The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

How to protect against double-extortion ransomware attacks
Of all the cybersecurity challenges facing organisations today, one of the most pervasive is ransomware attacks.
Insikt Report – Deepfakes : I Have No Mouth, And I Must Do Crime
Intelligence company Recorded Future today released the findings of its latest deepfakes research. Titled “I Have No Mouth, And I Must Do Crime”, the report looks at how the spread of deepfake technologies, specifically through advancements in AI-based voice cloning, is pushing scams to a new level.

Shadow API Usage Surges 900%, Revealing Alarming Lack of API Visibility Among Enterprise
New Research Highlights APIs are Now a Leading Attack Vector, Posing New and Significant Threats to Organisation

Rethinking how to engage Australian directors in security budget discussions
Boards are still fractured when it comes to cybersecurity capability, skills and buy-in, but there are ways for CISOs to navigate this to keep their programs funded.

Rethinking how to engage Australian directors in security budget discussions
Boards are still fractured when it comes to cybersecurity capability, skills and buy-in, but there are ways for CISOs to navigate this to keep their programs funded.

New Research: Digital Trust Is Integral to Innovation and Resilience, But Major Gaps Threaten Business Operations and Reputations
99 percent of respondents in ANZ say digital trust is important and 84 percent say its importance will increase in five years; but a lack of training (52 percent) and leadership buy-in (52 percent) jeopardise the value it can deliver.

Three-quarters of Australian organisations concerned about threats to 5G network and security of data in motion
Thales today released the local findings of its annual Data Threat Report 2023 which shows that new techniques such as double extortion as well as the expansion of 5G networks are two drivers increasing cyber and data threats for Aussie organisations.
Recorded Future’s Monthly CVE Report Records 2,200 Cyber Vulnerabilities for April, Microsoft Still Topping the List
Australian organisations should pay attention to 15 high risk vulnerabilities across Microsoft, Apple and Google. Some of the vulnerabilities in Apple and Microsoft are being used by the Nokoya ransomware group and likely nation-state actors.
No results found.
In The News
Secure Code Warrior Unveils Industry-First AI Coding Rulesets To Guide Safer AI Code Deployment
Community-driven resource empowers developer teams of all sizes to integrate AI safely into critical workflows
SYDNEY – June 18, 2025 - Secure Code Warrior, the leading developer risk management company, today announced the availability of AI Security Rules on GitHub – a first-of-its-kind, free resource to help developers generate more secure code ...
CrowdStrike Falcon For AWS Security Incident Response Strengthens Cyber Resilience For AWS Customers
New program offers AWS Security Incident Response customers best-in-class Falcon platform protection at preferred rates
AUSTIN, Texas – June 16, 2025 – CrowdStrike (NASDAQ: CRWD) today unveiled Falcon for AWS Security Incident Response at AWS re:Inforce 2025, a new program that provides AWS Security Incident Response customers with ...
Fastly Appoints Kip Compton As Chief Executive Officer
SAN FRANCISCO - 16 June 2025 - Fastly, Inc. (NYSE: FSLY) a leader in global edge cloud platforms, today announced that Kip Compton, Fastly's current Chief Product Officer, has been appointed CEO of the company and named to the Board of Directors, effective immediately. Compton succeeds Todd Nightingale, who has stepped down as CEO, President, and as a ...
NinjaOne Expands Automated Endpoint Management Platform With MDM For MacOS
NinjaOne today introduced NinjaOne MDM™ for macOS, dramatically expanding its Mac management capabilities. IT teams and MSPs can fully manage Windows, macOS, and Linux devices, as well as mobile endpoints across iOS, iPadOS, and Android, from a single, intuitive interface. The addition of Mac MDM capabilities gives NinjaOne’s customers and partners ...
SecurityBridge Appoints Cybersecurity Veteran Roman Schubiger As Chief Revenue Officer To Lead Global Expansion
In addition, Schubiger will expand SecurityBridge’s footprint in the United States and amplify its strategic growth across EMEA and Southeast Asia. He also aims to strengthen the company’s partner ecosystem and broaden its global channel network.
Genetec Brings Powerful New Capabilities To Security Center SaaS
Flexible, open platform gives security professionals and integrators the freedom to deploy and scale physical security on their terms
Sydney, June 16, 2025 — Genetec Inc. (“Genetec”), the global leader in enterprise physical security software, has announced new updates to Security Center SaaS, the company’s enterprise-grade Security-as-a-Service ...
Fortinet Unveils New Artificial Intelligence-Powered Workspace Security Suite To Protect The Modern Enterprise
Introducing FortiMail Workspace Security and powerful FortiDLP upgrades—redefining protection for email, browsers, and collaboration tools while securing sensitive data against insider threats
Azul Introduces 100 – 1000x More Accurate In-Production Java Vulnerability Detection
Azul Intelligence Cloud detects known vulnerabilities down to the class-level, eliminating up to 99% of false positives and boosting DevOps capacity and productivity
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
