The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Deepfake Diplomacy – AI Impersonation’s Attack on Sovereign Security

Deepfake Diplomacy – AI Impersonation’s Attack on Sovereign Security

The rise of AI-powered impersonation—ranging from synthetic voice deepfakes to algorithmically generated messages—poses a critical threat to government, defense, and national infrastructure. A recent incident involving an AI-generated impersonation of a U.S. Secretary of State underscores the urgency of this threat. State-sponsored actors are ...
Is the Next National Security Crisis Hiding in Your Supermarket?

Is the Next National Security Crisis Hiding in Your Supermarket?

​Australians are being told the cost of living crisis is easing. But at the checkout, families know better. Grocery prices remain absorbingly high, with no plan to lower prices and increase food availability. Is Australia quietly sleepwalking into a food security crisis? According to agricultural transparency advocate and Founder at Real Food Price ...
Building Resilience Through AI-Driven Security

Building Resilience Through AI-Driven Security

The cybersecurity landscape is evolving, emphasizing the dual role of AI as both a tool for attackers and defenders. There is an urgent need for businesses to adopt resilient, security-first strategies, including AI-driven anomaly detection, data classification, and toolchain consolidation. As hybrid environments grow more complex, organizations must ...
Cybersecurity Chief’s AI Slip Sparks Federal Security Review

Cybersecurity Chief’s AI Slip Sparks Federal Security Review

The acting director of Cybersecurity and Infrastructure Security Agency (CISA), Madhu Gottumukkala, is facing industry scrutiny after accidentally uploading sensitive government documents into a public version of ChatGPT, according to reports online. The documents were luckily not classified, but they were marked ‘For Official Use Only’, which is for ...
Why “IT Won’t Happen Here” Is a Dangerous Bet

Why “IT Won’t Happen Here” Is a Dangerous Bet

​Cyber incidents start quietly, which looks like a compromised credential, a malicious attachment, an employee doing what they’ve always done. The damage only becomes visible once systems stall, operations freeze, and executives ask the same question they always ask at the eleventh hour, ‘How did this get so far?’ Rajesh Khazanchi, CEO and Co-Founder ...
The Transformative Role of AI in Cybersecurity

The Transformative Role of AI in Cybersecurity

The integration of AI and cybersecurity is reshaping the digital landscape, with three key trends emerging: the rise of AI-powered security threats, the transformation of data governance through AI, and the elevation of cybersecurity as a C-suite priority. Cybercriminals are leveraging AI for sophisticated attacks, necessitating adaptive, AI-driven ...
Email Threat Radar – January 2026

Email Threat Radar – January 2026

From QR code deception to callback phishing and more: An overview of emerging email threats and attack trends
When Digital Names Collide, Business Risk Follows

When Digital Names Collide, Business Risk Follows

In an era where trust is increasingly mediated by systems rather than people, ensuring that every digital identity maps cleanly to a real one is no longer optional. It is a prerequisite for doing business safely.
No results found.

In the News

Macquarie Technology Group Named APJ MSP of the Year by Netskope, Raising the Bar Across the Region

Macquarie Technology Group Named APJ MSP of the Year by Netskope, Raising the Bar Across the Region

Award signals strong momentum following strategic partnerships and reflect dedication to delivering top-tier SASE security solutions to help business and government customers navigate future of cloud and AI security
Suspected North Korean Actor Linked to Major NPM Supply Chain Attack, Google Warns

Suspected North Korean Actor Linked to Major NPM Supply Chain Attack, Google Warns

A recent software supply chain attack involving the widely used axios npm package has been attributed to a suspected North Korean threat actor, underscoring growing concerns about the security of open-source ecosystems relied on by Australian organisations. According to the Google Threat Intelligence Group (GTIG), the attack is not connected to the ...
ESET Launches AI-Powered MDR Service in APAC With Industry-Leading 6-minute Response Time

ESET Launches AI-Powered MDR Service in APAC With Industry-Leading 6-minute Response Time

ESET MDR delivers industry-leading real-time detection and a mean-time-to-respond | (MTTR) of 6 minutes to keep businesses secure
Dataiku Appoints Andrew Boyd as Senior Vice President and General Manager for Asia Pacific and Japan

Dataiku Appoints Andrew Boyd as Senior Vice President and General Manager for Asia Pacific and Japan

Seasoned enterprise technology leader Andrew Boyd to drive Dataiku’s next phase of growth across Asia Pacific and Japan as organisations scale AI from experimentation to impact.
AI Acceleration in APAC Exposes Growing API Security Gap, Akamai Research Finds

AI Acceleration in APAC Exposes Growing API Security Gap, Akamai Research Finds

As organisations across Asia-Pacific adopt AI-first strategies, APIs emerge as the primary attack surface
CrowdStrike and HCLTech Expand Strategic Partnership With AI-Powered Continuous Threat Exposure Management Services

CrowdStrike and HCLTech Expand Strategic Partnership With AI-Powered Continuous Threat Exposure Management Services

March 31, 2026, CrowdStrike (NASDAQ: CRWD) and HCLTech today announced an expansion of their strategic partnership with the launch of Continuous Threat Exposure Management (CTEM) services. This joint offering enables continuous, intelligence-led identification, prioritisation, and remediation of exposure across endpoints, cloud, identity, applications, ...
Bitdefender Launches Complimentary Internal Attack Surface Assessment to Help Organisations Uncover Hidden Cyber Risk

Bitdefender Launches Complimentary Internal Attack Surface Assessment to Help Organisations Uncover Hidden Cyber Risk

Program Helps Organisations Discover and Reduce Risk Caused by Unnecessary Access to Applications, Tools, and System Utilities Commonly Exploited in Modern Attacks
Kaseya Unveils Next-generation Innovations in Cyber Resilience

Kaseya Unveils Next-generation Innovations in Cyber Resilience

AI-powered tools set new industry standards for backup and recovery.
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This