The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

I Have Been Attacked by Ransomware. What Should I Do Now?
Retro Blockbuster Plot: Sometime in the 1980s – a filthy rich industrialist – his beautiful daughter – a constant target for kidnappers – always accompanied by bodyguards – one fateful day – kidnapping succeeds – hefty ransom asked – her big strong bloke comes to rescue – happy ending!Nah!! Kidnappers today have become very tech-savvy and, if I might ...

66% of Malware is Delivered Through PDFs, New Report from Palo Alto Networks Unit 42 Finds
Vulnerabilities continue to be a popular method for threat actors to infect victims, with exploit attempts of vulnerabilities increasing by 55% in the past year

How Safe are bit.ly (or Tiny URL) Links?
What are shortened or tiny URLs?In the world of shortcuts, how could URLs stay behind. With domain names getting stranger and web links getting obnoxiously longer, tiny URLs come to the rescue. These are like capsule covers that make medicines easy to digest. Usually web addresses are attached with a lot of information (called query string) that helps ...

How to remove the roadblocks to going passwordless
The road to passwordless authentication is one most organisations will tread, but they may require guidance in some key areas along the way, writes Ash Diffey, Vice President Asia Pacific and Japan, Ping Identity

How to remove the roadblocks to going passwordless
The road to passwordless authentication is one most organisations will tread, but they may require guidance in some key areas along the way, writes Ash Diffey, Vice President Asia Pacific and Japan, Ping Identity

How to protect against double-extortion ransomware attacks
Of all the cybersecurity challenges facing organisations today, one of the most pervasive is ransomware attacks.

How to protect against double-extortion ransomware attacks
Of all the cybersecurity challenges facing organisations today, one of the most pervasive is ransomware attacks.
Insikt Report – Deepfakes : I Have No Mouth, And I Must Do Crime
Intelligence company Recorded Future today released the findings of its latest deepfakes research. Titled “I Have No Mouth, And I Must Do Crime”, the report looks at how the spread of deepfake technologies, specifically through advancements in AI-based voice cloning, is pushing scams to a new level.
No results found.
In The News
ColorTokens Named Winner of Global InfoSec Awards for Fifth Consecutive Year, Highlighting Leadership in Breach Readiness, Microsegmentation, and OT Security
ColorTokens recognized for innovative enterprise microsegmentation solution in Cyber Defense Magazine’s 13th annual awards program
KnowBe4 Appoints Bryan Palma as President and CEO
KnowBe4 Appoints Bryan Palma as President and CEO | Founder Stu Sjouwerman Named Executive Chairman
Fortinet Threat Report Reveals Record Surge In Automated Cyberattacks As Adversaries Weaponise Artificial Intelligence And Fresh Techniques
FortiGuard Labs 2025 Global Threat Landscape Report highlights a boom in Cybercrime-as-a-Service on the darknet, fuelling a lucrative market for credentials, exploits, and access
KnowBe4 Releases Q1 2025 Phishing Report, With Internal Communications Dominating
Report reveals the most deceptive email subjects end users click, with internal communications driving 60% of phishing failures
Barracuda Networks Email Threat Radar April 2025
Email Threat Radar – April 2025; Over the last month, Barracuda threat analysts identified several notable email-based threats targeting organizations around the world and designed to evade detection and boost the chances of success, including:
Email attacks targeting victims with toxic calendar invites
Phishing kits abusing a trusted ...
Rapid7’s Command Platform Launches Unified Threat-Informed Remediation
Rapid7 has launched major enhancements to its Command Platform, introducing unified threat-informed remediation to help security teams proactively identify, prioritise, and resolve critical exposures across their entire environment. Importantly, Rapid7 backs its solution with a Breach Protection Warranty, providing financial coverage and added ...
CrowdStrike Unveils Unified Data Protection to Secure Data Across Endpoints, Cloud, GenAI and SaaS
New Falcon Data Protection innovations stop encrypted file exfiltration, GenAI data leaks and SaaS misconfigurations, closing critical gaps attackers exploit to steal sensitive data
CIOSO Global’s Greg Sullivan Takes Main Stage At Kaseya Connect To Discuss “What Keeps CISOs Up At Night”
SAINT LOUIS, MO – April 29, 2025 – CIOSO Global, a leading provider of risk-based cybersecurity advisory services, today announced that Founding Partner Greg Sullivan has been invited to speak at Kaseya Connect Global, taking place April 28 – May 1, 2025, at the MGM Grand Resort in Las Vegas, Nevada.
Hosted by Kaseya, the annual Kaseya Connect Global ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
