The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Hitachi Vantara Study Shows Three-Quarters of Australian Companies Overwhelmed by Data as Security, Sustainability Challenges Grow

Hitachi Vantara Study Shows Three-Quarters of Australian Companies Overwhelmed by Data as Security, Sustainability Challenges Grow

Survey shows data is the most valuable asset, but leaders are concerned about their infrastructure’s resilience
Recorded Future’s Latest Insikt Report: China’s Targeting of International Companies In Geopolitical Competition

Recorded Future’s Latest Insikt Report: China’s Targeting of International Companies In Geopolitical Competition

Intelligence company Recorded Future today released the latest report from its threat research division Insikt Group - China’s targeting of international companies in geopolitical competition.
How Visible Is My Profile on the Internet?

How Visible Is My Profile on the Internet?

There are a lot of good things about being famous, but there are a few not so good things too. – Sharon Stone What is profile visibility?Simply put, profile visibility means how “famous” you are on the internet and what information about you is visible publicly. A simple Google search for your name will often reveal the answer to that ...
Cloud assets the biggest targets for cyber-attacks in Australia as more sensitive data moves to cloud

Cloud assets the biggest targets for cyber-attacks in Australia as more sensitive data moves to cloud

Thales today announced the release of the 2023 Thales Cloud Security Study, its annual assessment on the latest cloud security threats, trends and emerging risks based on a survey of nearly 3,000 IT and security professionals across 18 countries including Australia.
Closing the Gap: How Modern Forensic Platforms Enhance Cloud Security Investigations

Closing the Gap: How Modern Forensic Platforms Enhance Cloud Security Investigations

While data is migrating to the cloud at unprecedented rates, the number of cloud security incidents is growing rapidly in response. In its recent cloud threat report, Palo Alto’s Unit 42 concluded threat actors have become adept at exploiting common, everyday issues in the cloud. These range from misconfigurations, weak credentials and lack of ...
Rapid7 Threat Report: Japanese Companies Exposed to Increased Ransomware Risk Through Global Business Footprint

Rapid7 Threat Report: Japanese Companies Exposed to Increased Ransomware Risk Through Global Business Footprint

Overseas entities present a serious cyber risk of ransomware and state-sponsored threats
My Facebook is hacked – What do I do?

My Facebook is hacked – What do I do?

I must admit that it is quite a stressful experience and for some, it may even turn out to be a harrowing one. A basic question that you may have is:   Why would someone be interested in my Facebook account? =/ There could be various reasons why someone would want to sneak into your Facebook account. Tarnish your image - Someone wanting to ...
LogRhythm Announces First Half 2023 Success And Expansions With Product Enhancements That Improve Visibility In The Threats That Matter Most and Reinforce The Company’s Commitment To Being A Trusted Security Partner

LogRhythm Announces First Half 2023 Success And Expansions With Product Enhancements That Improve Visibility In The Threats That Matter Most and Reinforce The Company’s Commitment To Being A Trusted Security Partner

LogRhythm, the company helping security teams stop breaches by turning disconnected data and signals into trustworthy insights, has announced its 20-year milestone with a renewed commitment to delivering innovative solutions.
No results found.

In The News

Tenable Report Warns Cloud Security Gaps Threaten Australian Businesses

Tenable Report Warns Cloud Security Gaps Threaten Australian Businesses

9% of cloud storage resources contain sensitive data, while 54% of organisations have secrets embedded in workloads, exposing critical vulnerabilities
Bitdefender to Acquire Mesh Security, Expanding Its Email Security Capabilities

Bitdefender to Acquire Mesh Security, Expanding Its Email Security Capabilities

Bitdefender has announced it has agreed to acquire Mesh Security Limited (Mesh), a provider of advanced email security solutions. Through the acquisition, Mesh’s email security technology and capabilities will be integrated into Bitdefender’s extended detection and response (XDR) platform and managed detection and response (MDR) services. The ...
Oracle Advances National Security with New Sovereign, Air-Gapped Cloud Offering

Oracle Advances National Security with New Sovereign, Air-Gapped Cloud Offering

Oracle Compute Cloud@Customer Isolated manages classified workloads to support mission success
SentinelOne Teams With AWS To Bring Best In Class Cloud Security Protection To Customers Through The New AWS Security Hub

SentinelOne Teams With AWS To Bring Best In Class Cloud Security Protection To Customers Through The New AWS Security Hub

As an initial launch partner, SentinelOne and AWS gives security teams the data, visibility, and automation to protect their AWS environments from build time to run time  MOUNTAIN VIEW, Calif. — June 17, 2025 — SentinelOne® (NYSE: S), a global leader in AI-powered security, today announced that it is a launch partner for the new AWS Security Hub. The ...
Tenable Uncovers “GerriScary” Supply Chain Compromise Vulnerability In Popular Google’s Open Source Projects – GerriScary Allowed Unauthorised Code Submission To At Least 18 Popular Google Projects

Tenable Uncovers “GerriScary” Supply Chain Compromise Vulnerability In Popular Google’s Open Source Projects – GerriScary Allowed Unauthorised Code Submission To At Least 18 Popular Google Projects

Tenable, the exposure management company, has identified a vulnerability in Google’s open-source code review system, Gerrit, dubbed GerriScary. The vulnerability allowed unauthorised code submission to at least 18 major Google projects, including ChromiumOS (CVE-2025-1568), Chromium, Dart, and Bazel. GerriScary could have allowed attackers to submit ...
Genetec Accelerates NZ Business Momentum with Sektor Partner Appointment

Genetec Accelerates NZ Business Momentum with Sektor Partner Appointment

Auckland/Sydney - 18 June 2025— Genetec Inc. (“Genetec”), a global leader in enterprise physical security software, today announced the appointment of leading technology distributor, Sektor, as its official distribution partner in New Zealand. This collaboration is aimed at accelerating the growth of physical security solutions across large and ...
Secure Code Warrior Unveils Industry-First AI Coding Rulesets To Guide Safer AI Code Deployment

Secure Code Warrior Unveils Industry-First AI Coding Rulesets To Guide Safer AI Code Deployment

Community-driven resource empowers developer teams of all sizes to integrate AI safely into critical workflows SYDNEY – June 18, 2025 - Secure Code Warrior, the leading developer risk management company, today announced the availability of AI Security Rules on GitHub – a first-of-its-kind, free resource to help developers generate more secure code ...
CrowdStrike Falcon For AWS Security Incident Response Strengthens Cyber Resilience For AWS Customers

CrowdStrike Falcon For AWS Security Incident Response Strengthens Cyber Resilience For AWS Customers

New program offers AWS Security Incident Response customers best-in-class Falcon platform protection at preferred rates   AUSTIN, Texas – June 16, 2025 – CrowdStrike (NASDAQ: CRWD) today unveiled Falcon for AWS Security Incident Response at AWS re:Inforce 2025, a new program that provides AWS Security Incident Response customers with ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This