The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Australia Sanctions Russian Hacker

Australia Sanctions Russian Hacker

Australia has boldly stepped into the cyber battlefield, wielding its autonomous cyber sanctions framework as a weapon against cybercrime. This decisive move came after a Russian individual, Aleksandr Ermakov, was implicated in the cyberattack on Medibank Private, one of the country's largest healthcare networks. The sanctions, a first of their kind to ...
AI for Cybersecurity: Use With Caution

AI for Cybersecurity: Use With Caution

This article discusses the challenges and opportunities that AI poses to cybersecurity, specifically looking into how companies can approach it with caution.
Why Humans Are No Longer the Weakest Link in the Cyber Chain

Why Humans Are No Longer the Weakest Link in the Cyber Chain

We’ve all heard the mantra that ‘humans are the weakest link’ in any organisation’s cybersecurity defences, but with generative AI technology making exploits such as phishing email campaigns more convincing and scalable, it’s no longer fair — or effective — to blame individuals for succumbing to attacks. It’s Andrew’s view that while cyber training ...
Stream-Jacking 2.0: Deep Fakes Power Account Takeovers on YouTube to Maximise Crypto-doubling Scams

Stream-Jacking 2.0: Deep Fakes Power Account Takeovers on YouTube to Maximise Crypto-doubling Scams

Stream-Jacking & Deep fakes. If you ever observe content promoting giveaways or other events from well-known companies, always make sure to double-check the promotions on official websites.

Credential Stuffing – Industry Commentary From Tenable

Commentary on a new tactic scammers are employing called credential stuffing which is affecting the retail sector and can result in fraudulent transactions being made using payment information saved on popular retail sites.
Why Effective Digital ID Management Is Vital in Financial Services

Why Effective Digital ID Management Is Vital in Financial Services

Institutions that take digital ID seriously and put it at the forefront of application planning and deployment will be best placed to secure an increasing share of a rapidly growing market.
Improving Cybersecurity Within Australia’s Water Utilities

Improving Cybersecurity Within Australia’s Water Utilities

In a world of unceasing cyberattacks, security is no longer a luxury but a vital investment. By taking action now, utilities can ensure the uninterrupted flow of water to their customers at all times.
The Three Steps to Mitigate API Abuse in Cloud-hosted Applications

The Three Steps to Mitigate API Abuse in Cloud-hosted Applications

APIs have become a strategic necessity for business because they aid flexibility and agility, yet many organisations have remained cautious of their use due to worries about the data that APIs expose. The concerns are fanned by regular reports of IT security breaches that cause downtime, data loss and financial problems for victims. This article looks ...
No results found.

In the News

New Riverbed Survey Reveals AI Readiness Gaps in Australia: Despite Record Investments, Only One in 10 AI Projects Fully Deployed

New Riverbed Survey Reveals AI Readiness Gaps in Australia: Despite Record Investments, Only One in 10 AI Projects Fully Deployed

2025 State of AI Readiness in IT Operations survey highlights gaps in implementation, confidence, and data quality, with tools consolidation, OpenTelemetry adoption and resilient, cost-effective IT infrastructure emerging as critical enablers of AI success 
Latest Darktrace Investigations Uncover Novel & Emerging DDoS Botnet for Hire – ShadowV2

Latest Darktrace Investigations Uncover Novel & Emerging DDoS Botnet for Hire – ShadowV2

Darktrace's latest investigation uncovered a novel campaign that blends traditional malware with modern devops technology. At the center of this campaign is a Python-based command-and-control (C2) framework hosted on GitHub CodeSpaces. This campaign also utilizes a Python based spreader with a multi-stage Docker deployment as the initial access vector. ...
BeyondTrust Strengthens Innovation Leadership With Appointment of Felix Gaehtgens as VP of Product Strategy

BeyondTrust Strengthens Innovation Leadership With Appointment of Felix Gaehtgens as VP of Product Strategy

Strategic leadership addition accelerates BeyondTrust’s innovation in identity security, machine IAM, and privileged access management (PAM). Gaehtgens brings over a decade of Gartner expertise in identity security to BeyondTrust.
Dragos Platform 3.0 Delivers Industry’s Fastest Path to Effective OT Cyber Defence

Dragos Platform 3.0 Delivers Industry’s Fastest Path to Effective OT Cyber Defence

Dragos has launched Dragos Platform 3.0, which provides breakthrough capabilities that empower industrial defenders to act even faster and more confidently to protect against intensifying cyber threats.
Tenable Unites Top CISOs to Forge Exposure Management Framework for Proactive Risk Management

Tenable Unites Top CISOs to Forge Exposure Management Framework for Proactive Risk Management

Exposure Management Leadership Council created to mature exposure management into a proactive security discipline
Vection Technologies Secures $22.3m AI Defence Deal With NATO-approved Partner

Vection Technologies Secures $22.3m AI Defence Deal With NATO-approved Partner

INTEGRATEDXR company Vection Technologies Ltd (ASX:VR1) has announced has executed a $22.3m (scalable up to $29.5m at same conditions) multi-year master framework agreement with a repeat NATO-approved customer and partner operating within the European defence sector. Highlights $22.3m framework agreement executed with a repeat NATO-approved ...
Genetec Delivers Faster, Smarter Investigations in Security Center SaaS

Genetec Delivers Faster, Smarter Investigations in Security Center SaaS

New intelligent automation-powered investigation capabilities enable operators to quickly locate video evidence, understand context, and close cases in minutes.
Check Point Software Technologies Celebrates 2025 APAC Partner Excellence Awarding Australia’s DXC Technology as APAC Top Partner of the Year and S5 Technology Group as Workspace Security Partner of the Year

Check Point Software Technologies Celebrates 2025 APAC Partner Excellence Awarding Australia’s DXC Technology as APAC Top Partner of the Year and S5 Technology Group as Workspace Security Partner of the Year

Sydney, 22 September 2025 - Check Point® Software Technologies Ltd., a pioneer and global leader of cyber security solutions, has announced its top-performing partners across the Asia Pacific region at the 2025 Check Point Software Technologies Asia Pacific Partner Conference held earlier this month in Hanoi, Vietnam. The annual conference brought ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This