The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

How Businesses Today can Prevent Advanced Cyber Threats
In recent years workforces have become increasingly mobile, with employees using laptops at home, airports, cafes etc. Then, with the onset of COVID-19, the number of people accessing corporate resources from devices outside the corporate network increased enormously.

Tenable CEO and Chairman calls out Microsoft for unacceptable cybersecurity practices
In a recent article, Amit Yoran, the Chairman and CEO of Tenable, criticised Microsoft for its cybersecurity practices. He mentioned that Senator Ron Wyden had written to various government agencies, urging them to hold Microsoft accountable for negligent cybersecurity practices that have allowed Chinese espionage against the US government. Data from ...

Doing more with less: the three key focus areas for cybersecurity
In an ever-evolving cybersecurity landscape, organisations face the daunting challenge of effectively managing their security initiatives. This responsibility falls not only on the IT teams, but also on the board of directors, who play a critical role in overseeing the organisation's cybersecurity strategy.

Bitdefender releases macOS Threat Landscape Report
Bitdefender has revealed at Black Hat USA 2023 the macOS Threat Landscape Report, which looks at the top threats and trends targeting Apple’s macOS operating system over the duration of 12 months.

CrowdStrike 2023 Threat Hunting Report shows adversary breakout time falls to record low, technology companies most targeted in APJ region
Adversaries took just 79 minutes, on average, to ‘breakout’ of their initial beach head into a victim’s system, with fastest recorded time being just seven minutes.

Poorly Purged Medical Devices Present Downstream Security Concerns When Sold on Secondary Market
Rapid7, Inc., a leader in cloud risk and threat detection, has released a new research report that assesses the security implications from improper de-acquisition of infusion pumps to illustrate the importance of securing networks, applications, and devices.

API Security: Protecting Against Persistent Automated Attacks
As use of Application Programming Interfaces (APIs) within organisations of all sizes continues to increase, the approach taken to ensuring their security has changed.

Improving an Organisations Cyber Efficacy and Effectiveness
While the capability of cybersecurity tools continues to rapidly increase, there is no room for complacency within the organisations deploying them.
No results found.
In The News
Rimini Street Announces Rimini Protect Advanced Hypervisor Security for VMware, Nutanix and All Other Linux-Based Hypervisors, Powered by Vali Cyber, to Safeguard Against Ransomware and Other Vulnerabilities
Rimini Street has announced Rimini Protect Advanced Hypervisor Security, an exclusive solution powered by Vali Cyber's AI/ML security technology for VMware, Nutanix and all other Linux-based hypervisors.
Rimini Protect Advanced Hypervisor Security is embedded into the industry-leading Rimini Support for VMware solution that replaces VMware annual ...
New Research: 63 Percent of Privacy Professionals Find Their Jobs More Stressful Now Than Five Years Ago
SYDNEY, AUSTRALIA, 22 January 2025 - Privacy professionals are under growing pressure as they face budget cuts, resource challenges and changes in regulations. According to ISACA's State of Privacy 2025 survey report, almost half (48 percent) expect a budget decrease in the next year and 73 percent indicate expert-level privacy professionals are the ...
Blue Connections IT Achieves ISO/IEC 27001:2022 Certification, Reinforcing Its Commitment to Security-centric IT Practices
January 22, 2025 - Blue Connections IT, a gold and platinum partner for the world’s largest technology vendors, has announced that it has achieved ISO/IEC 27001:2022 certification, the globally recognised standard for information security management systems (ISMS). This certification highlights the company’s dedication to implementing robust security ...
F5 Equips Network and Security Teams With AI Assistant For F5 Distributed Cloud Services
‘Intelligent partner’ for SecOps and NetOps will allow teams to query network activity, drill down into security events and rapidly implement mitigations.
New support for teams who must manage more deployment models than ever, with 88% of organisations now employing a hybrid approach
espresso Displays Selects Oracle NetSuite To Streamline Global Processes
espresso Displays Gains a Sharper Picture of its Business with Oracle NetSuite
Australian tech company chooses NetSuite to help streamline global processes and increase productivity as it grows
SYDNEY, January 22, 2024 - espresso Displays, an Australian tech company that developed the world’s thinnest interactive portable displays, has selected ...

CloudSEK Warns of Scammers Exploiting Zendesk to Impersonate Brands
BENGALURU: CloudSEK, a leader in AI-powered cybersecurity solutions, has uncovered how cybercriminals can exploit a seemingly simple feature of Zendesk’s SaaS platform.
CloudSEK’s latest research highlights how Zendesk subdomain registrations could be misused to impersonate legitimate brands and facilitate phishing and investment scams, putting ...
Exabeam Continues to Deliver Real AI-Driven Cybersecurity with Launch of LogRhythm Intelligence Copilot
BROOMFIELD, Colo. & FOSTER CITY, Calif. – January 20, 2025 -- Exabeam, a global cybersecurity leader that delivers AI-driven security operations, today announced the launch of LogRhythm Intelligence Copilot, a generative AI-powered feature delivering actionable insights to empower security teams and accelerate workflows. This release solidifies ...
Hack The Emulated Planet: Vulnerability Hunting Planet WGS-804HPT Industrial Switch
Emulators such as the open-source, cross-platform QEMU framework are invaluable tools for researchers conducting vulnerability research. QEMU and other emulators act as great testing environments where software and firmware can be analyzed for exploitable vulnerabilities. They can also be taken a step further for testing exploits within a safe ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..