The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
Recorded Future’s Latest Insikt Report: China’s Targeting of International Companies In Geopolitical Competition
Intelligence company Recorded Future today released the latest report from its threat research division Insikt Group - China’s targeting of international companies in geopolitical competition.

How Visible Is My Profile on the Internet?
There are a lot of good things about being famous, but there are a few not so good things too. – Sharon Stone What is profile visibility?Simply put, profile visibility means how “famous” you are on the internet and what information about you is visible publicly. A simple Google search for your name will often reveal the answer to that ...

Cloud assets the biggest targets for cyber-attacks in Australia as more sensitive data moves to cloud
Thales today announced the release of the 2023 Thales Cloud Security Study, its annual assessment on the latest cloud security threats, trends and emerging risks based on a survey of nearly 3,000 IT and security professionals across 18 countries including Australia.

Closing the Gap: How Modern Forensic Platforms Enhance Cloud Security Investigations
While data is migrating to the cloud at unprecedented rates, the number of cloud security incidents is growing rapidly in response. In its recent cloud threat report, Palo Alto’s Unit 42 concluded threat actors have become adept at exploiting common, everyday issues in the cloud. These range from misconfigurations, weak credentials and lack of ...

Rapid7 Threat Report: Japanese Companies Exposed to Increased Ransomware Risk Through Global Business Footprint
Overseas entities present a serious cyber risk of ransomware and state-sponsored threats

My Facebook is hacked – What do I do?
I must admit that it is quite a stressful experience and for some, it may even turn out to be a harrowing one.
A basic question that you may have is:
Why would someone be interested in my Facebook account? =/
There could be various reasons why someone would want to sneak into your Facebook account.
Tarnish your image - Someone wanting to ...

LogRhythm Announces First Half 2023 Success And Expansions With Product Enhancements That Improve Visibility In The Threats That Matter Most and Reinforce The Company’s Commitment To Being A Trusted Security Partner
LogRhythm, the company helping security teams stop breaches by turning disconnected data and signals into trustworthy insights, has announced its 20-year milestone with a renewed commitment to delivering innovative solutions.

Enterprises to Spend $12.9B on Private 5G Network Security by 2027
Organisations are looking for solutions that integrate neatly with existing technologies
No results found.
In The News
Delinea Unveils Enterprise-Grade Cloud-Native Security Capabilities to Help Safeguard and Scale AI Innovation
New and planned enhancements to Machine and AI solution on the Delinea Platform provide guardrails for organisations to secure the use of AI and secure with AI without compromising compliance or productivity.
Genetec Announces Alignment With ACSC’s Essential Eight Cybersecurity Framework
SYDNEY, May 6, 2025—Genetec Inc. (“Genetec”), the global leader in enterprise physical security software, today announced it has been assessed to align with the Australian Cyber Security Centre’s (ACSC) Essential Eight threat mitigation requirements, as verified by CyberCX.
Developed in partnership with the Australian Government, the ACSC’s ...
CyberArk Named an Overall Leader in the KuppingerCole Analysts 2025 Leadership Compass for Enterprise Secrets Management
Recognition underscores CyberArk’s market leadership in Machine Identity Security
Akamai Firewall for AI Enables Secure AI Applications with Advanced Threat Protection
Akamai’s latest solutions use AI to strengthen security while also protecting businesses from AI-driven threats
Excite Announces $2.8 Million Capital Raise To Accelerate Growth In Cyber Security And Training Initiatives
Excite Managing Director and CEO, Mr Bryan Saba, commented: "The funds will enhance our core capabilities in digital forensics, cyber training, and offensive security whilst directly supporting revenue-generating opportunities already in play. We're building momentum across defence, government and critical infrastructure sectors, and this investment ...
Tenable Research Shows How “Prompt-Injection-Style” Hacks Can Secure the Model Context Protocol (MCP)
Tenable Research has published new findings that flip the script on one of the most discussed AI attack vectors. In the blog “MCP Prompt Injection: Not Just for Evil,” Tenable’s Ben Smith demonstrates how techniques resembling prompt injection can be repurposed to audit, log and even firewall Large Language Model (LLM) tool calls running over the ...
Lumify Group Wins Cyber Security Training Business of the Year in 2025 Australian Cyber Awards
Company celebrates further recognition of excellence as two employees named finalists in individual award categories
Trend Micro Delivers AI-Powered Threat Detection with AWS Infrastructure Support and NVIDIA Integration
Proactive security with AI-powered model built for modern enterprise workloads
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
