The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Research: A Deep Dive into Stream-Jacking Attacks on YouTube
Bitdefender has released new research highlighting a rapid increase in YouTube stream-jacking attacks.

Quality over Quantity: Algorithmic Transparency, accountability and Intellectual Property- A Call for Explainable AI
Our society is populated by artificial entities known as the programmable race. While their presence is often apparent, comprehension sometimes takes a back seat. They serve us in customer service roles, engage with us in video games, and inundate our personalised social media feeds. Today, they have even infiltrated our financial lives, using AI tools ...

How CIAM Platforms Improve Customer Privacy and Security
As consumers undertake a growing proportion of transactions online, awareness is increasing of the need to have both strong security and privacy protection-measures in place. Businesses that can tick these boxes will find it much easier to attract and retain customers.

Secure Code Warrior to Host 3rd Annual Devlympics Competition
Held during Cybersecurity Awareness Month, global tournament enables DevOps community to test their skills against vulnerabilities
Nozomi Networks Labs Discovers Flaws in Energy and Industrial Machinery Protection Systems
Nozomi Networks has identified three vulnerabilities on the Bently Nevada 3500 rack model manufactured by Baker Hughes, a company that develops and deploys technology solutions for energy and industrial companies.

How deep is the depth of the deepfake?
Use of deepfakes has risen dramatically over the last two years. We’ve witnessed celebrities push back over their likeness being used to mock or embarrass. But it doesn’t stop there.

It’s been 12 Months since the Optus Breach. Now What?
Optus, an Australian telecommunications company, experienced a cyberattack last year on September 22, 2022. One of the most prominent breaches in Australian history. As a result, customers had their personal information stolen and leaked on the dark web. Outrage from customers and businesses was rampant across social media, in the media and of course ...

Why a supportive security culture will bolster disaster recovery efforts during a cyberattack
In today's complex and fast-moving threat landscape, cybercriminals continuously adapt their tactics to breach systems and gain access to sensitive data.
No results found.
In The News
Trend Micro Launches Agentic SIEM to Herald New Era of Proactive Security
SYDNEY, August 13, 2025 – Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cybersecurity leader, today announced new agentic AI technology designed to solve the traditional pain points associated with Security Information and Event Management (SIEM). When combined with Trend’s digital twin capabilities it will help to transform security ...
Elastic Introduces Logs Essentials: Serverless Log Analytics, in a New Low-priced Tier
Site reliability engineers and developers gain access to powerful log analytics without the overhead of managing Elastic Stack
New Dragos Report Estimates Over $300 Billion in Potential Global OT Cyber Risk Exposure
A new industry study has quantified the potential global financial impact of operational technology (OT) cyber incidents at up to US $329.5 billion in a severe but plausible scenario, with business interruption losses accounting for more than half that amount.
Rapid7 Access Brokers Report: New Research Reveals Depth of Compromise in Access Broker Deals, with 71% Offering Privileged Access
New research into underground cybercrime markets has revealed that “initial” access sold by brokers often represents a deep compromise, with 71% of listings offering privileged credentials and, in some cases, multiple access vectors bundled together.
Over 90% of Australian Businesses Embrace Agentic AI as Enterprise Automation Accelerates
A new IDC InfoBrief, “Agentic Automation: Unlocking Seamless Orchestration for the Modern Enterprise”, sponsored by UiPath (NYSE: PATH), a global leader in agentic automation, has revealed 41% of Australian organisations are already using agentic AI and another 50% are planning to use it in the next six months.
CyberArk Recognised as a Leader for Privileged Identity Management in Independent Analyst Report
Recognition Cites CyberArk’s Innovation Focus, Platform Capabilities and Bold Vision
Dynatrace Named a Leader and an Outperformer in 2025 GigaOm Radar Report for Kubernetes Observability
Company positioned closest to the centre of the Radar, underscoring its ability to help customers understand their dynamic cloud environments beyond the capacity of competitive solutions
Australian Cybersecurity Leader Jamie Norton Appointed Vice Chair of ISACA Global Board
ISACA, the global professional association supporting digital trust professionals, has announced the appointment of Australian cybersecurity expert Jamie Norton as Vice Chair of its 2025–2026 Board of Directors.
Norton, currently Chief Information Security Officer (CISO) for the Australian Securities and Investments Commission (ASIC), steps into the ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
