The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

3 Ways to Get Everyone Onboard the Innovation Train

3 Ways to Get Everyone Onboard the Innovation Train

When it comes to innovation and introducing change in an organisation, some people instantly embrace the journey while others resist it.
Is Australia set to follow the UK, for banking liabilities?

Is Australia set to follow the UK, for banking liabilities?

As the digital world continues to dominate the banking industry, concerns about data security and privacy are coming to the forefront. As algorithms become more advanced, building a profile based on users data, and identifying abnormal transactions that could indicate fraudulent activity. This has led to concerns about privacy, as individuals feel like ...
I Have Been Attacked by Ransomware. What Should I Do Now?

I Have Been Attacked by Ransomware. What Should I Do Now?

Retro Blockbuster Plot: Sometime in the 1980s – a filthy rich industrialist – his beautiful daughter – a constant target for kidnappers – always accompanied by bodyguards – one fateful day – kidnapping succeeds – hefty ransom asked – her big strong bloke comes to rescue – happy ending!Nah!! Kidnappers today have become very tech-savvy and, if I might ...
66% of Malware is Delivered Through PDFs, New Report from Palo Alto Networks Unit 42 Finds

66% of Malware is Delivered Through PDFs, New Report from Palo Alto Networks Unit 42 Finds

Vulnerabilities continue to be a popular method for threat actors to infect victims, with exploit attempts of vulnerabilities increasing by 55% in the past year
How Safe are bit.ly (or Tiny URL) Links?

How Safe are bit.ly (or Tiny URL) Links?

What are shortened or tiny URLs?In the world of shortcuts, how could URLs stay behind. With domain names getting stranger and web links getting obnoxiously longer, tiny URLs come to the rescue. These are like capsule covers that make medicines easy to digest. Usually web addresses are attached with a lot of information (called query string) that helps ...
How to remove the roadblocks to going passwordless

How to remove the roadblocks to going passwordless

The road to passwordless authentication is one most organisations will tread, but they may require guidance in some key areas along the way, writes Ash Diffey, Vice President Asia Pacific and Japan, Ping Identity
How to remove the roadblocks to going passwordless

How to remove the roadblocks to going passwordless

The road to passwordless authentication is one most organisations will tread, but they may require guidance in some key areas along the way, writes Ash Diffey, Vice President Asia Pacific and Japan, Ping Identity
How to protect against double-extortion ransomware attacks

How to protect against double-extortion ransomware attacks

Of all the cybersecurity challenges facing organisations today, one of the most pervasive is ransomware attacks.
No results found.

In The News

World Banking Leaders Warn of Increasing Sophistication of Criminal Money Laundering, BioCatch Reports

World Banking Leaders Warn of Increasing Sophistication of Criminal Money Laundering, BioCatch Reports

Nearly 80% of the 800 fraud-management, anti-money laundering (AML), and risk and compliance leaders surveyed in BioCatch’s first-ever Dark Economy Survey say criminal enterprises today are more sophisticated at laundering money than financial institutions (FIs) are at detecting that laundering. Equally concerning, 83% of respondents agree there exists ...
UiPath Showcases Next-Generation Enterprise-Grade Platform at Australian Agentic Automation Summit

UiPath Showcases Next-Generation Enterprise-Grade Platform at Australian Agentic Automation Summit

Breaks down the barriers to enterprise AI adoption by enhancing security and compliance, improving accuracy and reliability, overcoming stalled pilot projects, and avoiding vendor lock-in  
Tenable Report Warns Cloud Security Gaps Threaten Australian Businesses

Tenable Report Warns Cloud Security Gaps Threaten Australian Businesses

9% of cloud storage resources contain sensitive data, while 54% of organisations have secrets embedded in workloads, exposing critical vulnerabilities
Bitdefender to Acquire Mesh Security, Expanding Its Email Security Capabilities

Bitdefender to Acquire Mesh Security, Expanding Its Email Security Capabilities

Bitdefender has announced it has agreed to acquire Mesh Security Limited (Mesh), a provider of advanced email security solutions. Through the acquisition, Mesh’s email security technology and capabilities will be integrated into Bitdefender’s extended detection and response (XDR) platform and managed detection and response (MDR) services. The ...
Oracle Advances National Security with New Sovereign, Air-Gapped Cloud Offering

Oracle Advances National Security with New Sovereign, Air-Gapped Cloud Offering

Oracle Compute Cloud@Customer Isolated manages classified workloads to support mission success
SentinelOne Teams With AWS To Bring Best In Class Cloud Security Protection To Customers Through The New AWS Security Hub

SentinelOne Teams With AWS To Bring Best In Class Cloud Security Protection To Customers Through The New AWS Security Hub

As an initial launch partner, SentinelOne and AWS gives security teams the data, visibility, and automation to protect their AWS environments from build time to run time  MOUNTAIN VIEW, Calif. — June 17, 2025 — SentinelOne® (NYSE: S), a global leader in AI-powered security, today announced that it is a launch partner for the new AWS Security Hub. The ...
Tenable Uncovers “GerriScary” Supply Chain Compromise Vulnerability In Popular Google’s Open Source Projects – GerriScary Allowed Unauthorised Code Submission To At Least 18 Popular Google Projects

Tenable Uncovers “GerriScary” Supply Chain Compromise Vulnerability In Popular Google’s Open Source Projects – GerriScary Allowed Unauthorised Code Submission To At Least 18 Popular Google Projects

Tenable, the exposure management company, has identified a vulnerability in Google’s open-source code review system, Gerrit, dubbed GerriScary. The vulnerability allowed unauthorised code submission to at least 18 major Google projects, including ChromiumOS (CVE-2025-1568), Chromium, Dart, and Bazel. GerriScary could have allowed attackers to submit ...
Genetec Accelerates NZ Business Momentum with Sektor Partner Appointment

Genetec Accelerates NZ Business Momentum with Sektor Partner Appointment

Auckland/Sydney - 18 June 2025— Genetec Inc. (“Genetec”), a global leader in enterprise physical security software, today announced the appointment of leading technology distributor, Sektor, as its official distribution partner in New Zealand. This collaboration is aimed at accelerating the growth of physical security solutions across large and ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This