerability Intelligence Data and Response Capabilities to Expose and Close Priority Threats that Drive Up Risk

First-of-their-kind Vulnerability Intelligence and Exposure Response features deliver actionable intelligence across IT and cloud environments
BITS and Bytes: Analysing BITSLOTH, a newly identifiedย backdoor

BITS and Bytes: Analysing BITSLOTH, a newly identifiedย backdoor

Elastic Security Labs identified a novel Windows backdoor leveraging the Background Intelligent Transfer Service (BITS) for C2. This malware was found during a recent activity group tracked as REF8747.
Carers ACT Protects Vulnerable Australiansโ€™ Health Information With YubiKeys

Carers ACT Protects Vulnerable Australiansโ€™ Health Information With YubiKeys

Carers ACT, a major non-profit support provider for unpaid family and friend carers in the Australian Capital Territory (ACT), has deployed YubiKeys to its support workers to protect vulnerable Australians' health information. For over 30 years, Carers ACT has provided family and friend carers with a wide range of services to support their caring ...
blueAPACHE Appoints Pat Devlin To Leadership Team, Bringing Global Expertise To Local Operations

blueAPACHE Appoints Pat Devlin To Leadership Team, Bringing Global Expertise To Local Operations

Australian MSP hires Senior Director from HPE to head strategic growth ambitions
Fastly Reinforces Presence in Australia and New Zealand By Appointing Nueva as First Managed Security Partner

Fastly Reinforces Presence in Australia and New Zealand By Appointing Nueva as First Managed Security Partner

The partnership aims to deepen Fastly market penetration across both public and private sector enterprises

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This