The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Protecting Your Heart and Wallet Against Phishing This Valentine’s Day

Protecting Your Heart and Wallet Against Phishing This Valentine’s Day

Phishing attacks, the most common form of social engineering, manipulate users into divulging sensitive information or clicking malicious links. With the rise of AI tools like ChatGPT, these scams have become more sophisticated, leveraging fake domains and chatbots to mimic legitimate entities or even potential romantic partners.
China’s Cyber Revenge | Why the PRC Fails to Back Its Claims of Western Espionage

China’s Cyber Revenge | Why the PRC Fails to Back Its Claims of Western Espionage

Why the PRC Fails to Back Its Claims of Western Espionage: China launched an offensive media strategy to push narratives around US hacking operations following a joint statement by the US, UK, and EU in July 2021 about China’s irresponsible behavior in cyberspace. Some PRC cybersecurity companies now coordinate report publication with government ...
The Future of CISOs: Navigating Trends and Evolving Roles

The Future of CISOs: Navigating Trends and Evolving Roles

With escalating cyber threats and data breaches, the need for effective cybersecurity leadership and measures has never been more important. The increasing trend of cyber criminality has placed the responsibility of Chief Information Security Officers (CISO) in the spotlight, and the role of the CISO is increasingly critical. With the rapid advancement ...
Pervasive OT and IoT Network Anomalies Raise Red Flags as Threats to Critical Infrastructure Become More Sophisticated

Pervasive OT and IoT Network Anomalies Raise Red Flags as Threats to Critical Infrastructure Become More Sophisticated

The latest Nozomi Networks Labs OT & IoT Security Report released today finds that network anomalies and attacks were the most prevalent threat to operational technology (OT) and internet of things (IoT) environments. Vulnerabilities within critical manufacturing also surged 230% – a cause for concern as threat actors have far more opportunities to ...
HijackLoader Expands Techniques to Improve Defense Evasion

HijackLoader Expands Techniques to Improve Defense Evasion

CrowdStrike researchers have identified a HijackLoader (aka IDAT Loader) sample that employs sophisticated evasion techniques to enhance the complexity of the threat. Think of loaders like wolves in sheep clothing. Their purpose is to sneak in, introduce and execute more sophisticated threats and tools. Our research revealed that this recent variant of ...
Boosting Confidence In Ransomware Recovery

Boosting Confidence In Ransomware Recovery

The safeguarding of digital assets is an ongoing, uphill battle. This fight is made harder still by the gaps in cyber resilience policies and the alarming lack of confidence in ransomware recovery. The need for boosted recovery confidence underscores the importance of addressing these challenges to fortify organisations against the rising tide of ...
Video Killed the Security Star

Video Killed the Security Star

Exploring the overlooked risk of sensitive info leaks in videos, with examples of real-world breaches like password exposures and crypto key losses.
Sophos Report Reveals 86 Per Cent Of Cybersecurity And IT Professionals In Australia Are Impacted By Burnout And Fatigue

Sophos Report Reveals 86 Per Cent Of Cybersecurity And IT Professionals In Australia Are Impacted By Burnout And Fatigue

Sophos, a global leader in innovating and delivering cybersecurity as a service, released the findings of its fourth “The Future of Cybersecurity in Asia Pacific and Japan” report in collaboration with Tech Research Asia (TRA). The report found that 86 per cent of Australian respondents in cybersecurity and IT roles are impacted by burnout and ...
No results found.

In The News

Trend Micro’s Zero Day Initiative Celebrates 20 Years of Industry Leadership

Trend Micro’s Zero Day Initiative Celebrates 20 Years of Industry Leadership

Bug bounty program incentivises security research to make customers and industry safer 
Elastic Announces Elastic AI SOC Engine for Exposing Complex, Hidden Threats

Elastic Announces Elastic AI SOC Engine for Exposing Complex, Hidden Threats

Elastic AI SOC Engine (EASE) reduces alert fatigue and investigation time by integrating context-aware AI with existing SIEM and EDR tools
43% of Australian Ransomware Victims Threatened with Physical Harm – New Semperis Report

43% of Australian Ransomware Victims Threatened with Physical Harm – New Semperis Report

Study shows many companies paid multiple ransoms in the past 12 months. Victims also report that hackers have threatened to physically harm executives and file regulatory complaints against their companies.
Pax8 Names Lindsay Zwart as EVP and General Manager of the Asia-Pacific Region at Pax8

Pax8 Names Lindsay Zwart as EVP and General Manager of the Asia-Pacific Region at Pax8

BRISBANE, AUSTRALIA (August 8, 2025) – Pax8, the leading cloud commerce Marketplace, today announced the appointment of Lindsay Zwart as Executive Vice President and General Manager of the Pax8 Asia-Pacific (APAC) region. In this role, Zwart will spearhead all aspects of the APAC business for Pax8, driving the company’s ambitious growth strategy by ...
ManageEngine to ‘Bowl Over’ Cyber Threats at Iconic Australian Cricket Grounds

ManageEngine to ‘Bowl Over’ Cyber Threats at Iconic Australian Cricket Grounds

Company announces events that explore the intersection of identity security, Zero Trust, and real-time threat defence in a unique Australian setting
Oracle Helps Customers Achieve Extreme Availability and Performance for Mission-Critical and Agentic AI Applications

Oracle Helps Customers Achieve Extreme Availability and Performance for Mission-Critical and Agentic AI Applications

With Oracle Globally Distributed Exadata Database on Exascale Infrastructure, customers can run distributed workloads of all types, including agentic AI, analytics, and transactional while lowering costs. Transparent access to data and the industry’s broadest set of data distribution policies help customers address data sovereignty and performance ...
Fortinet Reports Second Quarter 2025 Financial Results

Fortinet Reports Second Quarter 2025 Financial Results

Highlights  Revenue grew 14 per cent year over year to US$1.63 billion  Billings grew 15 per cent year over year to US$1.78 billion (1)  Unified secure access service edge (SASE) annual recurring revenue (ARR) up 22 per cent and Security Operations ARR up 35 per cent, year over year (2)  GAAP operating margin of 28 per cent  Non-GAAP operating ...
Ransomware Attacks Surge in Australia: One in Three Hit Multiple Times – New Report

Ransomware Attacks Surge in Australia: One in Three Hit Multiple Times – New Report

One in Three Australian Ransomware Victims Hit Multiple Times as Security Gaps Persist. New International Research Shows Ransomware Thrives in Complex and Fragmented IT Security Environments.
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This