The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Research: A Deep Dive into Stream-Jacking Attacks on YouTube

Research: A Deep Dive into Stream-Jacking Attacks on YouTube

Bitdefender has released new research highlighting a rapid increase in YouTube stream-jacking attacks.
Quality over Quantity: Algorithmic Transparency, accountability and Intellectual Property- A Call for Explainable AI

Quality over Quantity: Algorithmic Transparency, accountability and Intellectual Property- A Call for Explainable AI

Our society is populated by artificial entities known as the programmable race. While their presence is often apparent, comprehension sometimes takes a back seat. They serve us in customer service roles, engage with us in video games, and inundate our personalised social media feeds. Today, they have even infiltrated our financial lives, using AI tools ...
How CIAM Platforms Improve Customer Privacy and Security

How CIAM Platforms Improve Customer Privacy and Security

As consumers undertake a growing proportion of transactions online, awareness is increasing of the need to have both strong security and privacy protection-measures in place. Businesses that can tick these boxes will find it much easier to attract and retain customers.
Secure Code Warrior to Host 3rd Annual Devlympics Competition

Secure Code Warrior to Host 3rd Annual Devlympics Competition

Held during Cybersecurity Awareness Month, global tournament enables DevOps community to test their skills against vulnerabilities
Nozomi Networks Labs Discovers Flaws in Energy and Industrial Machinery Protection Systems

Nozomi Networks Labs Discovers Flaws in Energy and Industrial Machinery Protection Systems

Nozomi Networks has identified three vulnerabilities on the Bently Nevada 3500 rack model manufactured by Baker Hughes, a company that develops and deploys technology solutions for energy and industrial companies.
How deep is the depth of the deepfake?

How deep is the depth of the deepfake?

Use of deepfakes has risen dramatically over the last two years. We’ve witnessed celebrities push back over their likeness being used to mock or embarrass. But it doesn’t stop there.
It’s been 12 Months since the Optus Breach.  Now What?

It’s been 12 Months since the Optus Breach. Now What?

Optus, an Australian telecommunications company, experienced a cyberattack last year on September 22, 2022. One of the most prominent breaches in Australian history. As a result, customers had their personal information stolen and leaked on the dark web. Outrage from customers and businesses was rampant across social media, in the media and of course ...
Why a supportive security culture will bolster disaster recovery efforts during a cyberattack

Why a supportive security culture will bolster disaster recovery efforts during a cyberattack

In today's complex and fast-moving threat landscape, cybercriminals continuously adapt their tactics to breach systems and gain access to sensitive data.
No results found.

In The News

OVHcloud Partners With Crayon to Deliver Transformative, Cost-effective Technology Solutions Across the World

OVHcloud Partners With Crayon to Deliver Transformative, Cost-effective Technology Solutions Across the World

Sydney – June 30th 2025 – OVHcloud, a global cloud player and the European Cloud leader, today announced a partnership agreement with Crayon, a global leader in innovation and IT services. The agreement enables organisations to access and build in more than 45 regions* including Australia, on the cost-effective, secure and powerful cloud ...
New Trustwave Research On Technology Sector Exposes Escalating Cyber Threats, Dark Web Supply Chain Attacks, AI-Driven Risks

New Trustwave Research On Technology Sector Exposes Escalating Cyber Threats, Dark Web Supply Chain Attacks, AI-Driven Risks

June 26, 2025 – Trustwave, a leading cybersecurity and managed security services provider, has released a series of reports that give an unprecedented look into the evolving threat landscape targeting technology organisations worldwide, revealing how cybercriminals are leveraging both advanced technologies and the dark web to amplify the scale and ...
OPSWAT and SentinelOne® Enter OEM Partnership to Further Strengthen Multi-Layered Malware Detection with AI

OPSWAT and SentinelOne® Enter OEM Partnership to Further Strengthen Multi-Layered Malware Detection with AI

The addition of SentinelOne’s AI detection capabilities equips OPSWAT customers with faster detection and better coverage across modern infrastructure 
Semperis Research Discovers A Severe Vulnerability In Microsoft Entra ID Impacting 10% of Global SaaS Apps

Semperis Research Discovers A Severe Vulnerability In Microsoft Entra ID Impacting 10% of Global SaaS Apps

Semperis Research Uncovers Ongoing Risk from nOAuth Vulnerability in Microsoft Entra ID, Affecting Enterprise SaaS Applications nOAuth continues to go undetected by SaaS vendors, who may not even know what to look for and it is nearly impossible for enterprise customers to defend against, allowing attackers to take over accounts and exfiltrate data.
Ericsson Mobility Report June 2025 Highlights Growing Monetisation Appeal of 5G Fixed Wireless Access

Ericsson Mobility Report June 2025 Highlights Growing Monetisation Appeal of 5G Fixed Wireless Access

– More than half of all service providers globally who offer fixed wireless access now do so with speed-based monetisation benefits enhanced by 5G – 5G subscriptions to top 2.9 billion globally by the end of 2025 – 5G networks forecast to handle 80 percent of global mobile traffic by the end of 2030
Trend Micro Named a Leader in IDC MarketScape for CNAPP

Trend Micro Named a Leader in IDC MarketScape for CNAPP

SYDNEY, June 26, 2025 – Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cybersecurity leader, today announced it has been named as a Leader in the IDC MarketScape for Worldwide Cloud-Native Application Protection Platforms (CNAPP) 2025 Vendor Assessment (doc #US53549925, June 2025). To read the IDC MarketScape: Worldwide Cloud-Native ...
New ISACA Research: 81% Using AI At Work – But Only 28% Of Firms Have A Policy In Place

New ISACA Research: 81% Using AI At Work – But Only 28% Of Firms Have A Policy In Place

ISACA finds: 89% of digital trust pros say increased AI skills and knowledge needed to retain job or advance their career over next two years; and nearly a third of organisations are increasing jobs for AI-related functions within 12 months.
News: 75% of Building Management Systems Contain Known Exploited Vulnerabilities And 51% Are Insecurely Connected To The Internet

News: 75% of Building Management Systems Contain Known Exploited Vulnerabilities And 51% Are Insecurely Connected To The Internet

New Research from Claroty's Team82 Reveals Riskiest Building Management System Exposures Presence of KEVs, KEVs Linked to Ransomware, and Insecure Internet Exposure Found to be Pervasive Among BMS, BAS According to New Report SYDNEY—June 26, 2025—Claroty, the cyber-physical systems (CPS) protection company, today announced new research on the ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This