The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
Protecting Your Heart and Wallet Against Phishing This Valentine’s Day
Phishing attacks, the most common form of social engineering, manipulate users into divulging sensitive information or clicking malicious links. With the rise of AI tools like ChatGPT, these scams have become more sophisticated, leveraging fake domains and chatbots to mimic legitimate entities or even potential romantic partners.
China’s Cyber Revenge | Why the PRC Fails to Back Its Claims of Western Espionage
Why the PRC Fails to Back Its Claims of Western Espionage:
China launched an offensive media strategy to push narratives around US hacking operations following a joint statement by the US, UK, and EU in July 2021 about China’s irresponsible behavior in cyberspace.
Some PRC cybersecurity companies now coordinate report publication with government ...

The Future of CISOs: Navigating Trends and Evolving Roles
With escalating cyber threats and data breaches, the need for effective cybersecurity leadership and measures has never been more important. The increasing trend of cyber criminality has placed the responsibility of Chief Information Security Officers (CISO) in the spotlight, and the role of the CISO is increasingly critical. With the rapid advancement ...
Pervasive OT and IoT Network Anomalies Raise Red Flags as Threats to Critical Infrastructure Become More Sophisticated
The latest Nozomi Networks Labs OT & IoT Security Report released today finds that network anomalies and attacks were the most prevalent threat to operational technology (OT) and internet of things (IoT) environments. Vulnerabilities within critical manufacturing also surged 230% – a cause for concern as threat actors have far more opportunities to ...

HijackLoader Expands Techniques to Improve Defense Evasion
CrowdStrike researchers have identified a HijackLoader (aka IDAT Loader) sample that employs sophisticated evasion techniques to enhance the complexity of the threat. Think of loaders like wolves in sheep clothing. Their purpose is to sneak in, introduce and execute more sophisticated threats and tools. Our research revealed that this recent variant of ...

Boosting Confidence In Ransomware Recovery
The safeguarding of digital assets is an ongoing, uphill battle. This fight is made harder still by the gaps in cyber resilience policies and the alarming lack of confidence in ransomware recovery. The need for boosted recovery confidence underscores the importance of addressing these challenges to fortify organisations against the rising tide of ...

Video Killed the Security Star
Exploring the overlooked risk of sensitive info leaks in videos, with examples of real-world breaches like password exposures and crypto key losses.
Sophos Report Reveals 86 Per Cent Of Cybersecurity And IT Professionals In Australia Are Impacted By Burnout And Fatigue
Sophos, a global leader in innovating and delivering cybersecurity as a service, released the findings of its fourth “The Future of Cybersecurity in Asia Pacific and Japan” report in collaboration with Tech Research Asia (TRA). The report found that 86 per cent of Australian respondents in cybersecurity and IT roles are impacted by burnout and ...
No results found.
In The News
Trend Micro’s Zero Day Initiative Celebrates 20 Years of Industry Leadership
Bug bounty program incentivises security research to make customers and industry safer
Elastic Announces Elastic AI SOC Engine for Exposing Complex, Hidden Threats
Elastic AI SOC Engine (EASE) reduces alert fatigue and investigation time by integrating context-aware AI with existing SIEM and EDR tools
43% of Australian Ransomware Victims Threatened with Physical Harm – New Semperis Report
Study shows many companies paid multiple ransoms in the past 12 months. Victims also report that hackers have threatened to physically harm executives and file regulatory complaints against their companies.
Pax8 Names Lindsay Zwart as EVP and General Manager of the Asia-Pacific Region at Pax8
BRISBANE, AUSTRALIA (August 8, 2025) – Pax8, the leading cloud commerce Marketplace, today announced the appointment of Lindsay Zwart as Executive Vice President and General Manager of the Pax8 Asia-Pacific (APAC) region. In this role, Zwart will spearhead all aspects of the APAC business for Pax8, driving the company’s ambitious growth strategy by ...
ManageEngine to ‘Bowl Over’ Cyber Threats at Iconic Australian Cricket Grounds
Company announces events that explore the intersection of identity security, Zero Trust, and real-time threat defence in a unique Australian setting
Oracle Helps Customers Achieve Extreme Availability and Performance for Mission-Critical and Agentic AI Applications
With Oracle Globally Distributed Exadata Database on Exascale Infrastructure, customers can run distributed workloads of all types, including agentic AI, analytics, and transactional while lowering costs.
Transparent access to data and the industry’s broadest set of data distribution policies help customers address data sovereignty and performance ...
Fortinet Reports Second Quarter 2025 Financial Results
Highlights
Revenue grew 14 per cent year over year to US$1.63 billion
Billings grew 15 per cent year over year to US$1.78 billion (1)
Unified secure access service edge (SASE) annual recurring revenue (ARR) up 22 per cent and Security Operations ARR up 35 per cent, year over year (2)
GAAP operating margin of 28 per cent
Non-GAAP operating ...
Ransomware Attacks Surge in Australia: One in Three Hit Multiple Times – New Report
One in Three Australian Ransomware Victims Hit Multiple Times as Security Gaps Persist.
New International Research Shows Ransomware Thrives in Complex and Fragmented IT Security Environments.
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
