The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
Cyber-Threat Detections Hit a Record-Breaking 146 billion in 2022
Trend Micro annual roundup report warns of exponentially expanding attack surface

Norton Consumer Cyber Safety Pulse Report: Scammers Up Their Game With New AI Tools
Here’s what you need to know to stay safe from cybercriminals using ChatGPT to create deepfake chatbots, phishing campaigns and malware
Sydney, March 2, 2023 – The global research team from Norton, a consumer Cyber Safety brand of Gen™ (NASDAQ: GEN), today released its quarterly Consumer Cyber Safety Pulse Report, detailing how cybercriminals can use ...

Album Stealer Targets Facebook Adult-Only Content Seekers
The Album Stealer cyber-attack is initiated by creating fake Facebook profiles that use adult content to lure unsuspecting victims into downloading an album. Once the victim clicks the link, they are redirected to a zip file hosted on Microsoft OneDrive or another site. To avoid detection, threat actors use side-loading techniques and obfuscation to ...

2023 CrowdStrike Global Threat Report Reveals Sophisticated Adversaries Re-exploiting and Re-weaponizing Patched Vulnerabilities and Moving Beyond Ransomware
CrowdStrike, a global cybersecurity leader, today released its 9th annual Global Threat Report, highlighting key trends and cyber threats facing Australia, and revealing the sectors most under threat by Chinese state-sponsored cyber espionage operations.

Rapid7 Vulnerability Intelligence Report Shows Attackers Developing and Deploying Exploits Faster Than Ever
Analysis of security vulnerability trends shows an 87% increase in first-week exploitation since 2020

Security Emerges As A Critical Input To User Experience Decisions
Security is shifting even further ‘left’, away from developers and into the design thinking of CX and UX
teams, writes Ping Identity’s Head of APAC & Japan Ashley Diffey.

IBM Report: Ransomware Persisted Despite Improved Detection in 2022
Manufacturing Most Extorted Industry; Email Thread Hijacking Attempts Spike; Time to Ransom Moves from Months to Days.

Synopsys Study Underscores Need for Comprehensive SBOM as Best Defence in Software Supply Chain Security
84% of codebases contained at least one known open source vulnerability, an almost 4% increase from last year’s findings.
No results found.
In The News
For the Third Consecutive Year, Check Point Software Demonstrates Industry’s Highest Threat Prevention Rate in Miercom’s Enterprise and Hybrid Mesh Firewall Security Report
Check Point’s Infinity Platform offers the best protection against the latest generation of cyberattacks, with a block rate of 99.9% on new malware, 99.7% phishing prevention rate, and 98% average block rate on high & critical intrusion events
Rapid GenAI Application Adoption Drives New Era of Application and Infrastructure Modernisation
Nutanix study reveals that GenAI is changing organisations priorities, with security and privacy being a primary concern
Pax8 Adds Foxit’s Innovative PDF and eSignature Solutions to its Cloud Marketplace
SYDNEY, AU (February 6, 2025) – Pax8, the leading cloud commerce marketplace, has added new offerings to the Pax8 Marketplace from Foxit, a leading provider of innovative PDF and eSignature products and services. With Foxit's advanced document management technology now available in the marketplace, Pax8’s global network of partners can now access ...
Report: North Korea Cybercriminals Target Linkedin Users With Fake Job Ads
Bitdefender Labs has issued a warning on an active campaign by the North Korea-linked Lazarus Group, targeting organisations by capturing credentials and delivering malware through fake LinkedIn job offers.
LinkedIn may be a vital tool for job seekers and professionals, but it has also become a playground for cybercriminals exploiting its ...
Tenable Comment on DeepSeek Ban In AU Government
Governments in the U.S, Italy, and now Australia have moved to ban access to DeepSeek, a Chinese-developed large language model (LLM), on government devices. These bans stem from concerns over data security and the potential exposure of sensitive information to the PRC.
However, blocking access to DeepSeek is not as simple as restricting its website ...
Kyndryl Introduces SASE Services Combined With Palo Alto Networks Prisma SASE to Provide a Unified Network Security Posture for Customers
Kyndryl’s end-to-end SASE services will help customers drive adoption of Palo Alto Networks’ cloud-first, zero-trust solution for network security
CyberArk and SentinelOne Team Up to Enable Step Change in Endpoint and Identity Security
Mutual customers will benefit from boosted endpoint threat detection and response capabilities
Dynatrace Expands Security Portfolio With Cloud Security Posture Management Solution
Unified security and observability enable continuous compliance and response automation for major cloud platforms
LAS VEGAS, NV, February 4, 2025 – Dynatrace (NYSE: DT), the leading AI-powered observability platform, today announced the expansion of its security portfolio with a new Cloud Security Posture Management (CSPM) solution. For enterprises ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..