The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Hipster, Hacker & Hustler, meet Handler
Great, innovative teams are characterised by their ability to move quickly, iterate fast, and learn even faster. These teams can be found in startups, but they can also exist in larger organisations as multidisciplinary teams. Such teams are often made up of individuals who possess unique skills and expertise that complement each other.

5 Reasons Why You Shouldn’t Just Build the Solution
For most teams, the default mode is execution mode: build and deliver as soon as possible. However, when we are building something new, this way of operating can potentially lead to wasted time and missed opportunities. It is essential to get into exploration mode first and understand the problem in-depth before building a new solution.

From fluff to facts: how you can measure innovation
Innovation is a term that gets thrown around a lot, but what does it really mean? For me, innovation is implementing new ideas that bring value to people. You don't have to be a creative genius to be innovative - It's all about the context. What might be ordinary for startups could be groundbreaking for established corporations. Implementing these ...

3 Subtle Indicators of Major Innovation Blockers
Throughout my career, I've had the incredible opportunity to dive headfirst into many innovation projects. They ranged from strategic innovation projects to customer experience improvements, and from exploring new ways of working to executing human-centred automation solutions.

3 Ways to Get Everyone Onboard the Innovation Train
When it comes to innovation and introducing change in an organisation, some people instantly embrace the journey while others resist it.

Is Australia set to follow the UK, for banking liabilities?
As the digital world continues to dominate the banking industry, concerns about data security and privacy are coming to the forefront. As algorithms become more advanced, building a profile based on users data, and identifying abnormal transactions that could indicate fraudulent activity. This has led to concerns about privacy, as individuals feel like ...

I Have Been Attacked by Ransomware. What Should I Do Now?
Retro Blockbuster Plot: Sometime in the 1980s – a filthy rich industrialist – his beautiful daughter – a constant target for kidnappers – always accompanied by bodyguards – one fateful day – kidnapping succeeds – hefty ransom asked – her big strong bloke comes to rescue – happy ending!Nah!! Kidnappers today have become very tech-savvy and, if I might ...

66% of Malware is Delivered Through PDFs, New Report from Palo Alto Networks Unit 42 Finds
Vulnerabilities continue to be a popular method for threat actors to infect victims, with exploit attempts of vulnerabilities increasing by 55% in the past year
No results found.
In The News
Elastic Brings Hybrid Retrieval to Microsoft Semantic Kernel
Elastic is the first vector database to support blended text and semantic retrieval techniques for .NET developers for more relevant, accurate results for search queries
ESET Research APT Report: Russian cyberattacks in Ukraine intensify; Sandworm unleashes new destructive wiper
ESET Research has released its latest APT Activity Report, which highlights activities of select APT groups that were documented by ESET researchers from October 2024 through March 2025.
Tenable Comment on ACSC’s joint advisory: Russian GRU targeting Western logistics entities and technology companies
Issued on 22 May 2025, a joint advisory from ASD’s ACSC, CISA, NSA, FBI and more than a dozen allied agencies warning that Russia’s GRU Unit 26165 (APT28/Fancy Bear) has been spying on Western logistics and technology firms supporting aid to Ukraine since 2022, using password-spray and spear-phishing campaigns plus exploits for Outlook, WinRAR, ...
BeyondTrust Recognised as an Overall Leader in KuppingerCole Leadership Compass for Secrets Management
BeyondTrust’s forward-looking approach to securing human and non-human identities earns high marks from analyst firm
Report highlights BeyondTrust’s scalability, native integrations, and developer-friendly approach to secure machine and application secrets
APT28 Escalates Cyber-Espionage Campaign Targeting Ukraine Aid Logistics
A Russian military cyber unit, known as APT28 or "Fancy Bear," has intensified its cyber-espionage efforts against organisations supporting Ukraine, according to a joint advisory issued by the UK's National Cyber Security Centre (NCSC) and allied intelligence agencies including the US and Australia.
Operating under Russia’s military intelligence ...

Gigamon 2025 Survey: 91 Percent Of Security Leaders Are Recalibrating Hybrid Cloud Risk In The AI Era
New research shows AI is driving cybersecurity compromises amid rising data volumes, LLM threats, and growing public cloud concerns
Exabeam And Vectra AI Partner To Accelerate Threat Detection And Simplify Security Operations
New integration unifies Exabeam New-Scale Security Operations Platform with Vectra AI’s cutting-edge network detection and response (NDR) to uncover threats that evade traditional tools
BROOMFIELD, Colo. & FOSTER CITY, Calif. - May 20, 2025 - Exabeam, a global leader in intelligence and automation that powers security operations, today announced a ...
Palo Alto Networks And Quitch Partner To Make Cyber Training More Engaging, Accessible
Palo Alto Networks, the world’s leading AI cybersecurity company, and Australian online learning platform Quitch today announced the launch of new interactive cybersecurity training modules on the mobile microlearning app. This initiative aims to make cyber education more engaging and accessible for all, and ultimately, more effective.
Developed ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
