The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

2022 Threat Roundup: The Emergence of Mixed IT/IoT Threats

2022 Threat Roundup: The Emergence of Mixed IT/IoT Threats

Rapid digitisation means that organisations are now more connected than ever. Most organisations now host a combination of interconnected IT, OT, IoT and sometimes IoMT devices in their networks, which has increased their attack surface. Forescout’s data shows that around 24% of connected devices in every organisation are no longer traditional IT. The ...
Qualys Threat Research Unit (TRU) Launches 2023 TruRisk Research Report

Qualys Threat Research Unit (TRU) Launches 2023 TruRisk Research Report

Insights provide data-backed, actionable steps for security teams to decrease risk and increase the resilience of their organisation.
Protecting My Identity and Privacy: Banking Veteran Shocked at How Much Data is Collected

Protecting My Identity and Privacy: Banking Veteran Shocked at How Much Data is Collected

On a recent SBS Insight episode, Anna Borzi, a guest on the segment, speaks candidly about her thoughts towards privacy and her unwillingness to give away her personal details. Anna's experience serves as a reminder of the importance of protecting personal information and the challenges many people face in today’s world.
Finding clarity in the noise: visibility and AI in an age plagued by security threats

Finding clarity in the noise: visibility and AI in an age plagued by security threats

Today’s world demands businesses to improve cybersecurity measures and gain greater visibility over threats and attack surfaces, else fall prey to sophisticated and targeted attacks. The more visibility an organization has, the better equipped to detect and respond in a timely, meaningful way. Luckily, with security of increasing importance, there are ...
Why Security Vulnerability Management Strategies Need to Evolve

Why Security Vulnerability Management Strategies Need to Evolve

The capabilities offered by business software applications are constantly growing, but unfortunately so too are the number of vulnerabilities. Much of this challenge can be attributed to the rate of change that is occurring within organisations. Determined to improve productivity and reduce operational costs, many are embracing strategies of digital ...
Harassment Surged 20x in Ransomware Cases, New Report from Palo Alto Networks Unit 42 Finds

Harassment Surged 20x in Ransomware Cases, New Report from Palo Alto Networks Unit 42 Finds

A new report from Palo Alto Networks (NASDAQ: PANW), the global cybersecurity leader, found that ransomware and extortion actors are utilising more aggressive tactics to pressure organisations, with harassment being involved 20 times more often than in 2021, according to Unit 42™ incident response cases.
Research Highlights Cyber Security’s Underestimated Role as a Business and Revenue-enabler

Research Highlights Cyber Security’s Underestimated Role as a Business and Revenue-enabler

Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cybersecurity leader, today released new research* revealing that while Australian organisations plan to increase cybersecurity budgets in 2023, business leaders hold conflicting views on the function.
BeyondTrust 10th Annual Microsoft Vulnerabilities Report Finds Elevation of Privilege Remains #1 Microsoft Vulnerability Category

BeyondTrust 10th Annual Microsoft Vulnerabilities Report Finds Elevation of Privilege Remains #1 Microsoft Vulnerability Category

BeyondTrust, the worldwide leader in intelligent identity and access security, today announced the release of the 2023 Microsoft Vulnerabilities Report. This report is the 10th anniversary edition and covers a decade of vulnerability insights, providing valuable information to help organisations see into the past, present, and future of the Microsoft ...
No results found.

In The News

New Research: Gen AI Scraper Bots Clogging Websites with Half a Million Fake Requests Per Day

New Research: Gen AI Scraper Bots Clogging Websites with Half a Million Fake Requests Per Day

Generative AI ‘gray bots’ pound websites up to half a million times a day Generative AI scraper bots target websites 24 hours a day with up to half a million requests for information, according to the latest Barracuda detection data. In a new report, Barracuda threat analysts highlight the relentless behaviour of generative AI (Gen AI) bots, which ...
Delinea Partners with Microsoft to Ensure Seamless Transition and Continued Security as Microsoft Entra Permissions Management Retires

Delinea Partners with Microsoft to Ensure Seamless Transition and Continued Security as Microsoft Entra Permissions Management Retires

Collaboration enables customers to easily switch to Delinea’s advanced CIEM solution, safeguarding human and machine identities in public, multi-cloud environments
Datadog Unveils Plans for Data Centre in Australia

Datadog Unveils Plans for Data Centre in Australia

Datadog today announced plans for a new data centre to be located in Australia. The data centre instance, which will be built on AWS, will be Datadog’s first in Australia and adds to existing locations in North America, Asia, Europe and AWS GovCloud. The Australian data centre will store and process data locally, creating sovereign capacity to help ...
Sophos IR and MDR Cases Highlight Attackers Are Exfiltrating Data in Just Three Days

Sophos IR and MDR Cases Highlight Attackers Are Exfiltrating Data in Just Three Days

Sophos today released the 2025 Sophos Active Adversary Report, which details attacker behavior and techniques from over 400 Managed Detection and Response (MDR) and Incident Response (IR) cases in 2024. The report found that the primary way attackers gained initial access to networks (56% of all cases across MDR and IR) was by exploiting external ...
Motorola Solutions Expands Avigilon Enterprise Security Suite to Accelerate Response During Emergencies

Motorola Solutions Expands Avigilon Enterprise Security Suite to Accelerate Response During Emergencies

Motorola Solutions today announced several new advanced features in its Avigilon physical security suite, debuting Alta SOS this week at ISC West. The new features for Avigilon Alta and Avigilon Unity unify enterprises’ physical security solutions to better protect employees, visitors and service providers, and directly coordinate with public ...
OpenText Announces Availability of Titanium X Powered By the Latest Cloud Editions 25.2

OpenText Announces Availability of Titanium X Powered By the Latest Cloud Editions 25.2

Sydney, Australia – April 2, 2025 – OpenText™, today introduced the availability of Project Titanium X, now ready with Cloud Editions 25.2 (CE 25.2), the culmination of two years of strategic engineering powering the next generation of Business Clouds, Business AI and Business Technology. Cloud Editions 25.2 brings together a comprehensive set of ...
Exabeam Nova Unleashes the Future of Agentic AI in Cybersecurity

Exabeam Nova Unleashes the Future of Agentic AI in Cybersecurity

Proactive Multi-Agent Experience Uplevels the SOC, Enables Security Leaders, Analysts, and Investigators to Increase Productivity and Impact
JFrog Enables Trusted AI – Uncovers Critical Security Threats Emerging from AI’s Expansion in the Software Supply Chain

JFrog Enables Trusted AI – Uncovers Critical Security Threats Emerging from AI’s Expansion in the Software Supply Chain

The Software Supply Chain State of the Union 2025 Report Reveals “Quad-fecta” of Security Exploits, Mis-scored CVEs, Poor ML Model Governance, & more are Jeopardising Trust in Newly Created Software 
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This