The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Rapid7 Assesses the ASX 200 Attack Surface

Rapid7 Assesses the ASX 200 Attack Surface

Industrial sector leads all industries in their risk exposure
Are ransomware attacks becoming a cost of doing business in Australia?

Are ransomware attacks becoming a cost of doing business in Australia?

It's easy to see why ransomware is such a cash cow for cybercriminals. It’s more efficient and profitable than other cybercrimes and by exploiting our near-total dependence on the internet, bad actors can demand millions of dollars to restore operations. It’s also the worst-kept secret among Australia’s cyber community that businesses have been quietly ...
Let’s stop playing the blame game and start taking more responsibility for cybersecurity

Let’s stop playing the blame game and start taking more responsibility for cybersecurity

You will know the drill if you work in cybersecurity: something goes wrong, and immediately the recriminations begin. Vendors, customers, consultants and service providers form an orderly circle, face off, and begin blaming and shaming.     We all know deep down that this circular firing squad routine is toxic and counterproductive, but it is an ...
Tenable Research Finds 72% of Organisations Remain Vulnerable to “Nightmare” Log4j Vulnerability

Tenable Research Finds 72% of Organisations Remain Vulnerable to “Nightmare” Log4j Vulnerability

Tenable®, the Exposure Management company, today announced the results of a telemetry study examining the scope and impact of the critical Log4j vulnerability, known as Log4Shell, in the months following its initial disclosure. According to the data collected from over 500 million tests, 72% of organisations remain vulnerable to the Log4Shell ...
Lookout Threat Lab Discovers Predatory Loan Apps on Google Play and Apple App Store

Lookout Threat Lab Discovers Predatory Loan Apps on Google Play and Apple App Store

Data exfiltration from devices used to pressure for repayment by harassing the customer or their contacts
9 Out of 10 Organisations in Asia-Pacific Report Digital Trust as ‘Extremely Important’: DigiCert Survey

9 Out of 10 Organisations in Asia-Pacific Report Digital Trust as ‘Extremely Important’: DigiCert Survey

In APAC, organisations report digital trust as important due to the expanding threat landscape within the region. Also, 91% of consumers are concerned about cyber threats, more than the rest of the world.
Bitdefender Threat Debrief – November 2022

Bitdefender Threat Debrief – November 2022

Bitdefender has released its November Threat Debrief, a monthly series analysing threat news, trends, and research from the previous month. It includes a Ransomware Report highlighting the top ransomware families detected, as well as the top countries affected including Australia, and the top trojans targeting Android during October.
Genetec Releases 2022 State of Physical Security Report

Genetec Releases 2022 State of Physical Security Report

Cybersecurity concerns are on the rise; Data from physical security technology seen as ‘mission-critical’ tool for business operations; Industry embraces hybrid cloud infrastructure and unified solutions.
No results found.

In The News

espresso Displays Selects Oracle NetSuite To Streamline Global Processes

espresso Displays Selects Oracle NetSuite To Streamline Global Processes

espresso Displays Gains a Sharper Picture of its Business with Oracle NetSuite Australian tech company chooses NetSuite to help streamline global processes and increase productivity as it grows SYDNEY, January 22, 2024 - espresso Displays, an Australian tech company that developed the world’s thinnest interactive portable displays, has selected ...
CloudSEK Warns of Scammers Exploiting Zendesk to Impersonate Brands

CloudSEK Warns of Scammers Exploiting Zendesk to Impersonate Brands

BENGALURU: CloudSEK, a leader in AI-powered cybersecurity solutions, has uncovered how cybercriminals can exploit a seemingly simple feature of Zendesk’s SaaS platform. CloudSEK’s latest research highlights how Zendesk subdomain registrations could be misused to impersonate legitimate brands and facilitate phishing and investment scams, putting ...
Exabeam Continues to Deliver Real AI-Driven Cybersecurity with Launch of LogRhythm Intelligence Copilot

Exabeam Continues to Deliver Real AI-Driven Cybersecurity with Launch of LogRhythm Intelligence Copilot

BROOMFIELD, Colo. & FOSTER CITY, Calif. – January 20, 2025 -- Exabeam, a global cybersecurity leader that delivers AI-driven security operations, today announced the launch of LogRhythm Intelligence Copilot, a generative AI-powered feature delivering actionable insights to empower security teams and accelerate workflows. This release solidifies ...
Hack The Emulated Planet: Vulnerability Hunting Planet WGS-804HPT Industrial Switch

Hack The Emulated Planet: Vulnerability Hunting Planet WGS-804HPT Industrial Switch

Emulators such as the open-source, cross-platform QEMU framework are invaluable tools for researchers conducting vulnerability research. QEMU and other emulators act as great testing environments where software and firmware can be analyzed for exploitable vulnerabilities. They can also be taken a step further for testing exploits within a safe ...
Cognizant Leads Enterprises into Next Generation of AI Adoption with Neuro® AI Multi-Agent Accelerator and Multi-Agent Services Suite

Cognizant Leads Enterprises into Next Generation of AI Adoption with Neuro® AI Multi-Agent Accelerator and Multi-Agent Services Suite

Cognizant has announced its Neuro® AI Multi-Agent Accelerator and Multi-Agent Service Suite. These new offerings accelerate the development and adoption of AI agents, helping empower businesses to transform their business processes using AI agents for adaptive operations, real-time decision-making, and personalised customer experiences - to support all ...
Trend Micro is Recognised as a 2024 Gartner® Peer Insights™ Customers’ Choice for Cloud-Native Application Protection Platforms

Trend Micro is Recognised as a 2024 Gartner® Peer Insights™ Customers’ Choice for Cloud-Native Application Protection Platforms

The Gartner® Peer Insights™ Customers' Choice Distinction is based on feedback and ratings from end-user professionals who have experience with the product or service
SentinelOne Brings the Power of Purple AI to Zscaler, Okta, Palo Alto Networks, Proofpoint, Fortinet and Microsoft Data

SentinelOne Brings the Power of Purple AI to Zscaler, Okta, Palo Alto Networks, Proofpoint, Fortinet and Microsoft Data

Popular generative AI security analyst can now be used to speed cybersecurity investigations and simplify threat hunting across a growing list of native and third-party sources
CyberArk Integration with Microsoft Defender for Identity Speeds Identification and Containment of Cyber Threats

CyberArk Integration with Microsoft Defender for Identity Speeds Identification and Containment of Cyber Threats

CyberArk (NASDAQ: CYBR) today announced a new integration between CyberArk Privileged Access Manager (PAM) and Microsoft Defender for Identity, giving organisations a unified, comprehensive view of their entire identity security landscape to allow quicker, more effective threat response and containment. Defender for Identity is a cloud-based ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This