The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

How Businesses Today can Prevent Advanced Cyber Threats
In recent years workforces have become increasingly mobile, with employees using laptops at home, airports, cafes etc. Then, with the onset of COVID-19, the number of people accessing corporate resources from devices outside the corporate network increased enormously.

Tenable CEO and Chairman calls out Microsoft for unacceptable cybersecurity practices
In a recent article, Amit Yoran, the Chairman and CEO of Tenable, criticised Microsoft for its cybersecurity practices. He mentioned that Senator Ron Wyden had written to various government agencies, urging them to hold Microsoft accountable for negligent cybersecurity practices that have allowed Chinese espionage against the US government. Data from ...

Doing more with less: the three key focus areas for cybersecurity
In an ever-evolving cybersecurity landscape, organisations face the daunting challenge of effectively managing their security initiatives. This responsibility falls not only on the IT teams, but also on the board of directors, who play a critical role in overseeing the organisation's cybersecurity strategy.

Bitdefender releases macOS Threat Landscape Report
Bitdefender has revealed at Black Hat USA 2023 the macOS Threat Landscape Report, which looks at the top threats and trends targeting Apple’s macOS operating system over the duration of 12 months.

CrowdStrike 2023 Threat Hunting Report shows adversary breakout time falls to record low, technology companies most targeted in APJ region
Adversaries took just 79 minutes, on average, to ‘breakout’ of their initial beach head into a victim’s system, with fastest recorded time being just seven minutes.

Poorly Purged Medical Devices Present Downstream Security Concerns When Sold on Secondary Market
Rapid7, Inc., a leader in cloud risk and threat detection, has released a new research report that assesses the security implications from improper de-acquisition of infusion pumps to illustrate the importance of securing networks, applications, and devices.

API Security: Protecting Against Persistent Automated Attacks
As use of Application Programming Interfaces (APIs) within organisations of all sizes continues to increase, the approach taken to ensuring their security has changed.

Improving an Organisations Cyber Efficacy and Effectiveness
While the capability of cybersecurity tools continues to rapidly increase, there is no room for complacency within the organisations deploying them.
No results found.
In The News
Tenable Comment on SharePoint Zero-day Vulnerability
On July 19, reports emerged that Microsoft SharePoint Servers worldwide were under active exploitation. Researchers at Eye Security published a blog post detailing their identification of an “active, large-scale exploitation” that was initially linked to a pair of vulnerabilities in SharePoint dubbed ToolShell. Successful exploitation of CVE-2025-53770 ...
Protecting Customers From Octo Tempest Attacks Across Multiple Industries
In recent weeks, Microsoft has observed Octo Tempest, also known as Scattered Spider, impacting the airlines sector, following previous activity impacting retail, food services, hospitality organizations, and insurance between April and July 2025. This aligns with Octo Tempest’s typical patterns of concentrating on one industry for several weeks or ...
JFrog Enables AI-Driven Developer Workflows with Robust MCP Server
JFrog’s Model Context Protocol (MCP) server allows developers to seamlessly employ AI-agents across the JFrog Platform, enabling faster, more reliable, secure software development & delivery at scale
Figma Deepens Local Roots In Australia With Local Data Hosting and More
Figma introduces new governance features for enterprise customers, with local data residency expected later this year.
ESET Announces Winner of the Australia 2025 Women in Cybersecurity Scholarship
The scholarship is part of ESET’s broader commitment to closing the gender gap in cybersecurity, an industry that remains disproportionately male, despite growing awareness of the need for diverse perspectives. With an estimated 5,000 additional cybersecurity professionals needed each year to meet national targets, programs like this play a vital role ...
Check Point Appoints Jonathan Zanger as Chief Technology Officer to Strengthen Cyber Security Capabilities through AI Innovation
Seasoned technologist and former Trigo CTO to lead Check Point’s global cyber security and AI strategy and AI centres
ROLLER Achieves 60% Cloud Savings and Improved Reliability with Datadog
Sydney, Australia – July 22, 2025 – Datadog, Inc. (NASDAQ: DDOG), the monitoring and security platform for cloud applications, today announced ROLLER, an Australian-founded software company for attractions, has streamlined operations, improved availability, and reduced cloud infrastructure costs using the Datadog platform.
ROLLER is the software ...
BioCatch delivers Scams360 to help banks advance detection of emerging scam types
Single, streamlined platform defends against full spectrum of scams
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
