The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

I Have Been Attacked by Ransomware. What Should I Do Now?

I Have Been Attacked by Ransomware. What Should I Do Now?

Retro Blockbuster Plot: Sometime in the 1980s – a filthy rich industrialist – his beautiful daughter – a constant target for kidnappers – always accompanied by bodyguards – one fateful day – kidnapping succeeds – hefty ransom asked – her big strong bloke comes to rescue – happy ending!Nah!! Kidnappers today have become very tech-savvy and, if I might ...
66% of Malware is Delivered Through PDFs, New Report from Palo Alto Networks Unit 42 Finds

66% of Malware is Delivered Through PDFs, New Report from Palo Alto Networks Unit 42 Finds

Vulnerabilities continue to be a popular method for threat actors to infect victims, with exploit attempts of vulnerabilities increasing by 55% in the past year
How Safe are bit.ly (or Tiny URL) Links?

How Safe are bit.ly (or Tiny URL) Links?

What are shortened or tiny URLs?In the world of shortcuts, how could URLs stay behind. With domain names getting stranger and web links getting obnoxiously longer, tiny URLs come to the rescue. These are like capsule covers that make medicines easy to digest. Usually web addresses are attached with a lot of information (called query string) that helps ...
How to remove the roadblocks to going passwordless

How to remove the roadblocks to going passwordless

The road to passwordless authentication is one most organisations will tread, but they may require guidance in some key areas along the way, writes Ash Diffey, Vice President Asia Pacific and Japan, Ping Identity
How to remove the roadblocks to going passwordless

How to remove the roadblocks to going passwordless

The road to passwordless authentication is one most organisations will tread, but they may require guidance in some key areas along the way, writes Ash Diffey, Vice President Asia Pacific and Japan, Ping Identity
How to protect against double-extortion ransomware attacks

How to protect against double-extortion ransomware attacks

Of all the cybersecurity challenges facing organisations today, one of the most pervasive is ransomware attacks.
How to protect against double-extortion ransomware attacks

How to protect against double-extortion ransomware attacks

Of all the cybersecurity challenges facing organisations today, one of the most pervasive is ransomware attacks.
Insikt Report – Deepfakes : I Have No Mouth, And I Must Do Crime

Insikt Report – Deepfakes : I Have No Mouth, And I Must Do Crime

Intelligence company Recorded Future today released the findings of its latest deepfakes research. Titled “I Have No Mouth, And I Must Do Crime”, the report looks at how the spread of deepfake technologies, specifically through advancements in AI-based voice cloning, is pushing scams to a new level.
No results found.

In The News

Wild Tech Malaysia Awarded Major Microsoft Dynamics 365 ERP Implementation Project by New Hoong Fatt Group

Wild Tech Malaysia Awarded Major Microsoft Dynamics 365 ERP Implementation Project by New Hoong Fatt Group

Wild Tech Malaysia is proud to announce its selection as the service provider for a comprehensive Microsoft Dynamics 365 Enterprise Resource Planning (ERP) implementation project for New Hoong Fatt (“NHF”) Group, a leading Malaysian automotive replacement parts solutions provider. This strategic implementation will modernise and integrate business ...
Tenable Research in Verizon DBIR: Additional Research Analysis

Tenable Research in Verizon DBIR: Additional Research Analysis

Vulnerability exploitation surged as the initial access vector for 20% of breaches—a 34% increase year over year and now rivalling the top initial access vector (credential abuse), according to the newly released 2025 Verizon Data Breach Investigation Report (DBIR). To dig deep into this risk, Tenable contributed enriched data on the most exploited ...
New Report Reveals Overconfidence In Cyber Preparedness Among Australian Businesses

New Report Reveals Overconfidence In Cyber Preparedness Among Australian Businesses

Veeam announced the findings of their latest research, From Risk to Resilience: Veeam 2025 Ransomware Trends and Proactive Strategies Report, revealing alarming insights into the evolving threat landscape of ransomware attacks. With cyber threats becoming more sophisticated and frequent, the report underlines the need for organisations to prioritise ...
Armis Launches Vulnerability Intelligence Database to Enhance Preemptive Security

Armis Launches Vulnerability Intelligence Database to Enhance Preemptive Security

“The Armis Vulnerability Intelligence Database is a critical, accessible resource built by the security community, for the security community. It translates vulnerability data into real-world impact so that businesses can adapt quickly and make more informed decisions to manage cyber threats.”
CyberArk Strengthens Identity Security for AI Agents with Accenture’s AI Refinery

CyberArk Strengthens Identity Security for AI Agents with Accenture’s AI Refinery

Companies team to empower organisations to securely leverage AI agents
Rapid7 Introduces Intelligence Hub Within Its Command Platform for Threat Intelligence With Curated, Actionable Insights

Rapid7 Introduces Intelligence Hub Within Its Command Platform for Threat Intelligence With Curated, Actionable Insights

Rapid7 has released Intelligence Hub, an integrated threat intelligence solution that will provide security teams with meaningful context and actionable insights for accelerated detection and response. It addresses several key challenges faced by security teams, including siloed intelligence platforms, lack of context, and the inability to prioritise ...
Tenable Research Exposes ConfusedComposer, A Privilege Escalation Vulnerability in Google Cloud Platform

Tenable Research Exposes ConfusedComposer, A Privilege Escalation Vulnerability in Google Cloud Platform

ConfusedComposer Exploits Hidden Cloud Service Dependencies
CIOSO Global Partners with Q-Net Security To Advance Hardware-Based Cybersecurity Solutions

CIOSO Global Partners with Q-Net Security To Advance Hardware-Based Cybersecurity Solutions

This collaboration underscores CIOSO Global's mission to discover and champion innovative approaches to cybersecurity in an ever-evolving threat landscape, which includes AI and quantum computing-driven cyberattacks.
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This