The Voice of Cyberยฎ
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
Norton Consumer Cyber Safety Pulse Report: Scammers Up Their Game With New AI Tools
Hereโs what you need to know to stay safe from cybercriminals using ChatGPT to create deepfake chatbots, phishing campaigns and malware
Sydney, March 2, 2023 โ The global research team from Norton, a consumer Cyber Safety brand of Genโข (NASDAQ: GEN), today released its quarterly Consumer Cyber Safety Pulse Report, detailing how cybercriminals can use ...
Album Stealer Targets Facebook Adult-Only Content Seekers
The Album Stealer cyber-attack is initiated by creating fake Facebook profiles that use adult content to lure unsuspecting victims into downloading an album. Once the victim clicks the link, they are redirected to a zip file hosted on Microsoft OneDrive or another site. To avoid detection, threat actors use side-loading techniques and obfuscation to ...
2023 CrowdStrike Global Threat Report Reveals Sophisticated Adversaries Re-exploiting and Re-weaponizing Patched Vulnerabilities and Moving Beyond Ransomware
CrowdStrike, a global cybersecurity leader, today released its 9th annual Global Threat Report, highlighting key trends and cyber threats facing Australia, and revealing the sectors most under threat by Chinese state-sponsored cyber espionage operations.
Rapid7 Vulnerability Intelligence Report Shows Attackers Developing and Deploying Exploits Faster Than Ever
Analysis of security vulnerability trends shows an 87% increase in first-week exploitation since 2020
Security Emerges As A Critical Input To User Experience Decisions
Security is shifting even further โleftโ, away from developers and into the design thinking of CX and UX
teams, writes Ping Identityโs Head of APAC & Japan Ashley Diffey.
IBM Report: Ransomware Persisted Despite Improved Detection in 2022
Manufacturing Most Extorted Industry; Email Thread Hijacking Attempts Spike; Time to Ransom Moves from Months to Days.
Synopsys Study Underscores Need for Comprehensive SBOM as Best Defence in Software Supply Chain Security
84% of codebases contained at least one known open source vulnerability, an almost 4% increase from last yearโs findings.
Haste Is Waste! Is Google’s Fear Of Missing Out Hurting The Holistic Development Of Artificial Intelligence (AI)
23 Feb 2023 6:00 AM
Dr Samar Fatima, Research Fellow, Enterprise AI and Data Analytics Hubย
Topics:โฏGoogle, Bard, AI, artificial intelligence, ChatGPTย
โThe race for search engine supremacy is getting fierce amongst tech giants with the release of Open AIโs ChatGPT instilling competitive fear in those bigger companies such as ...
In The News
Optus And Cisco Expand Partnership To Offer Strengthened Protection For Business Customers And Hybrid Workforce
โ Optus Secure Managed Network Services will provide a portfolio of network security services powered by Cisco.
โ Upgrade of the Optus Secure Network Operation Centre and a suite of new Cisco products will enhance network security for office-based customers and those with a hybrid workforce.
Rapid7 Completes IRAP PROTECTED Assessment
Rapid7 has announced the successful completion of an Information Security Registered Assessors Program (IRAP) assessment to the PROTECTED Level for key solutions within the Rapid7 Insight Platform.
Australian Government agencies can access the Rapid7 Insight Platform to keep pace with dynamic cloud environments and tackle an expanding attack surface
LogRhythmโs Machine Data Intelligence Fabric Empowers AI-Ready Organisations to Enter the Modern Era with Confidence
BROOMFIELD, Colo.โJuly 1, 2024โLogRhythm, the company helping security teams stop breaches by turning disconnected data and signals into trustworthy insights, today announced its ninth consecutive quarterly release. In the AI-ready world, LogRhythm empowers security teams with the highest integrity data in the security industry to enhance the output of ...
Motorola Solutions Acquires Noggin, a Global Provider of Critical Event Management Software
Motorola Solutions has acquired Noggin, a global provider of cloud-based business continuity planning, operational resilience and critical event management (CEM) software. The company is headquartered in Sydney, Australia, with a global footprint of customers.
Nogginโs software helps enterprises and critical infrastructure anticipate, prepare for ...
Rapid7 Agrees to Acquire Cyber Asset Attack Surface Management Company, Noetic Cyber, to Give Customers More Comprehensive Visibility of Their Attack Surface
Rapid7 Agrees to Acquire Cyber Asset Attack Surface Management Company, Noetic Cyber, to Give Customers More Comprehensive Visibility of Their Attack Surface
Rapid7 extends its security operations platform to unlock more accessible and accurate asset inventory for better security outcomes
ManageEngine Study Reveals Insufficient Visibility Into Business Processes and Infrastructure Automation in Australian SMEs
ManageEngine, today unveiled the findings of its comprehensive Digital Intensity in Australia Study,ย conducted by technology advisory firm, Ecosystm. As market competition increases, small to midsize enterprises (SMEs) in Australia are shifting to modern technology infrastructure to maintain their competitive edge. However, this surge in digital ...
Elastic Introduces Playground to Accelerate RAG Development with Elasticsearch
A new interface enables developers to iterate and build RAG applications for A/B testing LLMs, tuning prompts and chunking data
AUSCERT Launches New Maturity Assessment Service To Help Organisations Improve Cybersecurity Posture
AUSCERT General Manager, Dr Ivano Bongiovanni, says the new Maturity Assessment Service will enable organisations of all sizes to take proactive steps to enhance their cybersecurity posture and mitigate cybersecurity risks.ย
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..