The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Flashpoint Report Shows Australia Among Most Targeted Countries for Ransomware Attacks in July
Flashpoint has published its July Cyber Threat Intelligence Index which shows Australia was in the top 10 countries for ransomware attacks last month.

Cloudflare Harnesses the Power of its Global Network to Identify Top Exploited Phishing Methods and Most Impersonated Brands in Inaugural Report
Report underscores that email is the most exploited threat vector, Phishing remains borderless and attackers are increasingly impersonating trusted name brands

Achieving a Robust Zero Trust Environment
The concept of a Zero Trust infrastructure is now broadly understood across most industry sectors, but what’s less clear is the path organisations need to follow to get there.

How Businesses Today can Prevent Advanced Cyber Threats
In recent years workforces have become increasingly mobile, with employees using laptops at home, airports, cafes etc. Then, with the onset of COVID-19, the number of people accessing corporate resources from devices outside the corporate network increased enormously.

Tenable CEO and Chairman calls out Microsoft for unacceptable cybersecurity practices
In a recent article, Amit Yoran, the Chairman and CEO of Tenable, criticised Microsoft for its cybersecurity practices. He mentioned that Senator Ron Wyden had written to various government agencies, urging them to hold Microsoft accountable for negligent cybersecurity practices that have allowed Chinese espionage against the US government. Data from ...

Doing more with less: the three key focus areas for cybersecurity
In an ever-evolving cybersecurity landscape, organisations face the daunting challenge of effectively managing their security initiatives. This responsibility falls not only on the IT teams, but also on the board of directors, who play a critical role in overseeing the organisation's cybersecurity strategy.

Bitdefender releases macOS Threat Landscape Report
Bitdefender has revealed at Black Hat USA 2023 the macOS Threat Landscape Report, which looks at the top threats and trends targeting Apple’s macOS operating system over the duration of 12 months.

CrowdStrike 2023 Threat Hunting Report shows adversary breakout time falls to record low, technology companies most targeted in APJ region
Adversaries took just 79 minutes, on average, to ‘breakout’ of their initial beach head into a victim’s system, with fastest recorded time being just seven minutes.
No results found.
In The News
New Cyber Threat ‘Hazy Hawk’ Hijacks Major Domains – Are You At Risk?
Sydney, Australia, 21 May, 2025 - Subdomain hijacking through abandoned cloud resources is an issue that probably every major organisation has experienced, and these attacks are on the rise.
Infoblox Threat Intel has tracked some of this activity to a threat actor, dubbed Hazy Hawk, that uses hijacked domains to conduct large-scale scams and malware ...
F5 Expands Strategic Collaboration With Red Hat to Enable Scalable, Secure Enterprise AI
Solutions address key challenges in enterprise AI adoption—enabling secure model serving, scalable data movement, and real-time inference across environments
SYDNEY, AUSTRALIA, MAY 21, 2025 – F5 (NASDAQ: FFIV), the global leader in delivering and securing every app and API, today announced an expanded collaboration with Red Hat, the world’s leading ...
Macquarie Telecom Launches VeloCloud Partner Channel In Landmark Agreement
Macquarie Telecom today announced it has signed a first-of-its-kind agreement with VeloCloud to provide its SD-WAN technology to managed service providers (MSPs) across Australia.
The initial four-year agreement will be supported by an investment – worth an estimated A$30 million – by Macquarie Telecom, enabling it to offer the best ...
F5 Delivers Scalable And Secure Cloud-Native Network Functionality For AI And High-Bandwidth Applications
New F5 BIG-IP NEXT CNF 2.0 optimises apps and APIs in Kubernetes environments
SYDNEY, AUSTRALIA, MAY 21, 2025 – F5 (NASDAQ: FFIV), the global leader in delivering and securing every app and API, today unveiled F5 BIG-IP Next Cloud-Native Network Functions (CNF) 2.0, an evolved solution that significantly enhances the capabilities of the F5 ...
Extreme Networks Leads Industry With First All-in-One Networking Platform Powered by Conversational, Multimodal, And Agentic AI
Now in Limited Availability, Extreme Platform ONE helps reduce manual tasks by up to 90 percent, offering the deepest and widest network visualisation and industry’s simplest licensing
PARIS, FRANCE, EXTREME CONNECT--May 20, 2025: Extreme Networks, Inc. (NASDAQ: EXTR) today launched new capabilities within Extreme Platform ONE™, now in Limited ...
GitHub Introduces Coding Agent For GitHub Copilot
At Microsoft Build 2025, GitHub introduced a new, enterprise-ready coding agent for Copilot – integrated, responsible and secured by GitHub’s control layer
Teradata Completes IRAP Assessment for VantageCloud at PROTECTED Level
Newest Assessment Applies to VantageCloud Lake on AWS, Azure and Google Cloud, and Permits Teradata Cloud Offerings for Government Projects
Oracle EU Sovereign Cloud Helps Organisations Across Germany Securely Manage Critical Business Data
RDV, BGN, and Vertama among public and private organisations taking advantage of sovereign cloud capabilities to run their sensitive workloads entirely within the borders of the EU
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
