The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Nozomi Labs Report Reveals Surge in OT & IoT Security Threats

Nozomi Labs Report Reveals Surge in OT & IoT Security Threats

In the first half of 2023, malware activity in OT and IoT environments worldwide jumped 10x and alerts on unwanted applications doubled as nation-states, criminal groups and hacktivists continue to target healthcare, energy and manufacturing.
Zscaler VPN Report Finds Nearly Half of Organizations Are Concerned About Enterprise Security Due to Unsafe VPNs

Zscaler VPN Report Finds Nearly Half of Organizations Are Concerned About Enterprise Security Due to Unsafe VPNs

Insecure VPNs, Email, and End User Devices Identified as Primary Attack Vectors, Stressing the Need for a Zero Trust Architecture
Dragos Industrial Ransomware Attack Analysis: Q2 2023

Dragos Industrial Ransomware Attack Analysis: Q2 2023

Quarter two 2023 proved to be an exceptionally active period for ransomware groups, posing significant threats to industrial organisations and infrastructure, according to Dragos’ latest ransomware attack analysis.
Proofpoint: 78% of Australia’s Banks Are Not Proactively Blocking Fraudulent Emails

Proofpoint: 78% of Australia’s Banks Are Not Proactively Blocking Fraudulent Emails

Proofpoint, Inc., a leading cybersecurity and compliance company, today released new research identifying that almost 4 out of 5 Australian-owned authorised deposit-taking institutions and foreign subsidiary banks are lagging behind on basic cybersecurity measures, subjecting customers, staff and stakeholders to a higher risk of email-based ...
Artificial Intelligence and AIOps May Be the Key to Understanding Today’s World of Exploding Data

Artificial Intelligence and AIOps May Be the Key to Understanding Today’s World of Exploding Data

“The Library of Babel” is an imaginary library containing countless rooms and books with every possible combination of letters and numbers.
Decoy Dog is No Ordinary Pupy – Infoblox Reveals Shift in Malware Tactics After Initial Discovery

Decoy Dog is No Ordinary Pupy – Infoblox Reveals Shift in Malware Tactics After Initial Discovery

Infoblox Inc., the company that delivers a simplified, cloud- enabled networking and security platform for improved performance and protection, today published a second threat report with critical updates on “Decoy Dog,” the remote access trojan (RAT) toolkit they discovered and disclosed in April 2023.
Ways to Reduce the Risk of Burnout in your IT Security Team

Ways to Reduce the Risk of Burnout in your IT Security Team

With organisations experiencing a constantly growing wave of cyberattacks, many IT security teams are feeling the pressure. Stressful work environments and long hours are resulting in staff feeling overwhelmed and burnt out.
How securing remote management tools provides better protection for businesses

How securing remote management tools provides better protection for businesses

The latest data reveals that Australian small businesses lost almost $13.7 million to scams in 2022, an increase of 95 per cent compared to 2021, according to the Australian Competition and Consumer Commission (ACCC).
No results found.

In The News

Microsoft Report – Fraudsters Using AI to Supercharge Their Scams – Tips to Protect Yourself

Microsoft Report – Fraudsters Using AI to Supercharge Their Scams – Tips to Protect Yourself

Today, Microsoft has released its latest Cyber Signals report on AI-assisted scams, including those targeting e-shoppers and job seekers. To read the full report, please click here. Why is this relevant now? AI-assisted scams are on the rise; over the past year alone, Microsoft has thwarted $US4 billion in fraud attempts and approximately 1.6 ...
Tenable Comment: MITRE CVE Program Funding Set To Expire

Tenable Comment: MITRE CVE Program Funding Set To Expire

MITRE’s CVE program has been an important pillar in cybersecurity for over two decades. The lack of certainty surrounding the future of the CVE program creates great uncertainty about how newly discovered vulnerabilities will be catalogued. Please find below a comment from Satnam Narang, sr. staff research engineer at Tenable and a bog here from ...
DDoS Threat Landscape Shifts: U.S. Hit Hardest, but Australia and NZ Remain on Alert

DDoS Threat Landscape Shifts: U.S. Hit Hardest, but Australia and NZ Remain on Alert

New data from Radware’s Hacktivism Unveiled Q1 2025 report underscores a sharp escalation in politically motivated cyberattacks, particularly Distributed Denial-of-Service (DDoS) campaigns. The United States emerged as the most frequently targeted nation, experiencing 558 attacks—13.5% of all incidents globally—outpacing Ukraine (400) and Israel (340). ...
Gerry Sillars is Bolstering Semperis’ Identity-Driven Cybersecurity Efforts in APJ

Gerry Sillars is Bolstering Semperis’ Identity-Driven Cybersecurity Efforts in APJ

Gerry Sillars is Bolstering Semperis’ Identity-Driven Cybersecurity Efforts in Asia Pacific and Japan
Tenable Announces Co-CEOs – Steve Vintz and Mark Thurmond

Tenable Announces Co-CEOs – Steve Vintz and Mark Thurmond

Tenable®, the exposure management company, today announced that its Board of Directors has unanimously appointed Steve Vintz and Mark Thurmond as Co-Chief Executive Officers on a permanent basis. Following an extensive search process that considered both internal and external candidates, the Board concluded that Vintz and Thurmond are best positioned ...
12th Annual Edition of the BeyondTrust Microsoft Vulnerabilities Report Reveals Record-Breaking Year for Microsoft Vulnerabilities

12th Annual Edition of the BeyondTrust Microsoft Vulnerabilities Report Reveals Record-Breaking Year for Microsoft Vulnerabilities

Total vulnerabilities reached an all-time high of 1,360 in 2024, an 11% increase from the previous record of 1,292 in 2022 Elevation of Privilege (EoP) and Remote Code Execution (RCE)—primary goals of any threat actor looking to exploit a system—continue to dominate the vulnerability categories year-over-year
New Research Reveals Australian Businesses Are Experiencing a Rise In Fraud

New Research Reveals Australian Businesses Are Experiencing a Rise In Fraud

61% of Australian respondents have reported increases in the most common types of fraud such as identity theft, account creation fraud and digital document forgeries.
Fuse Partners With Check Point Software to Deploy First Advanced Blockchain Firewall for Real-Time Threat Prevention

Fuse Partners With Check Point Software to Deploy First Advanced Blockchain Firewall for Real-Time Threat Prevention

Partnership introduces first-of-its-kind, AI-powered threat prevention layer for blockchains—securing smart contracts, wallets in real time
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This