The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Cado Security Labs Releases Inaugural 2023 Cloud Threat Findings Report
Cado Security, provider of the first cloud forensics and incident response platform, today announced the release of Cado Security Labs 2023 Cloud Threat Findings Report. The report reveals noteworthy discoveries about the evolving cloud threat landscape, shedding light on the heightened risk of cyberattacks due to the rapid adoption of cloud-focused services.

Nozomi Labs Report Reveals Surge in OT & IoT Security Threats
In the first half of 2023, malware activity in OT and IoT environments worldwide jumped 10x and alerts on unwanted applications doubled as nation-states, criminal groups and hacktivists continue to target healthcare, energy and manufacturing.

Zscaler VPN Report Finds Nearly Half of Organizations Are Concerned About Enterprise Security Due to Unsafe VPNs
Insecure VPNs, Email, and End User Devices Identified as Primary Attack Vectors, Stressing the Need for a Zero Trust Architecture
Dragos Industrial Ransomware Attack Analysis: Q2 2023
Quarter two 2023 proved to be an exceptionally active period for ransomware groups, posing significant threats to industrial organisations and infrastructure, according to Dragos’ latest ransomware attack analysis.

Proofpoint: 78% of Australia’s Banks Are Not Proactively Blocking Fraudulent Emails
Proofpoint, Inc., a leading cybersecurity and compliance company, today released new research identifying that almost 4 out of 5 Australian-owned authorised deposit-taking institutions and foreign subsidiary banks are lagging behind on basic cybersecurity measures, subjecting customers, staff and stakeholders to a higher risk of email-based ...

Artificial Intelligence and AIOps May Be the Key to Understanding Today’s World of Exploding Data
“The Library of Babel” is an imaginary library containing countless rooms and books with every possible combination of letters and numbers.

Decoy Dog is No Ordinary Pupy – Infoblox Reveals Shift in Malware Tactics After Initial Discovery
Infoblox Inc., the company that delivers a simplified, cloud- enabled networking and security platform for improved performance and protection, today published a second threat report with critical updates on “Decoy Dog,” the remote access trojan (RAT) toolkit they discovered and disclosed in April 2023.

Ways to Reduce the Risk of Burnout in your IT Security Team
With organisations experiencing a constantly growing wave of cyberattacks, many IT security teams are feeling the pressure. Stressful work environments and long hours are resulting in staff feeling overwhelmed and burnt out.
No results found.
In The News
Informatica Tackles Microsoft Azure Megatrends of GenAI, Microsoft Fabric and Open Table Format with New Capabilities
The advanced solutions include an easy-to-implement Blueprint for Azure OpenAI Service, enhanced SQL ELT and support for Apache Iceberg open table format
Arctic Wolf Builds on the Arctic Wolf Aurora Platform with New Threat Intelligence Module
Arctic Wolf®, a global leader in security operations, today announced the expansion of the Arctic Wolf AuroraTM Platform with the addition of Arctic Wolf Threat Intelligence, a new module that allows organisations to stay ahead of threats by gaining access to real-time threat intelligence and curated reporting.
Threat Spotlight: Bad Bots are Evolving to Become More ‘Human’
The bot landscape is changing. Malicious — or bad bots — are evolving to become more advanced and human-like in their behavior, while an emerging category of AI bots, which we might think of as “grey bots,” is blurring the boundary of legitimate activity.
Barracuda security researchers analyzed bot-related traffic and activity targeting web ...
Rubrik Delivers Cyber Resilience Solution for Microsoft Azure Blob Storage
Rubrik, Inc. today announced a new cyber resilience solution for Microsoft Azure Blob Storage. As organisations become increasingly dependent on the cloud, there is an inherent risk for security blind spots and vulnerable sensitive data. Rubrik brings cyber posture and cyber recovery to provide Microsoft Azure Blob Storage customers further visibility ...
Threat Spotlight: Evolving ‘We Know Where You Live’ Tactics Personalize Sextortion Scams
Barracuda threat researchers have identified evolving tactics being used by cybercriminals in targeted sextortion scams. Criminals are now frequently using victims’ addresses and photos of their homes to better personalize sextortion phishing attacks and increase the pressure to pay. Extortion demands are also increasing from hundreds to thousands of ...
Cloudian Announces Support for NVIDIA GPUDirect Acceleration for Object Storage
Cloudian today announced its integration with NVIDIA Magnum IO™ GPUDirectÒ Storage technology, delivering breakthrough performance of over 200GB/s from a HyperStore system. Cloudian HyperStore® with GPUDirect access simplifies the management of AI training and inference datasets – at petabyte and exabyte scales – while reducing costs by eliminating the ...
KPMG in India Announces Alliance with SecurityBridge GmbH to Strengthen SAP Security
KPMG in India will make use of SecurityBridge’s SAP security platform to elevate its offerings. Together with SecurityBridge, it will look to offer services that are holistic in its approach all-encompassing, which would include threat monitoring real time and enhancing compliance capabilities.
Logicalis Australia Strengthens Shoalhaven City Council Disaster Recovery And Data Security With Azure
Melbourne, Australia – 19 November 2024: Logicalis Australia, a leading global technology services provider, has assisted Shoalhaven City Council in reviewing their disaster recovery procedures and protecting applications and corporate data by migrating servers to Microsoft Azure.
Shoalhaven City Council is a large regional council overseeing 50 ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..