The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Research: A Deep Dive into Stream-Jacking Attacks on YouTube

Research: A Deep Dive into Stream-Jacking Attacks on YouTube

Bitdefender has released new research highlighting a rapid increase in YouTube stream-jacking attacks.
Quality over Quantity: Algorithmic Transparency, accountability and Intellectual Property- A Call for Explainable AI

Quality over Quantity: Algorithmic Transparency, accountability and Intellectual Property- A Call for Explainable AI

Our society is populated by artificial entities known as the programmable race. While their presence is often apparent, comprehension sometimes takes a back seat. They serve us in customer service roles, engage with us in video games, and inundate our personalised social media feeds. Today, they have even infiltrated our financial lives, using AI tools ...
How CIAM Platforms Improve Customer Privacy and Security

How CIAM Platforms Improve Customer Privacy and Security

As consumers undertake a growing proportion of transactions online, awareness is increasing of the need to have both strong security and privacy protection-measures in place. Businesses that can tick these boxes will find it much easier to attract and retain customers.
Secure Code Warrior to Host 3rd Annual Devlympics Competition

Secure Code Warrior to Host 3rd Annual Devlympics Competition

Held during Cybersecurity Awareness Month, global tournament enables DevOps community to test their skills against vulnerabilities
Nozomi Networks Labs Discovers Flaws in Energy and Industrial Machinery Protection Systems

Nozomi Networks Labs Discovers Flaws in Energy and Industrial Machinery Protection Systems

Nozomi Networks has identified three vulnerabilities on the Bently Nevada 3500 rack model manufactured by Baker Hughes, a company that develops and deploys technology solutions for energy and industrial companies.
How deep is the depth of the deepfake?

How deep is the depth of the deepfake?

Use of deepfakes has risen dramatically over the last two years. We’ve witnessed celebrities push back over their likeness being used to mock or embarrass. But it doesn’t stop there.
It’s been 12 Months since the Optus Breach.  Now What?

It’s been 12 Months since the Optus Breach. Now What?

Optus, an Australian telecommunications company, experienced a cyberattack last year on September 22, 2022. One of the most prominent breaches in Australian history. As a result, customers had their personal information stolen and leaked on the dark web. Outrage from customers and businesses was rampant across social media, in the media and of course ...
Why a supportive security culture will bolster disaster recovery efforts during a cyberattack

Why a supportive security culture will bolster disaster recovery efforts during a cyberattack

In today's complex and fast-moving threat landscape, cybercriminals continuously adapt their tactics to breach systems and gain access to sensitive data.
No results found.

In The News

CrowdStrike Unveils Falcon Next-Gen Identity Security, the First Unified Solution to Protect Every Identity Across the Attack Chain

CrowdStrike Unveils Falcon Next-Gen Identity Security, the First Unified Solution to Protect Every Identity Across the Attack Chain

Only CrowdStrike unifies initial access, privileged access, ITDR, and SaaS security for every human, non-human, and AI agent identity into a single platform – delivered today, without delays or integration complexity
VAST Data Collaborates with SK Telecom to Optimise Korea’s Largest AI Infrastructure Based on NVIDIA Supercomputers

VAST Data Collaborates with SK Telecom to Optimise Korea’s Largest AI Infrastructure Based on NVIDIA Supercomputers

VAST Data today announced a partnership with SK Telecom (SKT), South Korea’s leading telecommunications provider that’s transforming itself into an AI company. To deploy its advanced AI platform on SKT’s new sovereign AI infrastructure powered by the latest NVIDIA Blackwell GPUs. Named the Haein Cluster, this AI infrastructure, designed initially ...
From Weakest Link to Cyber Shield: ESET Launches Awareness Training in Australia

From Weakest Link to Cyber Shield: ESET Launches Awareness Training in Australia

ESET launches ESET Cybersecurity Awareness Training in Australia, helping local businesses to avoid breaches resulting from human error. ESET Cybersecurity Awareness Training helps meet ISM-0252, NIS2, HIPAA, PCI, SOX, GDPR, and CCPA compliance requirements, as well as insurance requirements. This online educational and testing source puts 30 years ...
Qualys Honored with Dual Win at Prestigious Pwnie Awards for Groundbreaking Cybersecurity Research

Qualys Honored with Dual Win at Prestigious Pwnie Awards for Groundbreaking Cybersecurity Research

Wins for Epic Achievement and Best RCE spotlight Qualys’ industry-leading research into critical OpenSSH vulnerabilities, reinforcing its leadership in global cybersecurity innovation
Tenable Jailbreaks OpenAI’s GPT-5 Within 24 Hours, Bypassing New Safety Features

Tenable Jailbreaks OpenAI’s GPT-5 Within 24 Hours, Bypassing New Safety Features

Just 24 hours after OpenAI launched its highly anticipated GPT−5 model with promises of “significantly more sophisticated” prompt safety, exposure management company Tenable has successfully jailbroken the platform, compelling it to provide detailed instructions on how to build a Molotov cocktail. On August 7, 2025, OpenAI unveiled GPT−5, touting its ...
Fortinet Enhances FortiRecon to Align With Continuous Threat Exposure Management Framework to Help Organisations Stay Ahead of Threats

Fortinet Enhances FortiRecon to Align With Continuous Threat Exposure Management Framework to Help Organisations Stay Ahead of Threats

New features integrate attack surface management, threat intelligence, and security orchestration to help security teams reduce risk faster and more proactively
Genetec Continues To Dominate Video Surveillance Software Market, According To Latest Analyst Reports

Genetec Continues To Dominate Video Surveillance Software Market, According To Latest Analyst Reports

Growing SaaS adoption and customer demand for flexible, open solutions strengthen company’s continued market leadership.
Trend Micro Launches Agentic SIEM to Herald New Era of Proactive Security

Trend Micro Launches Agentic SIEM to Herald New Era of Proactive Security

SYDNEY, August 13, 2025 – Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cybersecurity leader, today announced new agentic AI technology designed to solve the traditional pain points associated with Security Information and Event Management (SIEM). When combined with Trend’s digital twin capabilities it will help to transform security ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This