The Voice of Cyberยฎ
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
Dog Scams
It is intriguing how people find so many ways to pull innocent people into emotional traps. These scammers strike at a time when people are most vulnerable and use techniques that seem completely harmless. One such scam that gained (un)popularity during the Covid-19 pandemic has been the dog or puppy scam, which still continues. What is the dog / ...
Report: โGlobal scam economyโ thriving in 2023
A payments study by Javelin Strategy & Research and SAS examines digital fraud trends worldwide, revealing eight expert strategies banks, retailers and other enterprises can use to fight back
Australians Believe Itโs Time for Mobile Development to Step In to Protect them From Data Breaches and Fraud: Appdome Survey
More than a quarter of Australian consumers fear their mobile apps will be breached and need mobile developers to invest more in delivering robust cyber protection in mobile apps, says market research sponsored by Appdome.
Generative AI: Putting it to Work to Improve IT Security
Since being unveiled to the public a little over six months ago, the generative AI platform ChatGPT has focused attention on the potential of artificial intelligence.
OT:ICEFALL โ New Vulnerabilities and Insights on OT Security Design and Patching
In Forescoutโs finalย OT:ICEFALLย report, Forescout Vedere Labs presents three new vulnerabilities and concludes the project after one year of research following the original disclosure.
Recap: Risk to Resilience – ANZ
Trend Micro is currently running one of the largest cybersecurity roadshows ever, the โRisk to Resilience World Tourโ covering more than 120 locations around the globe.ย
Virtual Patching
Scenario 1:MyBank Pty Ltd has 300+ critical legacy enterprise applications. Almost all of them were built by the then IT-savvy non-developers. They were built with limited or no design considerations. Security was not even a design-criteria back then. These applications continue to run either because they are now too complex, too critical, or the ...
Aligning Cybersecurity to Business Objectives Helps Drive Revenue Growth and Lower Costs of Breaches, Accenture Report Finds
Accenture State of Cyber Resilience 2023 report reveals key traits of โcyber transformers,โ who make cybersecurity the cornerstone of their business transformation efforts
In The News
Post-Quantum Cryptography Algorithms: Thales Warns Organisations That The Transition To PQC Requires Careful Preparation
ThaPost Quantum Cryptography (PQR) is soon going to put an end to the encryption foundations we have relied upon for decades, forcing organisations to completely rethink how they approach digital security.
There's been one more step in this post-quantum world becoming a reality earlier this week, with the National Institute of Standards and ...
Beyond the wail: deconstructing the BANSHEE infostealer
The BANSHEE malware is a macOS-based infostealer that targets system information, browser data, and cryptocurrency wallets.
Sophos Launches Dedicated Customer Success Team, Deepening Commitment to Customers and Channel Partners
Sophos is expanding its commitment to customers and channel partners with the launch of Sophos Customer Success. The new program features a team of experts who support customers throughout their post-sales experience with ongoing security resources and alerts, webinars and other educational information about cyberattacks, such as ransomware and data ...
Unit 42 Research Report Exposes Evolving Cybersecurity Risks Across Critical Industries
New insight reveals increasing complexity and exposure in attack surfaces driven by AI-generated threats
Palo Alto Networks, the global cybersecurity leader, today released its latest report, โ2024 Unit 42 Attack Surface Threat Reportโ, revealing the rapidly evolving landscape of cybersecurity threats. The study, drawn from several petabytes of data ...
Vista Group Boosts Cloud Operations and Secures IT Infrastructure with Support From ManageEngine
New-Zealand-founded Vista Group, a leading global provider of software and technology solutions across the film industry, obtainsย seamless resource management across multiple environments, proactive issue resolution, and assured compliance with help from ManageEngine.
Founded in 1996, Vista Group started when founder Murray Holdaway was tasked by a ...
Tenable Names Cloud Security Expert, Shai Morag, Chief Product Officer
Tenableยฎ, the exposure management company, today announced that it has named Shai Morag to the role of chief product officer. Morag will focus on delivering increased momentum and scale across Tenableโs entire portfolio, driving the companyโs next era of growth by building security products for a cloud-first world.
Morag joined Tenable in 2023 ...
Thalesโ 2024 Critical Infrastructure report shows a rise in attacks against critical sectors, and lack of response preparedness
Thalesย today releases the findings of itsย 2024 Critical Infrastructure report. Organisations acrossย energy and utilities, telecommunications, transportation and trucking/shippingย industries globally (including in Australia) have been surveyed.
This comes as Australiaโsย Security of Critical Infrastructure Act (SOCI)ย will come into effect on August ...
Who Knew? Domain Hijacking Is So Easy
Sydney, 13 August: ย Researchers at Infoblox and Eclypsium have discovered that a powerful attack vector in the domain name system (DNS) is being widely exploited across many DNS providers. We have found that over a dozen Russian-nexus cybercriminal actors are using this attack vector to hijack domain names without being noticed. We call this ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..