The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

The overlap between physical and digital security – how to get smart with compliance
Government reforms, such as the recent review of the Privacy Act that proposes significant changes to data is collected, stored, used and disposed of has put all organisations on notice. And while the focus often falls on personal identifiable information (PII), the scope of the current legislation and proposed changes impacts the collection of ...

Espionage Fuels Global Cyberattacks
In the past year cyberattacks have touched 120 countries, fueled by government-sponsored spying and with influence operations (IO) also rising.
Cybersecurity Incidents Are Now Full-Scale Crisis Management
Cybersecurity incidents have typically been viewed through a technical lens.

Research: A Deep Dive into Stream-Jacking Attacks on YouTube
Bitdefender has released new research highlighting a rapid increase in YouTube stream-jacking attacks.

Quality over Quantity: Algorithmic Transparency, accountability and Intellectual Property- A Call for Explainable AI
Our society is populated by artificial entities known as the programmable race. While their presence is often apparent, comprehension sometimes takes a back seat. They serve us in customer service roles, engage with us in video games, and inundate our personalised social media feeds. Today, they have even infiltrated our financial lives, using AI tools ...

How CIAM Platforms Improve Customer Privacy and Security
As consumers undertake a growing proportion of transactions online, awareness is increasing of the need to have both strong security and privacy protection-measures in place. Businesses that can tick these boxes will find it much easier to attract and retain customers.

Secure Code Warrior to Host 3rd Annual Devlympics Competition
Held during Cybersecurity Awareness Month, global tournament enables DevOps community to test their skills against vulnerabilities
Nozomi Networks Labs Discovers Flaws in Energy and Industrial Machinery Protection Systems
Nozomi Networks has identified three vulnerabilities on the Bently Nevada 3500 rack model manufactured by Baker Hughes, a company that develops and deploys technology solutions for energy and industrial companies.
No results found.
In The News
New AI-Enhanced Romance Scams Are Stealing Aussie Hearts And Bank Accounts This Valentine’s Day
Be cautious not to “swipe right” into scams as Valentine’s Day approaches. Researchers at Tenable®, Inc., the exposure management company, warn that romance scams continue to be the biggest consumer threat today.
Armis, the Cyber Exposure Management & Security Company appoints Alex Mosher as President
Armis, the US$4.2b valued cybersecurity company, makes strategic unifying GTM change, as it continues to drive record growth
Pax8 Names Marianne Wolf as Chief Ethics and Compliance Officer
SYDNEY, AU (February 12, 2025) – Pax8, the leading cloud commerce marketplace, announced the appointment of Marianne Wolf as its Chief Ethics and Compliance Officer. In this role, Wolf is responsible for leading the global ethics and compliance program, which includes overseeing cross-functional internal teams responsible for managing the company’s ...
Data Security And Quality Challenges Slow Liquidity Ambitions As Australian Companies’ AI Plans Progress: Boomi Report
Sydney, Australia — February 12, 2025 — Boomi™, the intelligent integration and automation leader, has unveiled the Australian findings of its Data Liquidity Index Study, conducted by Hanover Research. The survey found strong data integration capabilities within Australian organisations, but identified gaps in liquidity as companies battle challenges ...
Tenable February 2025 Patch Tuesday Comment
Microsoft patched 55 CVEs in its February 2025 Patch Tuesday release, with three rated critical and 52 rated as important. Our counts omitted one vulnerability reported by HackerOne. Remote code execution (RCE) vulnerabilities accounted for 38.2% of the vulnerabilities patched this month, followed by elevation of privilege (EoP) vulnerabilities at ...
Two Thirds of Australian Teens Experienced Online Risk Last Year, According to New Research From Microsoft
64 percent of Australian teens experienced a risk online last year including cyberbullying, misinformation and disinformation, and threats of violence, according to Microsoft’s annual Global Online Safety Survey, released today.
The ninth iteration of Microsoft’s annual report, launched today on Safer Internet Day, reveals insights into how teens ...
Unlocking AI’s Full Potential: EXL’s “AI in Action” Event Will Showcase Real-World Strategies to Scale AI for Business Leaders in ANZ
The event will provide attendees with actionable insights, hands-on demonstrations, and expert discussions to scale AI across the enterprise, bridge strategy with execution, and drive measurable business outcomes.
BeyondTrust Releases AI-powered True Privilege Graph to Expose How Attackers Exploit Hidden Paths to Privilege
Revolutionary technology redefines Identity Security by revealing previously undetectable Paths to Privilege attackers attempt to leverage
Prioritised remediations enhance security across endpoints, servers, Cloud and SaaS environments, reducing alert fatigue and enabling organisations to strengthen their defenses before attacks occur
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..