The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

CyberArk Survey: AI Tool Use, Employee Churn and Geo-Political Tensions Fuel Cyber Jeopardy
91% of Australian respondents experienced at least one ransom attack

Bridging the Gap: Uniting IT Teams for Effective Cybersecurity
It's critical that IT teams work together with cybersecurity teams to ensure their organisation's infrastructure is secure. Unfortunately, roles within the tech industry have become much more specialised over the past few decades, leading to isolated silos.

Bridging the Gap: Uniting IT Teams for Effective Cybersecurity
It's critical that IT teams work together with cybersecurity teams to ensure their organisation's infrastructure is secure. Unfortunately, roles within the tech industry have become much more specialised over the past few decades, leading to isolated silos.

Innovation and Collaboration: Working Towards a Cohesive Solution for Cybersecurity in Australia
Conversations are the fulcrum upon which we, as an industry, identify and begin to solve the challenges facing Australian businesses.
Recently, at the Australia-Israel Chamber of Commerce (AICC) event in Sydney, it was made clear that Australia has the opportunity to emerge as a dominant force when it comes to innovation.
This event was hosted ...

Why Outdated Anti-Phishing Advice Leaves You Exposed – Stories from the Trenches (Part 2)
As the latest phishing techniques are more sophisticated than ever before, general anti-phishing tips cannot safeguard you from becoming a victim. High-quality emails, confusing branding of domain names and poor user interfaces all play right into the hands of the cybercriminals. In the following article, we will showcase a range of real-world phishing ...

Why Outdated Anti-Phishing Advice Leaves You Exposed – Stories from the Trenches (Part 1)
We already know that phishing is a significant threat to businesses and individuals. Anti-phishing tips, such as “always hover over the link in an email before clicking” or “be wary of emails with poor grammar”, are meant to help us avoid being tricked by phishing emails. These tips have been circulating on the internet for over a decade, but sadly, ...

The Security Operations Centre (SOC)
So, the board members at MyBiz have agreed upon making security as one of SC the foremost focus areas this year. With increasing capabilities of hackers and cyber thieves, the complexity of securing systems and data is enormous. The CISO has been evaluating having an in-house security team versus outsourcing to managed services, or creating a mix of ...

The Security Operations Centre (SOC)
So, the board members at MyBiz have agreed upon making security as one of SC the foremost focus areas this year. With increasing capabilities of hackers and cyber thieves, the complexity of securing systems and data is enormous. The CISO has been evaluating having an in-house security team versus outsourcing to managed services, or creating a mix of ...
No results found.
In The News
Semperis Research Discovers A Severe Vulnerability In Microsoft Entra ID Impacting 10% of Global SaaS Apps
Semperis Research Uncovers Ongoing Risk from nOAuth Vulnerability in Microsoft Entra ID, Affecting Enterprise SaaS Applications
nOAuth continues to go undetected by SaaS vendors, who may not even know what to look for and it is nearly impossible for enterprise customers to defend against, allowing attackers to take over accounts and exfiltrate data.
Ericsson Mobility Report June 2025 Highlights Growing Monetisation Appeal of 5G Fixed Wireless Access
– More than half of all service providers globally who offer fixed wireless access now do so with speed-based monetisation benefits enhanced by 5G – 5G subscriptions to top 2.9 billion globally by the end of 2025 – 5G networks forecast to handle 80 percent of global mobile traffic by the end of 2030
Trend Micro Named a Leader in IDC MarketScape for CNAPP
SYDNEY, June 26, 2025 – Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cybersecurity leader, today announced it has been named as a Leader in the IDC MarketScape for Worldwide Cloud-Native Application Protection Platforms (CNAPP) 2025 Vendor Assessment (doc #US53549925, June 2025).
To read the IDC MarketScape: Worldwide Cloud-Native ...
New ISACA Research: 81% Using AI At Work – But Only 28% Of Firms Have A Policy In Place
ISACA finds: 89% of digital trust pros say increased AI skills and knowledge needed to retain job or advance their career over next two years; and nearly a third of organisations are increasing jobs for AI-related functions within 12 months.
News: 75% of Building Management Systems Contain Known Exploited Vulnerabilities And 51% Are Insecurely Connected To The Internet
New Research from Claroty's Team82 Reveals Riskiest Building Management System Exposures
Presence of KEVs, KEVs Linked to Ransomware, and Insecure Internet Exposure Found to be Pervasive Among BMS, BAS According to New Report
SYDNEY—June 26, 2025—Claroty, the cyber-physical systems (CPS) protection company, today announced new research on the ...
Datadog Reinforces APJ Presence Through Senior Leadership Expansion
Industry veteran Adrian Towsey to further drive company’s regional expansion as rising technology spend heightens demand for observability, security and generative AI
Barracuda Launches Managed Vulnerability Security that Extends the BarracudaONE Platform
Sydney, Australia – 26 June, 2025 — Barracuda Networks, Inc., a leading cybersecurity company providing complete protection against complex threats for all sized businesses, today announced the launch of Barracuda Managed Vulnerability Security. This fully managed service, powered by Barracuda’s global Security Operations Centre (SOC), extends the ...
Bitdefender Launches Powerful External Attack Surface Management Solution for Businesses and Managed Service Providers
Bitdefender today announced Bitdefender GravityZone External Attack Surface Management (EASM), a new solution that gives businesses, managed service providers (MSPs) and their customers comprehensive visibility into their internet-facing assets and associated vulnerabilities. GravityZone EASM dramatically reduces threat exposure and strengthens ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
