The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Espionage Fuels Global Cyberattacks

Espionage Fuels Global Cyberattacks

In the past year cyberattacks have touched 120 countries, fueled by government-sponsored spying and with influence operations (IO) also rising.
Cybersecurity Incidents Are Now Full-Scale Crisis Management

Cybersecurity Incidents Are Now Full-Scale Crisis Management

Cybersecurity incidents have typically been viewed through a technical lens.
Research: A Deep Dive into Stream-Jacking Attacks on YouTube

Research: A Deep Dive into Stream-Jacking Attacks on YouTube

Bitdefender has released new research highlighting a rapid increase in YouTube stream-jacking attacks.
Quality over Quantity: Algorithmic Transparency, accountability and Intellectual Property- A Call for Explainable AI

Quality over Quantity: Algorithmic Transparency, accountability and Intellectual Property- A Call for Explainable AI

Our society is populated by artificial entities known as the programmable race. While their presence is often apparent, comprehension sometimes takes a back seat. They serve us in customer service roles, engage with us in video games, and inundate our personalised social media feeds. Today, they have even infiltrated our financial lives, using AI tools ...
How CIAM Platforms Improve Customer Privacy and Security

How CIAM Platforms Improve Customer Privacy and Security

As consumers undertake a growing proportion of transactions online, awareness is increasing of the need to have both strong security and privacy protection-measures in place. Businesses that can tick these boxes will find it much easier to attract and retain customers.
Secure Code Warrior to Host 3rd Annual Devlympics Competition

Secure Code Warrior to Host 3rd Annual Devlympics Competition

Held during Cybersecurity Awareness Month, global tournament enables DevOps community to test their skills against vulnerabilities
Nozomi Networks Labs Discovers Flaws in Energy and Industrial Machinery Protection Systems

Nozomi Networks Labs Discovers Flaws in Energy and Industrial Machinery Protection Systems

Nozomi Networks has identified three vulnerabilities on the Bently Nevada 3500 rack model manufactured by Baker Hughes, a company that develops and deploys technology solutions for energy and industrial companies.
How deep is the depth of the deepfake?

How deep is the depth of the deepfake?

Use of deepfakes has risen dramatically over the last two years. We’ve witnessed celebrities push back over their likeness being used to mock or embarrass. But it doesn’t stop there.
No results found.

In The News

Fortinet Strengthens Code-to-Cloud Security With CNAPP Enhancements and Launches Expanded Solution Availability in AWS Marketplace

Fortinet Strengthens Code-to-Cloud Security With CNAPP Enhancements and Launches Expanded Solution Availability in AWS Marketplace

New Lacework FortiCNAPP innovations and expanded solution availability in AWS Marketplace accelerate full application life-cycle protection and threat detection and response 
World Banking Leaders Warn of Increasing Sophistication of Criminal Money Laundering, BioCatch Reports

World Banking Leaders Warn of Increasing Sophistication of Criminal Money Laundering, BioCatch Reports

Nearly 80% of the 800 fraud-management, anti-money laundering (AML), and risk and compliance leaders surveyed in BioCatch’s first-ever Dark Economy Survey say criminal enterprises today are more sophisticated at laundering money than financial institutions (FIs) are at detecting that laundering. Equally concerning, 83% of respondents agree there exists ...
UiPath Showcases Next-Generation Enterprise-Grade Platform at Australian Agentic Automation Summit

UiPath Showcases Next-Generation Enterprise-Grade Platform at Australian Agentic Automation Summit

Breaks down the barriers to enterprise AI adoption by enhancing security and compliance, improving accuracy and reliability, overcoming stalled pilot projects, and avoiding vendor lock-in  
Tenable Report Warns Cloud Security Gaps Threaten Australian Businesses

Tenable Report Warns Cloud Security Gaps Threaten Australian Businesses

9% of cloud storage resources contain sensitive data, while 54% of organisations have secrets embedded in workloads, exposing critical vulnerabilities
Bitdefender to Acquire Mesh Security, Expanding Its Email Security Capabilities

Bitdefender to Acquire Mesh Security, Expanding Its Email Security Capabilities

Bitdefender has announced it has agreed to acquire Mesh Security Limited (Mesh), a provider of advanced email security solutions. Through the acquisition, Mesh’s email security technology and capabilities will be integrated into Bitdefender’s extended detection and response (XDR) platform and managed detection and response (MDR) services. The ...
Oracle Advances National Security with New Sovereign, Air-Gapped Cloud Offering

Oracle Advances National Security with New Sovereign, Air-Gapped Cloud Offering

Oracle Compute Cloud@Customer Isolated manages classified workloads to support mission success
SentinelOne Teams With AWS To Bring Best In Class Cloud Security Protection To Customers Through The New AWS Security Hub

SentinelOne Teams With AWS To Bring Best In Class Cloud Security Protection To Customers Through The New AWS Security Hub

As an initial launch partner, SentinelOne and AWS gives security teams the data, visibility, and automation to protect their AWS environments from build time to run time  MOUNTAIN VIEW, Calif. — June 17, 2025 — SentinelOne® (NYSE: S), a global leader in AI-powered security, today announced that it is a launch partner for the new AWS Security Hub. The ...
Tenable Uncovers “GerriScary” Supply Chain Compromise Vulnerability In Popular Google’s Open Source Projects – GerriScary Allowed Unauthorised Code Submission To At Least 18 Popular Google Projects

Tenable Uncovers “GerriScary” Supply Chain Compromise Vulnerability In Popular Google’s Open Source Projects – GerriScary Allowed Unauthorised Code Submission To At Least 18 Popular Google Projects

Tenable, the exposure management company, has identified a vulnerability in Google’s open-source code review system, Gerrit, dubbed GerriScary. The vulnerability allowed unauthorised code submission to at least 18 major Google projects, including ChromiumOS (CVE-2025-1568), Chromium, Dart, and Bazel. GerriScary could have allowed attackers to submit ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This