The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

The Hidden Cost of Cybersecurity Inefficiency
Leaders must rethink how their teams manage data, automate response and validate defences. Consolidating platforms, investing in real-time analytics, and embedding AI into workflows can deliver both faster protection and meaningful cost reduction.

There’s no Physical and Cyber, it’s just ‘Security’
Christian Morin, Chief Security Officer at Genetec, knows the convergence in this space better than most. The adage of “set and forget” is the norm and the line between physical and cybersecurity blurs with every connected device in the industry as we know it, is shifting. The main question isn’t whether organisations can respond to breaches, but ...

Standing Privilege Is Silent Security Debt Carried By Many Australian Organisations
By combining JIT, CIEM and ITDR, Australian organisations can drastically minimise their exposure to the risks of stolen credentials, data breaches, and privilege abuse.

Crisis Leadership in Uncertain Times: Why People, Practice, and Policy Matter Most
We live in times like we are always on the edge of a crisis. Whether it is due to public health issues, geopolitical instability, economic volatility, or an increase in sophisticated cyber threats, uncertainty has become our constant companion.
Effective leadership in this kind of environment is a fundamental shift not just in our leadership ...

Awareness to Action – Building a Culture of Cybersecurity at SMBs
While large enterprises often have the financial resources and personnel to build robust cyber defences, SMBs are still disproportionately exposed. With tighter budgets and fewer dedicated staff, smaller organisations can find it challenging to prioritise cybersecurity alongside other pressing business needs. Therefore as we progress through 2025, the ...

Why Australia Must Shift from Reactive to Resilient Cybersecurity
Recent data highlights that the old playbook of manual threat hunting for organisations is over. Traditional defences are no longer effective and organisations need to expand on the ASD's mandate and adopt a new mindset to build true cyber resilience.

Fortinet CISO’s 2026 cybersecurity predictions: Artificial intelligence, geopolitics, and the new era of resilience
CISO predictions for 2026 | Artificial intelligence, geopolitics, and the new era of cyber resilience

The Identity Crisis CISOs Can No Longer Ignore
As 2026 budgeting ramps up, CISOs are under renewed pressure to cut costs without compromising security. Boards are demanding measurable ROI, while digital transformation efforts, increasingly driven by AI, continue to accelerate. Yet one critical area remains overlooked. Identity security is too often seen as a technical layer, rather than what it ...
No results found.
In The News
Barracuda Research Introduces GhostFrame – A Super Stealthy New Phishing Kit Behind a Million Attacks
Barracuda has published details of a new, evasive and stealthy phishing-as-a-service (PhaaS) kit that hides its malicious content in web page iframes to bypass detection and maximise flexibility. This is the first time Barracuda has seen an entire phishing framework built around the iframe technique. Threat analysts have been tracking the new PhaaS ...
Manufacturing Industry Blocks More Ransomware Attempts, While Adversaries Shift to Data Theft
Sophos has announced new findings from the Sophos State of Ransomware in Manufacturing and Production 2025 report. The study reveals that manufacturers are stopping more ransomware attacks before data can be encrypted; however, adversaries are increasingly stealing data and using extortion-only tactics to maintain pressure. As a result, more than half ...
Darktrace Releases New Innovations in Darktrace / EMAIL™ to Stop Emerging Cross-Domain Attacks and Protect Outbound Trust
New research finds approximately 17% of email threats bypass Secure Email Gateways but are stopped by Darktrace’s AI[1]
New enhancements strengthen protection against threats that move across channels, like email bombing campaigns, as the volume of these attacks surges 100x
New brand verification capabilities introduced as phishing attacks ...
Unveiling WARP PANDA: A New Sophisticated China-Nexus Adversary
Throughout 2025, CrowdStrike has identified multiple intrusions targeting VMware vCenter environments at U.S.-based entities, in which newly identified China-nexus adversary WARP PANDA deployed BRICKSTORM malware. WARP PANDA exhibits a high level of technical sophistication, advanced operations security (OPSEC) skills, and extensive knowledge of cloud ...
Trend Micro Predicts 2026 as the Year Scams Become AI-Driven, AI-Scaled, and Emotion-Engineered
Trend Micro Predicts 2026 as the Year Scams Become AI-Driven, AI-Scaled, and Emotion-Engineered
Email Threat Radar – December
Email Threat Radar – December 2025
Notable threats targeting organisations seen by Barracuda Managed XDR
Dynatrace Expands AWS Integrations at re:Invent 2025
BOSTON, Mass., December 3, 2025 — Today at Amazon Web Services (AWS) re:Invent 2025, Dynatrace (NYSE: DT) announced expanded integrations with advanced AWS technologies and new achievements with AWS that deliver enhanced AI-driven observability, automation, and security to customers worldwide. These advancements help enterprises running workloads on ...
Datadog Announces Expanded Collaboration with AWS, Highlighting New AI, Observability and Security Capabilities at AWS re:Invent
Datadog signs new Strategic Collaboration Agreement with AWS, building on 10+ years of joint innovation and outcomes for customers
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
