The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

China’s Cyber Revenge | Why the PRC Fails to Back Its Claims of Western Espionage

China’s Cyber Revenge | Why the PRC Fails to Back Its Claims of Western Espionage

Why the PRC Fails to Back Its Claims of Western Espionage: China launched an offensive media strategy to push narratives around US hacking operations following a joint statement by the US, UK, and EU in July 2021 about China’s irresponsible behavior in cyberspace. Some PRC cybersecurity companies now coordinate report publication with government ...
The Future of CISOs: Navigating Trends and Evolving Roles

The Future of CISOs: Navigating Trends and Evolving Roles

With escalating cyber threats and data breaches, the need for effective cybersecurity leadership and measures has never been more important. The increasing trend of cyber criminality has placed the responsibility of Chief Information Security Officers (CISO) in the spotlight, and the role of the CISO is increasingly critical. With the rapid advancement ...
Pervasive OT and IoT Network Anomalies Raise Red Flags as Threats to Critical Infrastructure Become More Sophisticated

Pervasive OT and IoT Network Anomalies Raise Red Flags as Threats to Critical Infrastructure Become More Sophisticated

The latest Nozomi Networks Labs OT & IoT Security Report released today finds that network anomalies and attacks were the most prevalent threat to operational technology (OT) and internet of things (IoT) environments. Vulnerabilities within critical manufacturing also surged 230% – a cause for concern as threat actors have far more opportunities to ...
HijackLoader Expands Techniques to Improve Defense Evasion

HijackLoader Expands Techniques to Improve Defense Evasion

CrowdStrike researchers have identified a HijackLoader (aka IDAT Loader) sample that employs sophisticated evasion techniques to enhance the complexity of the threat. Think of loaders like wolves in sheep clothing. Their purpose is to sneak in, introduce and execute more sophisticated threats and tools. Our research revealed that this recent variant of ...
Boosting Confidence in Ransomware Recovery

Boosting Confidence in Ransomware Recovery

The safeguarding of digital assets is an ongoing, uphill battle. This fight is made harder still by the gaps in cyber resilience policies and the alarming lack of confidence in ransomware recovery. The need for boosted recovery confidence underscores the importance of addressing these challenges to fortify organisations against the rising tide of ...
Video Killed the Security Star

Video Killed the Security Star

Exploring the overlooked risk of sensitive info leaks in videos, with examples of real-world breaches like password exposures and crypto key losses.
Sophos Report Reveals 86 per Cent of Cybersecurity and IT Professionals in Australia Are Impacted by Burnout and Fatigue

Sophos Report Reveals 86 per Cent of Cybersecurity and IT Professionals in Australia Are Impacted by Burnout and Fatigue

Sophos, a global leader in innovating and delivering cybersecurity as a service, released the findings of its fourth “The Future of Cybersecurity in Asia Pacific and Japan” report in collaboration with Tech Research Asia (TRA). The report found that 86 per cent of Australian respondents in cybersecurity and IT roles are impacted by burnout and ...
Compliance and Security: The AI-Powered Identity Revolution

Compliance and Security: The AI-Powered Identity Revolution

The cyber security landscape is grappling with an expanding attack vector as the rise in identities from digitisation has exposed organisations to increased vulnerabilities. The challenge is most organisations haven’t yet implemented a comprehensive identity security strategy to help manage the access for hundreds to thousands of identities, with ...
No results found.

In the News

Dynatrace Empowers GMHBA to Enhance Observability and Member Experience

Dynatrace Empowers GMHBA to Enhance Observability and Member Experience

SYDNEY, 24 September 2025 – Dynatrace, the leading AI-powered observability platform, today announced its successful collaboration with Australia's leading regionally based private health insurer GMHBA, to transform the performance and reliability of its technology infrastructure. The partnership has equipped GMHBA with advanced tools to predict and ...
Proofpoint Unveils First Agentic AI Solution for Human Communications Intelligence

Proofpoint Unveils First Agentic AI Solution for Human Communications Intelligence

Breakthrough innovation transforms enterprise communications into actionable intelligence, mitigating misconduct, regulatory risk, and insider threats in real time 
Cloudflare Helps Protect Independent Journalism and Non-Profits From AI Crawlers–For Free

Cloudflare Helps Protect Independent Journalism and Non-Profits From AI Crawlers–For Free

Cloudflare’s Project Galileo will now help empower journalists and non-profits to control how AI uses their original content 
Delinea Unveils Free Open Source MCP Server to Safeguard AI Agents

Delinea Unveils Free Open Source MCP Server to Safeguard AI Agents

New GitHub package enables organisations to connect AI agents with the Delinea Platform for secure credential access, policy enforcement, and compliance 
New Riverbed Survey Reveals AI Readiness Gaps in Australia: Despite Record Investments, Only One in 10 AI Projects Fully Deployed

New Riverbed Survey Reveals AI Readiness Gaps in Australia: Despite Record Investments, Only One in 10 AI Projects Fully Deployed

2025 State of AI Readiness in IT Operations survey highlights gaps in implementation, confidence, and data quality, with tools consolidation, OpenTelemetry adoption and resilient, cost-effective IT infrastructure emerging as critical enablers of AI success 
Latest Darktrace Investigations Uncover Novel & Emerging DDoS Botnet for Hire – ShadowV2

Latest Darktrace Investigations Uncover Novel & Emerging DDoS Botnet for Hire – ShadowV2

Darktrace's latest investigation uncovered a novel campaign that blends traditional malware with modern devops technology. At the center of this campaign is a Python-based command-and-control (C2) framework hosted on GitHub CodeSpaces. This campaign also utilizes a Python based spreader with a multi-stage Docker deployment as the initial access vector. ...
BeyondTrust Strengthens Innovation Leadership With Appointment of Felix Gaehtgens as VP of Product Strategy

BeyondTrust Strengthens Innovation Leadership With Appointment of Felix Gaehtgens as VP of Product Strategy

Strategic leadership addition accelerates BeyondTrust’s innovation in identity security, machine IAM, and privileged access management (PAM). Gaehtgens brings over a decade of Gartner expertise in identity security to BeyondTrust.
Dragos Platform 3.0 Delivers Industry’s Fastest Path to Effective OT Cyber Defence

Dragos Platform 3.0 Delivers Industry’s Fastest Path to Effective OT Cyber Defence

Dragos has launched Dragos Platform 3.0, which provides breakthrough capabilities that empower industrial defenders to act even faster and more confidently to protect against intensifying cyber threats.
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This