The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Australians Believe It’s Time for Mobile Development to Step In to Protect them From Data Breaches and Fraud: Appdome Survey
More than a quarter of Australian consumers fear their mobile apps will be breached and need mobile developers to invest more in delivering robust cyber protection in mobile apps, says market research sponsored by Appdome.

Generative AI: Putting it to Work to Improve IT Security
Since being unveiled to the public a little over six months ago, the generative AI platform ChatGPT has focused attention on the potential of artificial intelligence.

OT:ICEFALL – New Vulnerabilities and Insights on OT Security Design and Patching
In Forescout’s final OT:ICEFALL report, Forescout Vedere Labs presents three new vulnerabilities and concludes the project after one year of research following the original disclosure.

Recap: Risk to Resilience – ANZ
Trend Micro is currently running one of the largest cybersecurity roadshows ever, the ‘Risk to Resilience World Tour’ covering more than 120 locations around the globe.

Virtual Patching
Scenario 1:MyBank Pty Ltd has 300+ critical legacy enterprise applications. Almost all of them were built by the then IT-savvy non-developers. They were built with limited or no design considerations. Security was not even a design-criteria back then. These applications continue to run either because they are now too complex, too critical, or the ...

Aligning Cybersecurity to Business Objectives Helps Drive Revenue Growth and Lower Costs of Breaches, Accenture Report Finds
Accenture State of Cyber Resilience 2023 report reveals key traits of “cyber transformers,” who make cybersecurity the cornerstone of their business transformation efforts

CyberArk Survey: AI Tool Use, Employee Churn and Geo-Political Tensions Fuel Cyber Jeopardy
91% of Australian respondents experienced at least one ransom attack

Bridging the Gap: Uniting IT Teams for Effective Cybersecurity
It's critical that IT teams work together with cybersecurity teams to ensure their organisation's infrastructure is secure. Unfortunately, roles within the tech industry have become much more specialised over the past few decades, leading to isolated silos.
No results found.
In The News
Rimini Street Announces Rimini Protect Advanced Hypervisor Security for VMware, Nutanix and All Other Linux-Based Hypervisors, Powered by Vali Cyber, to Safeguard Against Ransomware and Other Vulnerabilities
Rimini Street has announced Rimini Protect Advanced Hypervisor Security, an exclusive solution powered by Vali Cyber's AI/ML security technology for VMware, Nutanix and all other Linux-based hypervisors.
Rimini Protect Advanced Hypervisor Security is embedded into the industry-leading Rimini Support for VMware solution that replaces VMware annual ...
New Research: 63 Percent of Privacy Professionals Find Their Jobs More Stressful Now Than Five Years Ago
SYDNEY, AUSTRALIA, 22 January 2025 - Privacy professionals are under growing pressure as they face budget cuts, resource challenges and changes in regulations. According to ISACA's State of Privacy 2025 survey report, almost half (48 percent) expect a budget decrease in the next year and 73 percent indicate expert-level privacy professionals are the ...
Blue Connections IT Achieves ISO/IEC 27001:2022 Certification, Reinforcing Its Commitment to Security-centric IT Practices
January 22, 2025 - Blue Connections IT, a gold and platinum partner for the world’s largest technology vendors, has announced that it has achieved ISO/IEC 27001:2022 certification, the globally recognised standard for information security management systems (ISMS). This certification highlights the company’s dedication to implementing robust security ...
F5 Equips Network and Security Teams With AI Assistant For F5 Distributed Cloud Services
‘Intelligent partner’ for SecOps and NetOps will allow teams to query network activity, drill down into security events and rapidly implement mitigations.
New support for teams who must manage more deployment models than ever, with 88% of organisations now employing a hybrid approach
espresso Displays Selects Oracle NetSuite To Streamline Global Processes
espresso Displays Gains a Sharper Picture of its Business with Oracle NetSuite
Australian tech company chooses NetSuite to help streamline global processes and increase productivity as it grows
SYDNEY, January 22, 2024 - espresso Displays, an Australian tech company that developed the world’s thinnest interactive portable displays, has selected ...

CloudSEK Warns of Scammers Exploiting Zendesk to Impersonate Brands
BENGALURU: CloudSEK, a leader in AI-powered cybersecurity solutions, has uncovered how cybercriminals can exploit a seemingly simple feature of Zendesk’s SaaS platform.
CloudSEK’s latest research highlights how Zendesk subdomain registrations could be misused to impersonate legitimate brands and facilitate phishing and investment scams, putting ...
Exabeam Continues to Deliver Real AI-Driven Cybersecurity with Launch of LogRhythm Intelligence Copilot
BROOMFIELD, Colo. & FOSTER CITY, Calif. – January 20, 2025 -- Exabeam, a global cybersecurity leader that delivers AI-driven security operations, today announced the launch of LogRhythm Intelligence Copilot, a generative AI-powered feature delivering actionable insights to empower security teams and accelerate workflows. This release solidifies ...
Hack The Emulated Planet: Vulnerability Hunting Planet WGS-804HPT Industrial Switch
Emulators such as the open-source, cross-platform QEMU framework are invaluable tools for researchers conducting vulnerability research. QEMU and other emulators act as great testing environments where software and firmware can be analyzed for exploitable vulnerabilities. They can also be taken a step further for testing exploits within a safe ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..