The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Protecting Your Heart and Wallet Against Phishing This Valentine’s Day

Protecting Your Heart and Wallet Against Phishing This Valentine’s Day

Phishing attacks, the most common form of social engineering, manipulate users into divulging sensitive information or clicking malicious links. With the rise of AI tools like ChatGPT, these scams have become more sophisticated, leveraging fake domains and chatbots to mimic legitimate entities or even potential romantic partners.
China’s Cyber Revenge | Why the PRC Fails to Back Its Claims of Western Espionage

China’s Cyber Revenge | Why the PRC Fails to Back Its Claims of Western Espionage

Why the PRC Fails to Back Its Claims of Western Espionage: China launched an offensive media strategy to push narratives around US hacking operations following a joint statement by the US, UK, and EU in July 2021 about China’s irresponsible behavior in cyberspace. Some PRC cybersecurity companies now coordinate report publication with government ...
The Future of CISOs: Navigating Trends and Evolving Roles

The Future of CISOs: Navigating Trends and Evolving Roles

With escalating cyber threats and data breaches, the need for effective cybersecurity leadership and measures has never been more important. The increasing trend of cyber criminality has placed the responsibility of Chief Information Security Officers (CISO) in the spotlight, and the role of the CISO is increasingly critical. With the rapid advancement ...
Pervasive OT and IoT Network Anomalies Raise Red Flags as Threats to Critical Infrastructure Become More Sophisticated

Pervasive OT and IoT Network Anomalies Raise Red Flags as Threats to Critical Infrastructure Become More Sophisticated

The latest Nozomi Networks Labs OT & IoT Security Report released today finds that network anomalies and attacks were the most prevalent threat to operational technology (OT) and internet of things (IoT) environments. Vulnerabilities within critical manufacturing also surged 230% – a cause for concern as threat actors have far more opportunities to ...
HijackLoader Expands Techniques to Improve Defense Evasion

HijackLoader Expands Techniques to Improve Defense Evasion

CrowdStrike researchers have identified a HijackLoader (aka IDAT Loader) sample that employs sophisticated evasion techniques to enhance the complexity of the threat. Think of loaders like wolves in sheep clothing. Their purpose is to sneak in, introduce and execute more sophisticated threats and tools. Our research revealed that this recent variant of ...
Boosting Confidence In Ransomware Recovery

Boosting Confidence In Ransomware Recovery

The safeguarding of digital assets is an ongoing, uphill battle. This fight is made harder still by the gaps in cyber resilience policies and the alarming lack of confidence in ransomware recovery. The need for boosted recovery confidence underscores the importance of addressing these challenges to fortify organisations against the rising tide of ...
Video Killed the Security Star

Video Killed the Security Star

Exploring the overlooked risk of sensitive info leaks in videos, with examples of real-world breaches like password exposures and crypto key losses.
Sophos Report Reveals 86 Per Cent Of Cybersecurity And IT Professionals In Australia Are Impacted By Burnout And Fatigue

Sophos Report Reveals 86 Per Cent Of Cybersecurity And IT Professionals In Australia Are Impacted By Burnout And Fatigue

Sophos, a global leader in innovating and delivering cybersecurity as a service, released the findings of its fourth “The Future of Cybersecurity in Asia Pacific and Japan” report in collaboration with Tech Research Asia (TRA). The report found that 86 per cent of Australian respondents in cybersecurity and IT roles are impacted by burnout and ...
No results found.

In The News

Excite Cyber Provides Essential Tips to Medical Specialists to Bolster Their Cybersecurity Defences Following Leaking of Patient Data On the Dark Web

Excite Cyber Provides Essential Tips to Medical Specialists to Bolster Their Cybersecurity Defences Following Leaking of Patient Data On the Dark Web

“Hospitals may have stronger defences, but attackers know the weak link often lies in the smaller, less protected third-party medical providers. Medical professionals running small or private clinics should urgently review their cybersecurity protections and enhance them.  
Wavelink Enters New Zealand Market With Strategic Local Investment and Leadership Appointment

Wavelink Enters New Zealand Market With Strategic Local Investment and Leadership Appointment

July 01, 2025 – Wavelink, an Infinigate Group company and leader in technology distribution, services, and business development in Australia and New Zealand (ANZ), has officially launched operations in the New Zealand market. As part of this strategic expansion, the company has appointed Danny Meadows as regional manager, New Zealand. This marks a ...
OVHcloud Partners With Crayon to Deliver Transformative, Cost-effective Technology Solutions Across the World

OVHcloud Partners With Crayon to Deliver Transformative, Cost-effective Technology Solutions Across the World

Sydney – June 30th 2025 – OVHcloud, a global cloud player and the European Cloud leader, today announced a partnership agreement with Crayon, a global leader in innovation and IT services. The agreement enables organisations to access and build in more than 45 regions* including Australia, on the cost-effective, secure and powerful cloud ...
New Trustwave Research On Technology Sector Exposes Escalating Cyber Threats, Dark Web Supply Chain Attacks, AI-Driven Risks

New Trustwave Research On Technology Sector Exposes Escalating Cyber Threats, Dark Web Supply Chain Attacks, AI-Driven Risks

June 26, 2025 – Trustwave, a leading cybersecurity and managed security services provider, has released a series of reports that give an unprecedented look into the evolving threat landscape targeting technology organisations worldwide, revealing how cybercriminals are leveraging both advanced technologies and the dark web to amplify the scale and ...
OPSWAT and SentinelOne® Enter OEM Partnership to Further Strengthen Multi-Layered Malware Detection with AI

OPSWAT and SentinelOne® Enter OEM Partnership to Further Strengthen Multi-Layered Malware Detection with AI

The addition of SentinelOne’s AI detection capabilities equips OPSWAT customers with faster detection and better coverage across modern infrastructure 
Semperis Research Discovers A Severe Vulnerability In Microsoft Entra ID Impacting 10% of Global SaaS Apps

Semperis Research Discovers A Severe Vulnerability In Microsoft Entra ID Impacting 10% of Global SaaS Apps

Semperis Research Uncovers Ongoing Risk from nOAuth Vulnerability in Microsoft Entra ID, Affecting Enterprise SaaS Applications nOAuth continues to go undetected by SaaS vendors, who may not even know what to look for and it is nearly impossible for enterprise customers to defend against, allowing attackers to take over accounts and exfiltrate data.
Ericsson Mobility Report June 2025 Highlights Growing Monetisation Appeal of 5G Fixed Wireless Access

Ericsson Mobility Report June 2025 Highlights Growing Monetisation Appeal of 5G Fixed Wireless Access

– More than half of all service providers globally who offer fixed wireless access now do so with speed-based monetisation benefits enhanced by 5G – 5G subscriptions to top 2.9 billion globally by the end of 2025 – 5G networks forecast to handle 80 percent of global mobile traffic by the end of 2030
Trend Micro Named a Leader in IDC MarketScape for CNAPP

Trend Micro Named a Leader in IDC MarketScape for CNAPP

SYDNEY, June 26, 2025 – Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cybersecurity leader, today announced it has been named as a Leader in the IDC MarketScape for Worldwide Cloud-Native Application Protection Platforms (CNAPP) 2025 Vendor Assessment (doc #US53549925, June 2025). To read the IDC MarketScape: Worldwide Cloud-Native ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This