The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
New Tenable Research Reveals Only 3% of Vulnerabilities Pose Significant Cybersecurity Risk
Company analysed 50 Trillion data points over two decades to identify critical vulnerabilities

From Dollars to Digital – Your Guide to Investing Safely
Australia has become a growing market for use of cryptocurrency with awareness amongst Australian consumers reaching a new high of 95 per cent. Despite this, recent 2024 data suggests almost half of the Australian population are hesitant to buy cryptocurrency. We know common misconceptions and reasons for the hesitancy include beliefs the pricing ...

The Evolving Threat Landscape Facing Australia’s Banks
The increasing reliance on digital and mobile banking has created new opportunities for fraudsters. While digital banking offers convenience and efficiency, it also introduces new vulnerabilities. The move away from in-person interactions has made it easier for cybercriminals to target individuals and carry out fraudulent activities online.

Why ‘Secure by Design’ Is Critical In Today’s Interconnected World
Organisations are currently unprepared to enact a high, consistent standard of software creation that follows secure-by-design principles. This needs to improve exponentially, and precision measurement of organisational security maturity—and individual developer security skills—will be paramount in facilitating the right growth and knowledge building.

Ransom Data Should Be Made Public
The Government should consider making data on ransoms paid for cyber attacks public to educate industry about the scale of the problem.

Cybersecurity in the Age of AI
Venky Raju, Field CTO, ColorTokens, writes on why AI-powered threats demand a shift in breach readiness strategies and how microsegmentation can help.

Selling Ransomware Breaches: 4 Trends Spotted on the RAMP Forum
The sale and purchase of unauthorised access to compromised enterprise networks has become a linchpin for cybercriminal operations, particularly in facilitating ransomware attacks. Underground forums are sharing guidelines on breaching networks and selling the access they obtain, leaving the exploitation to other malicious actors. In this article, we ...

The Role Of Data Resilience In AI And Cybersecurity
Good AI and Cybersecurity Relies On Resilient Data
General awareness of the technology landscape is currently driven by ongoing coverage on two sectors: AI and cybersecurity. AI has captured the attention of industry leaders and media alike resulting in comprehensive research initiatives such as those of the Australian National University, and ...
No results found.
In The News
Quorum Cyber Is A Proud Participant In The Microsoft Sentinel Partner Ecosystem
Quorum Cyber is working with Microsoft product teams to shape Sentinel product development, including validation of new scenarios, feedback on product operations, and API extensibility - while also extending Sentinel’s capabilities as part of the partner ecosystem. By creating solutions such as connectors, analytics, playbooks, hunting queries, Jupyter ...
Fastly Recognised as a Gartner® Peer Insights™ Customer’s Choice for Seventh Consecutive Year, Trusted By Customers for Cloud Web Application and API Protection
Sydney, 3 October 2025 - Fastly, Inc. (NYSE: FSLY), a leader in global edge cloud platforms, has announced that it was named a 2025 Gartner® Peer Insights™ Customers’ Choice for Cloud Web Application and API Protection (WAAP). Fastly received overall high ratings and is the only vendor to earn this recognition for seven consecutive years.
The ...
New Infoblox Research Uncovers DNS TXT Abuse in Stealth Malware Campaign Infecting Thousands of Sites
New Infoblox Threat Intel research reveals that a long-running threat actor compromising websites, coined as “Detour Dog,” has evolved from scam redirects to deliver information stealing malware. This allows compromised sites to fetch and relay malicious execution output without any visible cues to the user, all using the domain name system (DNS) for ...
Genetec Continues To Expand Its Share Of The Global Access Control Software Market, According To Latest Omdia Report
Company records strong organic market share gain worldwide, reflecting 20 years of access control innovation and rapid adoption of ACaaS solutions
Sophos Launches Advisory Services To Deliver Proactive Cybersecurity Resilience
Sophos today announced the launch of Sophos Advisory Services, a suite of security testing services designed to identify gaps in organisations’ security programs. These offerings – External Penetration Testing, Internal Penetration Testing, Wireless Network Penetration Testing, and Web Application Security Assessment – help fortify an organisation’s ...
Exabeam Delivers First Configurable Peer Benchmarking for CISO Decision-Making
New capabilities in the Exabeam Nova Advisor Agent and Outcomes Navigator operationalise benchmarking for proactive security operations
Ping Identity Survey Reveals Australian Consumer Trust Plummeting as Security Concerns Soar
With only 20% confident in spotting scams, Australians demand stronger AI security and regulation
C-Suite’s Rush to AI Blinds Leadership to Critical Security Failures, Leaving Organisations Exposed
With 34% of organisations suffering an AI-related breach, new Tenable report shows leadership is misjudging risk by focusing on reactive metrics instead of preventable threats
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
