The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

66% of Malware is Delivered Through PDFs, New Report from Palo Alto Networks Unit 42 Finds

66% of Malware is Delivered Through PDFs, New Report from Palo Alto Networks Unit 42 Finds

Vulnerabilities continue to be a popular method for threat actors to infect victims, with exploit attempts of vulnerabilities increasing by 55% in the past year
How Safe are bit.ly (or Tiny URL) Links?

How Safe are bit.ly (or Tiny URL) Links?

What are shortened or tiny URLs?In the world of shortcuts, how could URLs stay behind. With domain names getting stranger and web links getting obnoxiously longer, tiny URLs come to the rescue. These are like capsule covers that make medicines easy to digest. Usually web addresses are attached with a lot of information (called query string) that helps ...
How to remove the roadblocks to going passwordless

How to remove the roadblocks to going passwordless

The road to passwordless authentication is one most organisations will tread, but they may require guidance in some key areas along the way, writes Ash Diffey, Vice President Asia Pacific and Japan, Ping Identity
How to remove the roadblocks to going passwordless

How to remove the roadblocks to going passwordless

The road to passwordless authentication is one most organisations will tread, but they may require guidance in some key areas along the way, writes Ash Diffey, Vice President Asia Pacific and Japan, Ping Identity
How to protect against double-extortion ransomware attacks

How to protect against double-extortion ransomware attacks

Of all the cybersecurity challenges facing organisations today, one of the most pervasive is ransomware attacks.
How to protect against double-extortion ransomware attacks

How to protect against double-extortion ransomware attacks

Of all the cybersecurity challenges facing organisations today, one of the most pervasive is ransomware attacks.
Insikt Report – Deepfakes : I Have No Mouth, And I Must Do Crime

Insikt Report – Deepfakes : I Have No Mouth, And I Must Do Crime

Intelligence company Recorded Future today released the findings of its latest deepfakes research. Titled “I Have No Mouth, And I Must Do Crime”, the report looks at how the spread of deepfake technologies, specifically through advancements in AI-based voice cloning, is pushing scams to a new level.
Shadow API Usage Surges 900%, Revealing Alarming Lack of API Visibility Among Enterprise

Shadow API Usage Surges 900%, Revealing Alarming Lack of API Visibility Among Enterprise

New Research Highlights APIs are Now a Leading Attack Vector, Posing New and Significant Threats to Organisation
No results found.

In The News

BT’s Global Fabric Goes Live With Customer Traffic

BT’s Global Fabric Goes Live With Customer Traffic

Debut of Global Fabric Internet, the first connectivity service delivered via BT’s new, transformational network-as-a-service (NaaS) platform, Global Fabric. A growing pipeline of customers, services and features are being added over the coming weeks and months.
CrowdStrike Expands Leadership in Hybrid Identity Protection with Falcon Identity Protection for Microsoft Entra ID

CrowdStrike Expands Leadership in Hybrid Identity Protection with Falcon Identity Protection for Microsoft Entra ID

About CrowdStrike CrowdStrike (NASDAQ: CRWD), a global cybersecurity leader, has redefined modern security with the world’s most advanced cloud-native platform for protecting critical areas of enterprise risk – endpoints and cloud workloads, identity and data. Powered by the CrowdStrike Security Cloud and world-class AI, the CrowdStrike Falcon® ...
Nozomi Networks Labs Report Finds Wireless Networks Unprotected as Threats to Critical Infrastructure Escalate

Nozomi Networks Labs Report Finds Wireless Networks Unprotected as Threats to Critical Infrastructure Escalate

SYDNEY AUSTRALIA, February 27, 2025 — The latest Nozomi Networks Labs OT & IoT Security Report released today finds wireless networks woefully unprotected as threat actors continue to gain deep access into critical infrastructure. In the 2nd half of last year, critical infrastructure organisations in the United States saw the highest number of ...
CrowdStrike is the First Cloud-Native Cybersecurity ISV to Exceed $1 Billion in Annual AWS Marketplace Sales

CrowdStrike is the First Cloud-Native Cybersecurity ISV to Exceed $1 Billion in Annual AWS Marketplace Sales

About CrowdStrike CrowdStrike (NASDAQ: CRWD), a global cybersecurity leader, has redefined modern security with the world’s most advanced cloud-native platform for protecting critical areas of enterprise risk – endpoints and cloud workloads, identity and data. Powered by the CrowdStrike Security Cloud and world-class AI, the CrowdStrike Falcon® ...
CrowdStrike Falcon® Cloud Security Supported on Oracle Cloud Infrastructure

CrowdStrike Falcon® Cloud Security Supported on Oracle Cloud Infrastructure

About CrowdStrike CrowdStrike (NASDAQ: CRWD), a global cybersecurity leader, has redefined modern security with the world’s most advanced cloud-native platform for protecting critical areas of enterprise risk – endpoints and cloud workloads, identity and data. Powered by the CrowdStrike Security Cloud and world-class AI, the CrowdStrike Falcon® ...
Cisco Expands Partnership with NVIDIA to Accelerate AI Adoption in the Enterprise

Cisco Expands Partnership with NVIDIA to Accelerate AI Adoption in the Enterprise

Bringing together two of the most utilized networking portfolios, Cisco Silicon One and NVIDIA Spectrum-X, will offer enterprises unmatched flexibility and choice in AI data center investments
Trend Micro Puts Industry Ahead of Cyberattacks with Industry’s First Proactive Cybersecurity AI

Trend Micro Puts Industry Ahead of Cyberattacks with Industry’s First Proactive Cybersecurity AI

New capabilities supercharge proactive risk management, threat modelling, attack path prediction, and actionable insights
Microsoft Extends Partnership with Veeam to Integrate AI Services Into Veeam Products

Microsoft Extends Partnership with Veeam to Integrate AI Services Into Veeam Products

Veeam® Software, announced an expanded partnership with Microsoft—which includes a Microsoft equity investment in Veeam —to build AI solutions that help customers protect, recover, and unlock more value from their data. Seventy-seven per cent of the Fortune 500 and 67% of the Global 2000 rely on Veeam to safeguard their data from cyber-attacks, ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This