The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

I Have Been Attacked by Ransomware. What Should I Do Now?

I Have Been Attacked by Ransomware. What Should I Do Now?

Retro Blockbuster Plot: Sometime in the 1980s – a filthy rich industrialist – his beautiful daughter – a constant target for kidnappers – always accompanied by bodyguards – one fateful day – kidnapping succeeds – hefty ransom asked – her big strong bloke comes to rescue – happy ending!Nah!! Kidnappers today have become very tech-savvy and, if I might ...
66% of Malware Is Delivered Through PDFs, New Report From Palo Alto Networks Unit 42 Finds

66% of Malware Is Delivered Through PDFs, New Report From Palo Alto Networks Unit 42 Finds

Vulnerabilities continue to be a popular method for threat actors to infect victims, with exploit attempts of vulnerabilities increasing by 55% in the past year
How Safe Are bit.ly (or Tiny URL) Links?

How Safe Are bit.ly (or Tiny URL) Links?

What Are Shortened or Tiny URLs?In the world of shortcuts, how could URLs stay behind. With domain names getting stranger and web links getting obnoxiously longer, tiny URLs come to the rescue. These are like capsule covers that make medicines easy to digest. Usually web addresses are attached with a lot of information (called query string) that helps ...
How to Remove the Roadblocks to Going Passwordless

How to Remove the Roadblocks to Going Passwordless

The road to passwordless authentication is one most organisations will tread, but they may require guidance in some key areas along the way, writes Ash Diffey, Vice President Asia Pacific and Japan, Ping Identity
How to Remove the Roadblocks to Going Passwordless

How to Remove the Roadblocks to Going Passwordless

The road to passwordless authentication is one most organisations will tread, but they may require guidance in some key areas along the way, writes Ash Diffey, Vice President Asia Pacific and Japan, Ping Identity
How to Protect Against Double-extortion Ransomware Attacks

How to Protect Against Double-extortion Ransomware Attacks

Of all the cybersecurity challenges facing organisations today, one of the most pervasive is ransomware attacks.
How to Protect Against Double-extortion Ransomware Attacks

How to Protect Against Double-extortion Ransomware Attacks

Of all the cybersecurity challenges facing organisations today, one of the most pervasive is ransomware attacks.
Insikt Report – Deepfakes : I Have No Mouth, and I Must Do Crime

Insikt Report – Deepfakes : I Have No Mouth, and I Must Do Crime

Intelligence company Recorded Future today released the findings of its latest deepfakes research. Titled “I Have No Mouth, And I Must Do Crime”, the report looks at how the spread of deepfake technologies, specifically through advancements in AI-based voice cloning, is pushing scams to a new level.
No results found.

In the News

BeyondTrust Accelerates Identity Security Innovation and Research Momentum With Launch of Phantom Labs

BeyondTrust Accelerates Identity Security Innovation and Research Momentum With Launch of Phantom Labs

Las Vegas, NV – August 4, 2025 – BeyondTrust, the global leader in identity security protecting Paths to Privilege™, today announced the formal launch of its dedicated cybersecurity research team, BeyondTrust Phantom Labs™. The launch of Phantom Labs represents a strategic milestone in BeyondTrust’s ongoing mission to advance identity security ...
Qualys Unveils Industry’s First Agentic AI-Powered Risk Operations Centre Delivering Autonomous Risk Management

Qualys Unveils Industry’s First Agentic AI-Powered Risk Operations Centre Delivering Autonomous Risk Management

New approach introduces a marketplace of Cyber Risk AI Agents that autonomously drive every step of Cyber Risk Operations—dramatically improving risk posture and reducing operational costs
BeyondTrust Research Exposes Hidden Privilege Threats: Secrets Are the New Identity Crisis Awaiting Agent

BeyondTrust Research Exposes Hidden Privilege Threats: Secrets Are the New Identity Crisis Awaiting Agent

New data from Identity Security Risk Assessments reveals critical blind spots in non-human identity posture BeyondTrust’s latest solution brings secrets into full view, just as Agentic AI spins up at scale
2025 CrowdStrike Threat Hunting Report: Adversaries Weaponize and Target AI at Scale

2025 CrowdStrike Threat Hunting Report: Adversaries Weaponize and Target AI at Scale

DPRK-nexus adversaries infiltrate 320+ companies using GenAI accelerated attacks; threat actors exploit AI agents, exposing autonomous systems as the next enterprise attack surface
Ransomware in the Crosshairs: Sophos and Halcyon Announce New Intelligence-Sharing and Mutual Anti-Tamper Protection Initiative

Ransomware in the Crosshairs: Sophos and Halcyon Announce New Intelligence-Sharing and Mutual Anti-Tamper Protection Initiative

Joint Collaboration Enables Real-Time Intelligence Sharing and Mutual Anti-Tamper Protections to Accelerate Ransomware Detection and Response
ASX Listed Excite Cyber Urges Australian Organisations to Adopt ISO 42001 Now to Prepare for Coming AI Regulation

ASX Listed Excite Cyber Urges Australian Organisations to Adopt ISO 42001 Now to Prepare for Coming AI Regulation

ASX listed cybersecurity firm, Excite Cyber is today urging Australian organisations to adopt ISO 42001 to ensure they are prepared for coming AI regulation.  
Barracuda Researchers Reveal New Emerging Email Threats Targeting Organisations Worldwide

Barracuda Researchers Reveal New Emerging Email Threats Targeting Organisations Worldwide

Email Threat Radar – July 2025 - During July, Barracuda threat analysts identified several notable email-based threats targeting organisations around the world. Many of them leveraged popular phishing-as-a-service (PhaaS) kits. The threats include: Tycoon PhaaS impersonating the Autodesk Construction Cloud for a credential phishing attack A ...
Trend Micro Reinvents Proactive Security With Digital Twin Technology

Trend Micro Reinvents Proactive Security With Digital Twin Technology

Innovation at the speed of agentic AI, built on NVIDIA AI, provides a data-driven foundation for supercharged decision-making
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This