The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Cloudflare Harnesses the Power of Its Global Network to Identify Top Exploited Phishing Methods and Most Impersonated Brands in Inaugural Report

Cloudflare Harnesses the Power of Its Global Network to Identify Top Exploited Phishing Methods and Most Impersonated Brands in Inaugural Report

Report underscores that email is the most exploited threat vector, Phishing remains borderless and attackers are increasingly impersonating trusted name brands
Achieving a Robust Zero Trust Environment

Achieving a Robust Zero Trust Environment

The concept of a Zero Trust infrastructure is now broadly understood across most industry sectors, but what’s less clear is the path organisations need to follow to get there.
How Businesses Today Can Prevent Advanced Cyber Threats

How Businesses Today Can Prevent Advanced Cyber Threats

In recent years workforces have become increasingly mobile, with employees using laptops at home, airports, cafes etc. Then, with the onset of COVID-19, the number of people accessing corporate resources from devices outside the corporate network increased enormously.
Tenable CEO and Chairman Calls out Microsoft for Unacceptable Cybersecurity Practices

Tenable CEO and Chairman Calls out Microsoft for Unacceptable Cybersecurity Practices

In a recent article, Amit Yoran, the Chairman and CEO of Tenable, criticised Microsoft for its cybersecurity practices. He mentioned that Senator Ron Wyden had written to various government agencies, urging them to hold Microsoft accountable for negligent cybersecurity practices that have allowed Chinese espionage against the US government. Data from ...
Doing More With Less: The Three Key Focus Areas for Cybersecurity

Doing More With Less: The Three Key Focus Areas for Cybersecurity

In an ever-evolving cybersecurity landscape, organisations face the daunting challenge of effectively managing their security initiatives. This responsibility falls not only on the IT teams, but also on the board of directors, who play a critical role in overseeing the organisation's cybersecurity strategy.
Bitdefender Releases MacOS Threat Landscape Report

Bitdefender Releases MacOS Threat Landscape Report

Bitdefender has revealed at Black Hat USA 2023 the macOS Threat Landscape Report, which looks at the top threats and trends targeting Apple’s macOS operating system over the duration of 12 months.
CrowdStrike 2023 Threat Hunting Report Shows Adversary Breakout Time Falls to Record Low, Technology Companies Most Targeted in APJ Region

CrowdStrike 2023 Threat Hunting Report Shows Adversary Breakout Time Falls to Record Low, Technology Companies Most Targeted in APJ Region

Adversaries took just 79 minutes, on average, to ‘breakout’ of their initial beach head into a victim’s system, with fastest recorded time being just seven minutes.
Poorly Purged Medical Devices Present Downstream Security Concerns When Sold on Secondary Market

Poorly Purged Medical Devices Present Downstream Security Concerns When Sold on Secondary Market

Rapid7, Inc., a leader in cloud risk and threat detection, has released a new research report that assesses the security implications from improper de-acquisition of infusion pumps to illustrate the importance of securing networks, applications, and devices.
No results found.

In the News

Check Point Named a Leader in the 2025 Gartner Magic Quadrant for Hybrid Mesh Firewall

Check Point Named a Leader in the 2025 Gartner Magic Quadrant for Hybrid Mesh Firewall

Delivering AI-powered network security across on-premises, cloud and SASE to prevent the most advanced threats
CyberArk Helps Optiv Transform Workforce Access, Applying Privilege Controls to Every Identity

CyberArk Helps Optiv Transform Workforce Access, Applying Privilege Controls to Every Identity

Replaces legacy SSO with CyberArk to enable secure, frictionless workforce access
HCLTech and Rubrik to Deliver Multi-Layered Cybersecurity

HCLTech and Rubrik to Deliver Multi-Layered Cybersecurity

HCLTech’s VaultNXT powered by Rubrik provides ransomware detection and remediation, ensuring data integrity for complete cyber resilience
Citrix NetScaler ADC and NetScaler Gateway Zero-Day Remote Code Execution Vulnerability Exploited in the Wild

Citrix NetScaler ADC and NetScaler Gateway Zero-Day Remote Code Execution Vulnerability Exploited in the Wild

Citrix has released patches to address a zero-day remote code execution vulnerability in NetScaler ADC and NetScaler Gateway that has been exploited. Organisations are urged to patch immediately as Citrix’s NetScaler ADC and Gateway appliances have been a valuable target for attackers over the last several years. “While patches are available for ...
Exabeam Research: Insider Threats, Supercharged by AI, Set for Explosive Growth in Australia

Exabeam Research: Insider Threats, Supercharged by AI, Set for Explosive Growth in Australia

82% of Australian respondents report that AI is making insider threats more effective, and 84% expect insider threats to increase in the next 12 months
Axis Unveils Game-Changing Security Solutions for a Safer, Smarter Future at Security & Integrate 2025

Axis Unveils Game-Changing Security Solutions for a Safer, Smarter Future at Security & Integrate 2025

Sydney, Australia – 27 August 2025 – Axis Communications Oceania returns as headline sponsor of Security & Integrate 2025, showcasing intelligent technologies that transform insight into action.  In a world of complex security challenges, Axis is redefining safety, security, business intelligence, and operational efficiency with cutting-edge ...
Phishing Gangs Use Split and Nested QR Codes to Evade Detection in New Wave of ‘Quishing’ Attacks

Phishing Gangs Use Split and Nested QR Codes to Evade Detection in New Wave of ‘Quishing’ Attacks

Barracuda threat analysts have uncovered two innovative techniques being used by cyber attackers to help malicious QR codes evade detection in phishing attacks.
Global CloudCon Summit Lands in Sydney

Global CloudCon Summit Lands in Sydney

Technology summit, CloudCon, is returning to Sydney for an immersive two-day experience with some of the world’s leading cloud and Kubernetes experts at the International Convention Centre on 9 and 10 September 2025.
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This