The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

3 Ways to Get Everyone Onboard the Innovation Train
When it comes to innovation and introducing change in an organisation, some people instantly embrace the journey while others resist it.

Is Australia set to follow the UK, for banking liabilities?
As the digital world continues to dominate the banking industry, concerns about data security and privacy are coming to the forefront. As algorithms become more advanced, building a profile based on users data, and identifying abnormal transactions that could indicate fraudulent activity. This has led to concerns about privacy, as individuals feel like ...

I Have Been Attacked by Ransomware. What Should I Do Now?
Retro Blockbuster Plot: Sometime in the 1980s – a filthy rich industrialist – his beautiful daughter – a constant target for kidnappers – always accompanied by bodyguards – one fateful day – kidnapping succeeds – hefty ransom asked – her big strong bloke comes to rescue – happy ending!Nah!! Kidnappers today have become very tech-savvy and, if I might ...

66% of Malware is Delivered Through PDFs, New Report from Palo Alto Networks Unit 42 Finds
Vulnerabilities continue to be a popular method for threat actors to infect victims, with exploit attempts of vulnerabilities increasing by 55% in the past year

How Safe are bit.ly (or Tiny URL) Links?
What are shortened or tiny URLs?In the world of shortcuts, how could URLs stay behind. With domain names getting stranger and web links getting obnoxiously longer, tiny URLs come to the rescue. These are like capsule covers that make medicines easy to digest. Usually web addresses are attached with a lot of information (called query string) that helps ...

How to remove the roadblocks to going passwordless
The road to passwordless authentication is one most organisations will tread, but they may require guidance in some key areas along the way, writes Ash Diffey, Vice President Asia Pacific and Japan, Ping Identity

How to remove the roadblocks to going passwordless
The road to passwordless authentication is one most organisations will tread, but they may require guidance in some key areas along the way, writes Ash Diffey, Vice President Asia Pacific and Japan, Ping Identity

How to protect against double-extortion ransomware attacks
Of all the cybersecurity challenges facing organisations today, one of the most pervasive is ransomware attacks.
No results found.
In The News
New Report from BlueVoyant Shows Progress in Third-Party Cyber Risk Management, But Breaches Persist
“More organisations than any previous year indicated that their primary focus is no longer on awareness of the third-party risk management problem or adoption of a program, but rather with the operational, day-to-day challenges of managing an effective program,” said Joel Molinoff, global head of Supply Chain Defense at BlueVoyant.
Rimini Street Announces Expansion of its Database Security Solutions Providing Even More Extensive Security and Compliance Capabilities for Most Common Commercial and Open-Source Databases
Rimini Stree has announced new and expanded database security services and solutions to provide more tailored, flexible, and proactive coverage for all organisations, whether currently supported by the vendor or out of vendor support.
The Rise of AI-Driven Attacks, Quantum Threats, and Social Media Exploitation: A New Era of Emerging Technologies and Landscape for Cybercriminals in 2025
Check Point Software 2025 Cyber Security Predictions reveal how emerging technologies and advanced cyber criminal tactics will reshape the global threat landscape
Aussies Brace For A Record-Breaking Shopping Season With Scammers Set To Strike
With the holiday season just around the corner, Aussies are gearing up for the year’s biggest shopping spree, out to score great deals. Over the six-week lead up to Christmas, shoppers are expected to spend more than $69.7 billion – a significant part of it online, especially during Black Friday and Cyber Monday sales.
This year’s Black Friday/Cyber ...
OpenText Cybersecurity Unveils 2024’s Nastiest Malware: Ransomware Threats Escalate Against Critical Infrastructure
As cyberattacks grow more insidious, organisations are ramping up cybersecurity investments to defend essential services
Sydney, Australia – 31st October 2024 – OpenText (NASDAQ: OTEX), (TSX: OTEX), has revealed its highly anticipated “Nastiest Malware of 2024” list, spotlighting the year’s most notorious cyber threats. Now in its seventh year, ...
Qualys Cloud Platform Completes IRAP Protected Assessment, Reinforcing Commitment To Cybersecurity Excellence
Qualys, a leading provider of disruptive cloud-based IT, security and compliance solutions, today announced that its multi-tenant Qualys Cloud Platform was successfully assessed at the ‘PROTECTED’ level by the Infosec Registered Assessors Program (IRAP), an initiative by the Australian Signals Directorate (ASD). This achievement demonstrates that ...
Hunter Versus Spy: Sophos “Pacific Rim” Report Details its Defensive and Counter-Offensive Operation with Multiple Interlinked Adversaries Based in China
Sophos recently released “Pacific Rim,” a report detailing its defensive and counter-offensive operation over the last five years with multiple interlinked nation-state adversaries based in China targeting perimeter devices, including Sophos Firewalls. The attackers used a series of campaigns with novel exploits and customised malware to embed tools to ...
Trend Micro Celebrates Cybersecurity Excellence With Foodstuffs South Island, Accor, Dole, And Others
New Zealand's leading grocery group, Foodstuffs South Island, has been recognised as a winner of the Customer Innovator Award for integrating security into its digital strategies
SYDNEY, November 1, 2024 – Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cybersecurity leader, today announced the winners of its 2024 Customer Awards. The ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..