The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
How AI Can Advance Your SAP Security Posture
This article explores AI’s role in SAP Security, highlighting some SAP security platform challenges and the importance of system hardening against exploit chains within SAP vulnerabilities.
QR Code Phishing Attacks (Quishing): What To Know and How To Stay Secure
Another new kind of phishing attack is on the rise and it’s coming from an unexpected source: QR codes. Like with other kinds of phishing, this kind of attack leverages trust—trust in the QR code itself as well as the brand attached to it. So what does a QR-based phishing attack look like and how can you protect yourself one? Josh Cigna from Yubico ...

How Generative AI Can Lend A Helping Hand To IT Security Teams
As security teams continue their constant battle against evolving threats and attackers, growing numbers are exploring the assistance that can be provided by new generative AI tools.
Why Taking A Customer-Centric Approach To Cybersecurity Incident Response Is Critical To Maintain Customer Trust
Introduction
Cybersecurity is no longer just an IT issue; it directly impacts customer trust and loyalty. Customers expect their data to be secure and any breach can lead to a significant loss of customer confidence that impacts a company’s reputation and profitability. The increasing importance of regulatory compliance and legal obligations (1) mean ...

Why Agile Learning is Vital for Secure Software Development
Agile learning has emerged as a critical training methodology for high-impact upskilling of software development teams

Romantic Chatbots – To Be, or Not To Be
‘Digital companionship’ has transcended science fiction. It’s now in a fledgling state, driven by a flourishing, if somewhat opportunistic, zeitgeist of AI-driven everything.
Chatbots have been around for a long time, digitally speaking - nearly 60 years in fact since ELIZA was first created. And like most technologies, it eventually - and ...

Modern Threats Need Modern Defences – Why We Need To Modernise Cybersecurity
With the benefit of hindsight, we can now look back and understand some of the cyber security missteps of 2023 to understand what we’re missing and how we can learn from our mistakes. We see artificial intelligence adding real tangible value in our efforts to increase defences around risk scoring and create efficiencies in threat hunting – meaning ...

How Organisations Can Combat the Surge in Phishing Attacks
As we rapidly progress into the digital era, Australia aims to become a world leader in cyber security by 2030. However, the threat of cybercrime continues to grow at an alarming rate. Australia has continued to see high-profile breaches leaving Australians’ sensitive data vulnerable and exploited, with some impacted falling victim to several breaches ...
No results found.
In The News
Check Point to Acquire Veriti to Transform Threat Exposure Management and Reduce Organisations’ Cyber Attack Surface
Veriti is the first to introduce pre-emptive exposure management delivering automated remediation of threat exposure risks and collaborative threat prevention across complex multi-vendor environments
Trend Micro Offers Enterprise AI Security Platform Across Data in Cloud Or On Premises
AI security solution integrated with NVIDIA Enterprise AI Factory validated design
SYDNEY, MAY 20, 2025 – Global enterprise cybersecurity leader Trend Micro Incorporated (TYO: 4704; TSE: 4704) today announced its bringing powerful and simplified security capabilities to NVIDIA Enterprise AI Factory validated design, helping organisations worldwide ...
Elastic Brings Hybrid Retrieval to Microsoft Semantic Kernel
Elastic is the first vector database to support blended text and semantic retrieval techniques for .NET developers for more relevant, accurate results for search queries
ESET Research APT Report: Russian cyberattacks in Ukraine intensify; Sandworm unleashes new destructive wiper
ESET Research has released its latest APT Activity Report, which highlights activities of select APT groups that were documented by ESET researchers from October 2024 through March 2025.
Tenable Comment on ACSC’s joint advisory: Russian GRU targeting Western logistics entities and technology companies
Issued on 22 May 2025, a joint advisory from ASD’s ACSC, CISA, NSA, FBI and more than a dozen allied agencies warning that Russia’s GRU Unit 26165 (APT28/Fancy Bear) has been spying on Western logistics and technology firms supporting aid to Ukraine since 2022, using password-spray and spear-phishing campaigns plus exploits for Outlook, WinRAR, ...
BeyondTrust Recognised as an Overall Leader in KuppingerCole Leadership Compass for Secrets Management
BeyondTrust’s forward-looking approach to securing human and non-human identities earns high marks from analyst firm
Report highlights BeyondTrust’s scalability, native integrations, and developer-friendly approach to secure machine and application secrets
APT28 Escalates Cyber-Espionage Campaign Targeting Ukraine Aid Logistics
A Russian military cyber unit, known as APT28 or "Fancy Bear," has intensified its cyber-espionage efforts against organisations supporting Ukraine, according to a joint advisory issued by the UK's National Cyber Security Centre (NCSC) and allied intelligence agencies including the US and Australia.
Operating under Russia’s military intelligence ...

Gigamon 2025 Survey: 91 Percent Of Security Leaders Are Recalibrating Hybrid Cloud Risk In The AI Era
New research shows AI is driving cybersecurity compromises amid rising data volumes, LLM threats, and growing public cloud concerns
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..