The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Cyber-Threat Detections Hit a Record-Breaking 146 billion in 2022
Trend Micro annual roundup report warns of exponentially expanding attack surface

Norton Consumer Cyber Safety Pulse Report: Scammers Up Their Game With New AI Tools
Here’s what you need to know to stay safe from cybercriminals using ChatGPT to create deepfake chatbots, phishing campaigns and malware
Sydney, March 2, 2023 – The global research team from Norton, a consumer Cyber Safety brand of Gen™ (NASDAQ: GEN), today released its quarterly Consumer Cyber Safety Pulse Report, detailing how cybercriminals can use ...

Album Stealer Targets Facebook Adult-Only Content Seekers
The Album Stealer cyber-attack is initiated by creating fake Facebook profiles that use adult content to lure unsuspecting victims into downloading an album. Once the victim clicks the link, they are redirected to a zip file hosted on Microsoft OneDrive or another site. To avoid detection, threat actors use side-loading techniques and obfuscation to ...

2023 CrowdStrike Global Threat Report Reveals Sophisticated Adversaries Re-exploiting and Re-weaponizing Patched Vulnerabilities and Moving Beyond Ransomware
CrowdStrike, a global cybersecurity leader, today released its 9th annual Global Threat Report, highlighting key trends and cyber threats facing Australia, and revealing the sectors most under threat by Chinese state-sponsored cyber espionage operations.

Rapid7 Vulnerability Intelligence Report Shows Attackers Developing and Deploying Exploits Faster Than Ever
Analysis of security vulnerability trends shows an 87% increase in first-week exploitation since 2020

Security Emerges As A Critical Input To User Experience Decisions
Security is shifting even further ‘left’, away from developers and into the design thinking of CX and UX
teams, writes Ping Identity’s Head of APAC & Japan Ashley Diffey.

IBM Report: Ransomware Persisted Despite Improved Detection in 2022
Manufacturing Most Extorted Industry; Email Thread Hijacking Attempts Spike; Time to Ransom Moves from Months to Days.

Synopsys Study Underscores Need for Comprehensive SBOM as Best Defence in Software Supply Chain Security
84% of codebases contained at least one known open source vulnerability, an almost 4% increase from last year’s findings.
No results found.
In The News
Aussies Brace For A Record-Breaking Shopping Season With Scammers Set To Strike
With the holiday season just around the corner, Aussies are gearing up for the year’s biggest shopping spree, out to score great deals. Over the six-week lead up to Christmas, shoppers are expected to spend more than $69.7 billion – a significant part of it online, especially during Black Friday and Cyber Monday sales.
This year’s Black Friday/Cyber ...
OpenText Cybersecurity Unveils 2024’s Nastiest Malware: Ransomware Threats Escalate Against Critical Infrastructure
As cyberattacks grow more insidious, organisations are ramping up cybersecurity investments to defend essential services
Sydney, Australia – 31st October 2024 – OpenText (NASDAQ: OTEX), (TSX: OTEX), has revealed its highly anticipated “Nastiest Malware of 2024” list, spotlighting the year’s most notorious cyber threats. Now in its seventh year, ...
Qualys Cloud Platform Completes IRAP Protected Assessment, Reinforcing Commitment To Cybersecurity Excellence
Qualys, a leading provider of disruptive cloud-based IT, security and compliance solutions, today announced that its multi-tenant Qualys Cloud Platform was successfully assessed at the ‘PROTECTED’ level by the Infosec Registered Assessors Program (IRAP), an initiative by the Australian Signals Directorate (ASD). This achievement demonstrates that ...
Hunter Versus Spy: Sophos “Pacific Rim” Report Details its Defensive and Counter-Offensive Operation with Multiple Interlinked Adversaries Based in China
Sophos recently released “Pacific Rim,” a report detailing its defensive and counter-offensive operation over the last five years with multiple interlinked nation-state adversaries based in China targeting perimeter devices, including Sophos Firewalls. The attackers used a series of campaigns with novel exploits and customised malware to embed tools to ...
Trend Micro Celebrates Cybersecurity Excellence With Foodstuffs South Island, Accor, Dole, And Others
New Zealand's leading grocery group, Foodstuffs South Island, has been recognised as a winner of the Customer Innovator Award for integrating security into its digital strategies
SYDNEY, November 1, 2024 – Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cybersecurity leader, today announced the winners of its 2024 Customer Awards. The ...
Forescout Vedere Labs Unveils Riskiest Connected Medical Devices
Forescout today published the “Unveiling the Persistent Risks of Connected Medical Devices” report. Building on “The Riskiest Connected Devices in 2024” report from June, this research analyses more than 2 million devices across 45 healthcare delivery organisations (HDOs) during the last week of May 2024. The findings reveal a growing risk from ...
ExtraHop® Report Reveals Data Breach Costs Exceed Industry Estimates
SEATTLE – October 29, 2024 – ExtraHop®, a leader in cloud-native network detection and response (NDR), today released a new report analysing the short- and long-term financial impacts high-profile data breaches have on publicly traded companies.
According to the findings, a data breach costs an organisation US$677 million on average, millions more ...
Fortinet Delivers AI-Enhanced Data Protection And Insider Risk Management
FortiDLP’s unified approach to data protection enables enterprise organisations to anticipate and prevent accidental and malicious data loss across cloud deployments, applications, and managed and unmanaged devices
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..