The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

I Have Been Attacked by Ransomware. What Should I Do Now?

I Have Been Attacked by Ransomware. What Should I Do Now?

Retro Blockbuster Plot: Sometime in the 1980s – a filthy rich industrialist – his beautiful daughter – a constant target for kidnappers – always accompanied by bodyguards – one fateful day – kidnapping succeeds – hefty ransom asked – her big strong bloke comes to rescue – happy ending!Nah!! Kidnappers today have become very tech-savvy and, if I might ...
66% of Malware is Delivered Through PDFs, New Report from Palo Alto Networks Unit 42 Finds

66% of Malware is Delivered Through PDFs, New Report from Palo Alto Networks Unit 42 Finds

Vulnerabilities continue to be a popular method for threat actors to infect victims, with exploit attempts of vulnerabilities increasing by 55% in the past year
How Safe are bit.ly (or Tiny URL) Links?

How Safe are bit.ly (or Tiny URL) Links?

What are shortened or tiny URLs?In the world of shortcuts, how could URLs stay behind. With domain names getting stranger and web links getting obnoxiously longer, tiny URLs come to the rescue. These are like capsule covers that make medicines easy to digest. Usually web addresses are attached with a lot of information (called query string) that helps ...
How to remove the roadblocks to going passwordless

How to remove the roadblocks to going passwordless

The road to passwordless authentication is one most organisations will tread, but they may require guidance in some key areas along the way, writes Ash Diffey, Vice President Asia Pacific and Japan, Ping Identity
How to remove the roadblocks to going passwordless

How to remove the roadblocks to going passwordless

The road to passwordless authentication is one most organisations will tread, but they may require guidance in some key areas along the way, writes Ash Diffey, Vice President Asia Pacific and Japan, Ping Identity
How to protect against double-extortion ransomware attacks

How to protect against double-extortion ransomware attacks

Of all the cybersecurity challenges facing organisations today, one of the most pervasive is ransomware attacks.
How to protect against double-extortion ransomware attacks

How to protect against double-extortion ransomware attacks

Of all the cybersecurity challenges facing organisations today, one of the most pervasive is ransomware attacks.
Insikt Report – Deepfakes : I Have No Mouth, And I Must Do Crime

Insikt Report – Deepfakes : I Have No Mouth, And I Must Do Crime

Intelligence company Recorded Future today released the findings of its latest deepfakes research. Titled “I Have No Mouth, And I Must Do Crime”, the report looks at how the spread of deepfake technologies, specifically through advancements in AI-based voice cloning, is pushing scams to a new level.
No results found.

In The News

New Trustwave Research Finds Alarming Professionalisation Of Threat Actors In Hospitality Sector, Including Dark Web Travel Agencies

New Trustwave Research Finds Alarming Professionalisation Of Threat Actors In Hospitality Sector, Including Dark Web Travel Agencies

Sydney – May 22, 2025 – Trustwave, a leading cybersecurity and managed security services provider, has released its latest threat intelligence report, the 2025 Trustwave Risk Radar Report: Hospitality Sector, and two supplemental deep dive reports: How Threat Actors Turn Vulnerabilities into Big Business and A DFIR Case Study in Hospitality. Developed ...
Datadog AI Research Unveils Open-Weights Foundation Model And Observability Benchmark

Datadog AI Research Unveils Open-Weights Foundation Model And Observability Benchmark

Datadog, Inc. (NASDAQ: DDOG), the monitoring and security platform for cloud applications, today unveiled the first two launches from Datadog AI Research, which is tackling cutting-edge research challenges that are firmly rooted in real-world problems within cloud observability and security. Datadog AI Research is actively contributing to the broader ...
New Cyber Threat ‘Hazy Hawk’ Hijacks Major Domains – Are You At Risk?

New Cyber Threat ‘Hazy Hawk’ Hijacks Major Domains – Are You At Risk?

Sydney, Australia, 21 May, 2025 - Subdomain hijacking through abandoned cloud resources is an issue that probably every major organisation has experienced, and these attacks are on the rise. Infoblox Threat Intel has tracked some of this activity to a threat actor, dubbed Hazy Hawk, that uses hijacked domains to conduct large-scale scams and malware ...
F5 Expands Strategic Collaboration With Red Hat to Enable Scalable, Secure Enterprise AI

F5 Expands Strategic Collaboration With Red Hat to Enable Scalable, Secure Enterprise AI

Solutions address key challenges in enterprise AI adoption—enabling secure model serving, scalable data movement, and real-time inference across environments SYDNEY, AUSTRALIA, MAY 21, 2025 – F5 (NASDAQ: FFIV), the global leader in delivering and securing every app and API, today announced an expanded collaboration with Red Hat, the world’s leading ...
Macquarie Telecom Launches VeloCloud Partner Channel In Landmark Agreement

Macquarie Telecom Launches VeloCloud Partner Channel In Landmark Agreement

Macquarie Telecom today announced it has signed a first-of-its-kind agreement with VeloCloud to provide its SD-WAN technology to managed service providers (MSPs) across Australia.   The initial four-year agreement will be supported by an investment – worth an estimated A$30 million – by Macquarie Telecom, enabling it to offer the best ...
F5 Delivers Scalable And Secure Cloud-Native Network Functionality For AI And High-Bandwidth Applications

F5 Delivers Scalable And Secure Cloud-Native Network Functionality For AI And High-Bandwidth Applications

New F5 BIG-IP NEXT CNF 2.0 optimises apps and APIs in Kubernetes environments SYDNEY, AUSTRALIA, MAY 21, 2025 – F5 (NASDAQ: FFIV), the global leader in delivering and securing every app and API, today unveiled F5 BIG-IP Next Cloud-Native Network Functions (CNF) 2.0, an evolved solution that significantly enhances the capabilities of the F5 ...
Extreme Networks Leads Industry With First All-in-One Networking Platform Powered by Conversational, Multimodal, And Agentic AI

Extreme Networks Leads Industry With First All-in-One Networking Platform Powered by Conversational, Multimodal, And Agentic AI

Now in Limited Availability, Extreme Platform ONE helps reduce manual tasks by up to 90 percent, offering the deepest and widest network visualisation and industry’s simplest licensing PARIS, FRANCE, EXTREME CONNECT--May 20, 2025: Extreme Networks, Inc. (NASDAQ: EXTR) today launched new capabilities within Extreme Platform ONE™, now in Limited ...
GitHub Introduces Coding Agent For GitHub Copilot

GitHub Introduces Coding Agent For GitHub Copilot

At Microsoft Build 2025, GitHub introduced a new, enterprise-ready coding agent for Copilot – integrated, responsible and secured by GitHub’s control layer
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This