The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

66% of Malware is Delivered Through PDFs, New Report from Palo Alto Networks Unit 42 Finds

66% of Malware is Delivered Through PDFs, New Report from Palo Alto Networks Unit 42 Finds

Vulnerabilities continue to be a popular method for threat actors to infect victims, with exploit attempts of vulnerabilities increasing by 55% in the past year
How Safe are bit.ly (or Tiny URL) Links?

How Safe are bit.ly (or Tiny URL) Links?

What are shortened or tiny URLs?In the world of shortcuts, how could URLs stay behind. With domain names getting stranger and web links getting obnoxiously longer, tiny URLs come to the rescue. These are like capsule covers that make medicines easy to digest. Usually web addresses are attached with a lot of information (called query string) that helps ...
How to remove the roadblocks to going passwordless

How to remove the roadblocks to going passwordless

The road to passwordless authentication is one most organisations will tread, but they may require guidance in some key areas along the way, writes Ash Diffey, Vice President Asia Pacific and Japan, Ping Identity
How to remove the roadblocks to going passwordless

How to remove the roadblocks to going passwordless

The road to passwordless authentication is one most organisations will tread, but they may require guidance in some key areas along the way, writes Ash Diffey, Vice President Asia Pacific and Japan, Ping Identity
How to protect against double-extortion ransomware attacks

How to protect against double-extortion ransomware attacks

Of all the cybersecurity challenges facing organisations today, one of the most pervasive is ransomware attacks.
How to protect against double-extortion ransomware attacks

How to protect against double-extortion ransomware attacks

Of all the cybersecurity challenges facing organisations today, one of the most pervasive is ransomware attacks.
Insikt Report – Deepfakes : I Have No Mouth, And I Must Do Crime

Insikt Report – Deepfakes : I Have No Mouth, And I Must Do Crime

Intelligence company Recorded Future today released the findings of its latest deepfakes research. Titled “I Have No Mouth, And I Must Do Crime”, the report looks at how the spread of deepfake technologies, specifically through advancements in AI-based voice cloning, is pushing scams to a new level.
Shadow API Usage Surges 900%, Revealing Alarming Lack of API Visibility Among Enterprise

Shadow API Usage Surges 900%, Revealing Alarming Lack of API Visibility Among Enterprise

New Research Highlights APIs are Now a Leading Attack Vector, Posing New and Significant Threats to Organisation
No results found.

In The News

Report: North Korea Cybercriminals Target Linkedin Users With Fake Job Ads

Report: North Korea Cybercriminals Target Linkedin Users With Fake Job Ads

Bitdefender Labs has issued a warning on an active campaign by the North Korea-linked Lazarus Group, targeting organisations by capturing credentials and delivering malware through fake LinkedIn job offers. LinkedIn may be a vital tool for job seekers and professionals, but it has also become a playground for cybercriminals exploiting its ...
Tenable Comment on DeepSeek Ban In AU Government

Tenable Comment on DeepSeek Ban In AU Government

Governments in the U.S, Italy, and now Australia have moved to ban access to DeepSeek, a Chinese-developed large language model (LLM), on government devices. These bans stem from concerns over data security and the potential exposure of sensitive information to the PRC. However, blocking access to DeepSeek is not as simple as restricting its website ...
Kyndryl Introduces SASE Services Combined With Palo Alto Networks Prisma SASE to Provide a Unified Network Security Posture for Customers

Kyndryl Introduces SASE Services Combined With Palo Alto Networks Prisma SASE to Provide a Unified Network Security Posture for Customers

Kyndryl’s end-to-end SASE services will help customers drive adoption of Palo Alto Networks’ cloud-first, zero-trust solution for network security
CyberArk and SentinelOne Team Up to Enable Step Change in Endpoint and Identity Security

CyberArk and SentinelOne Team Up to Enable Step Change in Endpoint and Identity Security

Mutual customers will benefit from boosted endpoint threat detection and response capabilities
Dynatrace Expands Security Portfolio With Cloud Security Posture Management Solution

Dynatrace Expands Security Portfolio With Cloud Security Posture Management Solution

Unified security and observability enable continuous compliance and response automation for major cloud platforms LAS VEGAS, NV, February 4, 2025 – Dynatrace (NYSE: DT), the leading AI-powered observability platform, today announced the expansion of its security portfolio with a new Cloud Security Posture Management (CSPM) solution. For enterprises ...
Do The CONTEC CMS8000 Patient Monitors Contain A Chinese Backdoor? The Reality Is More Complicated

Do The CONTEC CMS8000 Patient Monitors Contain A Chinese Backdoor? The Reality Is More Complicated

On 30 January, The Cybersecurity Infrastructure & Security Agency (CISA) released an alert, complemented by a notification from the U.S. Food and Drug Administration (FDA) suggesting that the Contec CMS8000 patient monitor and OEM white-label variants contain a backdoor communicating to a Chinese IP address. Team82 investigated the firmware and ...
New Research From Claroty’s Team82 Highlights Urgent Ransomware And Insecure Connectivity Threats To Mission-Critical OT Assets

New Research From Claroty’s Team82 Highlights Urgent Ransomware And Insecure Connectivity Threats To Mission-Critical OT Assets

State of CPS Security 2025: OT Exposures” Reveals the OT Device Exposures Most Coveted for Exploitation by Adversaries SYDNEY, Australia, 5 February 2025 – Claroty, the cyber-physical systems (CPS) protection company, today released a new report revealing the exposures that are most coveted for exploitation by adversaries in operational technology ...
GitHub Brings Data Residency To Australia With GitHub Enterprise Cloud

GitHub Brings Data Residency To Australia With GitHub Enterprise Cloud

GitHub, the most widely adopted Copilot-powered developer platform, now offers organisations in Australia more control over where their code is stored
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This