The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
Enhancing And Democratising DevSecOps With Generative AI And ClickOps
While still nascent, generative AI and no-code ClickOps solutions show immense promise for augmenting and spreading DevSecOps capabilities more widely in 2024, enabling enhanced delivery, and scalability across critical systems.
Protecting Your Heart and Wallet Against Phishing This Valentine’s Day
Phishing attacks, the most common form of social engineering, manipulate users into divulging sensitive information or clicking malicious links. With the rise of AI tools like ChatGPT, these scams have become more sophisticated, leveraging fake domains and chatbots to mimic legitimate entities or even potential romantic partners.
China’s Cyber Revenge | Why the PRC Fails to Back Its Claims of Western Espionage
Why the PRC Fails to Back Its Claims of Western Espionage:
China launched an offensive media strategy to push narratives around US hacking operations following a joint statement by the US, UK, and EU in July 2021 about China’s irresponsible behavior in cyberspace.
Some PRC cybersecurity companies now coordinate report publication with government ...

The Future of CISOs: Navigating Trends and Evolving Roles
With escalating cyber threats and data breaches, the need for effective cybersecurity leadership and measures has never been more important. The increasing trend of cyber criminality has placed the responsibility of Chief Information Security Officers (CISO) in the spotlight, and the role of the CISO is increasingly critical. With the rapid advancement ...
Pervasive OT and IoT Network Anomalies Raise Red Flags as Threats to Critical Infrastructure Become More Sophisticated
The latest Nozomi Networks Labs OT & IoT Security Report released today finds that network anomalies and attacks were the most prevalent threat to operational technology (OT) and internet of things (IoT) environments. Vulnerabilities within critical manufacturing also surged 230% – a cause for concern as threat actors have far more opportunities to ...

HijackLoader Expands Techniques to Improve Defense Evasion
CrowdStrike researchers have identified a HijackLoader (aka IDAT Loader) sample that employs sophisticated evasion techniques to enhance the complexity of the threat. Think of loaders like wolves in sheep clothing. Their purpose is to sneak in, introduce and execute more sophisticated threats and tools. Our research revealed that this recent variant of ...

Boosting Confidence In Ransomware Recovery
The safeguarding of digital assets is an ongoing, uphill battle. This fight is made harder still by the gaps in cyber resilience policies and the alarming lack of confidence in ransomware recovery. The need for boosted recovery confidence underscores the importance of addressing these challenges to fortify organisations against the rising tide of ...

Video Killed the Security Star
Exploring the overlooked risk of sensitive info leaks in videos, with examples of real-world breaches like password exposures and crypto key losses.
No results found.
In The News
Cyber Security Predictions for 2026
Among the key trends, Excite Cyber, CEO, Bryan Saba highlights new AI regulations, stronger governance over LLM development and predicts cyber risks will become encompassed in comprehensive enterprise-wide business risk registers and demand will surge for digital forensics training. Excite Cyber also anticipates that Australia will see rapid adoption ...
Exabeam and Cribl Partner to Power Scalable, High-Fidelity Threat Detection with Next-Gen Data Pipelines
Partnership advances an outcome-driven data strategy, decoupling security outcomes from data volume
Swift AI Innovation Creates Blueprint for Banks to Stop Fraud Faster Through Cross-Border Collaboration
Swift and 13 international banks doubled real time fraud detection in trials involving ten million test transactions Privacy-enhancing technologies enabled institutions to share transaction data while maintaining end-to-end privacy and security Used at scale, this technology could enable a joined-up fraud defence across global finance, lead to faster ...
Canalys Study Finds Every $1 of Falcon Platform Sales Leads Up to $7 in Partner Services Revenue
Independent research validates Falcon platform transformation as the leading engine of partner profitability, fueling growth and sustained returns
CrowdStrike and Meta Deliver New Benchmarks for the Evaluation of AI Performance in Cybersecurity
New benchmarks define how LLMs should be tested in the SOC – measuring real threats, workflows, and outcomes to help defenders
CrowdStrike Secures the Future of AI Across the Enterprise Ecosystem
Only CrowdStrike delivers unified protection across the entire AI stack – from compute to cloud, data to models, and agents to applications – in partnership with the world’s AI leaders
NinjaOne Now Available for Purchase on the CrowdStrike Marketplace
CrowdStrike customers gain simplified access to NinjaOne to streamline IT and boost productivity
F5 to Acquire CalypsoAI to Bring Advanced AI Guardrails to Large Enterprises
CalypsoAI's adaptive AI inference security solutions will enable companies to deliver AI apps more securely
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
