The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

How Visible Is My Profile on the Internet?
There are a lot of good things about being famous, but there are a few not so good things too. – Sharon Stone What Is Profile Visibility?Simply put, profile visibility means how “famous” you are on the internet and what information about you is visible publicly. A simple Google search for your name will often reveal the answer to that ...

Cloud Assets the Biggest Targets for Cyber-attacks in Australia as More Sensitive Data Moves to Cloud
Thales today announced the release of the 2023 Thales Cloud Security Study, its annual assessment on the latest cloud security threats, trends and emerging risks based on a survey of nearly 3,000 IT and security professionals across 18 countries including Australia.

Closing the Gap: How Modern Forensic Platforms Enhance Cloud Security Investigations
While data is migrating to the cloud at unprecedented rates, the number of cloud security incidents is growing rapidly in response. In its recent cloud threat report, Palo Alto’s Unit 42 concluded threat actors have become adept at exploiting common, everyday issues in the cloud. These range from misconfigurations, weak credentials and lack of ...

Rapid7 Threat Report: Japanese Companies Exposed to Increased Ransomware Risk Through Global Business Footprint
Overseas entities present a serious cyber risk of ransomware and state-sponsored threats

My Facebook Is Hacked – What Do I Do?
I must admit that it is quite a stressful experience and for some, it may even turn out to be a harrowing one.
A basic question that you may have is:
Why Would Someone Be Interested in My Facebook Account? =/
There could be various reasons why someone would want to sneak into your Facebook account.
Tarnish your image - Someone wanting to ...

LogRhythm Announces First Half 2023 Success and Expansions With Product Enhancements That Improve Visibility in the Threats That Matter Most and Reinforce the Company’s Commitment to Being a Trusted Security Partner
LogRhythm, the company helping security teams stop breaches by turning disconnected data and signals into trustworthy insights, has announced its 20-year milestone with a renewed commitment to delivering innovative solutions.

Enterprises to Spend $12.9B on Private 5G Network Security by 2027
Organisations are looking for solutions that integrate neatly with existing technologies

Dog Scams
It is intriguing how people find so many ways to pull innocent people into emotional traps. These scammers strike at a time when people are most vulnerable and use techniques that seem completely harmless. One such scam that gained (un)popularity during the Covid-19 pandemic has been the dog or puppy scam, which still continues. What Is the Dog / ...
No results found.
In the News
Darktrace and SB C&S Corp Enter Into Distributor Agreement
Darktrace Limited (hereinafter “Darktrace”) and SB C&S Corp. (hereinafter “SB C&S”) have entered into a distribution agreement to provide Darktrace's innovative AI-based “ActiveAI Security Platform” to companies in Japan and will begin handling the product on August 20, 2025.
In recent years, the frequency of cyber security incidents has ...
Rapid7 Launches Vector Command Advanced, Empowering Security Teams to Understand and Validate Exposures With Expertise of Elite Red Teamers
Rapid7 has launched Vector Command Advanced, expanding its continuous red teaming and exposure validation service.
LevelBlue Completes Acquisition of Trustwave to Form the World’s Largest Pure-Play Managed Security Services Provider
August 20, 2025 – LevelBlue, a global leader in cloud-based, artificial intelligence (AI)-driven managed security services (MSS), has completed its acquisition of Trustwave, a global provider of cybersecurity and managed detection and response (MDR) leader.
Today’s acquisition establishes LevelBlue as the world’s largest pure-play MSSP with the ...
New Fastly Threat Research Reveals AI Crawlers Make up Almost 80% of AI Bot Traffic, Meta Leads AI Crawling as ChatGPT Dominates Real-Time Web Traffic
AI bots are driving increased content scraping, operational load, and high-frequency access patterns, revealing emerging risks from unverified automation traffic.
Ping Identity Unveils Just-in-time Privileged Access Capability to Empower Enterprises Across the Full Identity Lifec
Robust Identity Trifecta answers dynamic business needs within a centralised platform
BeyondTrust Completes Australian InfoSec Registered Assessor Program (IRAP) at “PROTECTED” Classification Level
New security status enables BeyondTrust to provide assurance in helping the Australian Government reinforce cloud posture.
IRAP-assessed solutions now enable public sector agencies to ascertain BeyondTrust’s readiness for secure cloud adoption.
Oracle to Offer Google’s Gemini Models to Customers, Accelerating Enterprises’ Agentic AI Journeys
Customers will have access to highly performant, flexible Gemini multimodal models via OCI Generative AI service. Oracle will collaborate with Google Cloud on various Gemini model integrations across business applications
CrowdStrike Unveils Falcon Next-Gen Identity Security, the First Unified Solution to Protect Every Identity Across the Attack Chain
Only CrowdStrike unifies initial access, privileged access, ITDR, and SaaS security for every human, non-human, and AI agent identity into a single platform – delivered today, without delays or integration complexity
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
- 340
- 341
- 342
- 343
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
