The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Cloud Assets the Biggest Targets for Cyber-attacks in Australia as More Sensitive Data Moves to Cloud
Thales today announced the release of the 2023 Thales Cloud Security Study, its annual assessment on the latest cloud security threats, trends and emerging risks based on a survey of nearly 3,000 IT and security professionals across 18 countries including Australia.

Closing the Gap: How Modern Forensic Platforms Enhance Cloud Security Investigations
While data is migrating to the cloud at unprecedented rates, the number of cloud security incidents is growing rapidly in response. In its recent cloud threat report, Palo Alto’s Unit 42 concluded threat actors have become adept at exploiting common, everyday issues in the cloud. These range from misconfigurations, weak credentials and lack of ...

Rapid7 Threat Report: Japanese Companies Exposed to Increased Ransomware Risk Through Global Business Footprint
Overseas entities present a serious cyber risk of ransomware and state-sponsored threats

My Facebook Is Hacked – What Do I Do?
I must admit that it is quite a stressful experience and for some, it may even turn out to be a harrowing one.
A basic question that you may have is:
Why Would Someone Be Interested in My Facebook Account? =/
There could be various reasons why someone would want to sneak into your Facebook account.
Tarnish your image - Someone wanting to ...

LogRhythm Announces First Half 2023 Success and Expansions With Product Enhancements That Improve Visibility in the Threats That Matter Most and Reinforce the Company’s Commitment to Being a Trusted Security Partner
LogRhythm, the company helping security teams stop breaches by turning disconnected data and signals into trustworthy insights, has announced its 20-year milestone with a renewed commitment to delivering innovative solutions.

Enterprises to Spend $12.9B on Private 5G Network Security by 2027
Organisations are looking for solutions that integrate neatly with existing technologies

Dog Scams
It is intriguing how people find so many ways to pull innocent people into emotional traps. These scammers strike at a time when people are most vulnerable and use techniques that seem completely harmless. One such scam that gained (un)popularity during the Covid-19 pandemic has been the dog or puppy scam, which still continues. What Is the Dog / ...

Report: ‘Global Scam Economy’ Thriving in 2023
A payments study by Javelin Strategy & Research and SAS examines digital fraud trends worldwide, revealing eight expert strategies banks, retailers and other enterprises can use to fight back
No results found.
In the News
Canalys Study Finds Every $1 of Falcon Platform Sales Leads up to $7 in Partner Services Revenue
Independent research validates Falcon platform transformation as the leading engine of partner profitability, fueling growth and sustained returns
CrowdStrike and Meta Deliver New Benchmarks for the Evaluation of AI Performance in Cybersecurity
New benchmarks define how LLMs should be tested in the SOC – measuring real threats, workflows, and outcomes to help defenders
CrowdStrike Secures the Future of AI Across the Enterprise Ecosystem
Only CrowdStrike delivers unified protection across the entire AI stack – from compute to cloud, data to models, and agents to applications – in partnership with the world’s AI leaders
NinjaOne Now Available for Purchase on the CrowdStrike Marketplace
CrowdStrike customers gain simplified access to NinjaOne to streamline IT and boost productivity
F5 to Acquire CalypsoAI to Bring Advanced AI Guardrails to Large Enterprises
CalypsoAI's adaptive AI inference security solutions will enable companies to deliver AI apps more securely
Widespread Failure in Cloud Security Fundamentals Leaves Organisations Exposed, New Tenable Data Shows
Despite years of warnings, organisations are failing to master the fundamentals of cloud security, creating significant cyber exposure gaps. As they overwhelmingly adopt complex cloud and hybrid environments, a critical failure to manage identity-based threats and bridge the internal expertise gap is among the risks, leaving them dangerously exposed to ...
Smartsheet Names Ravi Soin as Chief Information Security Officer
Seattle CIO of the Year Winner to lead IT and security to fuel market growth
Bitdefender Report: New APT Framework Targeting a Philippine Military Company
This report analyses a sophisticated cyber-attack targeting a military company based in the Philippines, which led to the discovery of a new and advanced malware toolset. Based on the target's strategic value and the geopolitical context of the South China Sea, the attackers' tactics, techniques, and procedures (TTPs) are consistent with those of ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
- 340
- 341
- 342
- 343
- 344
- 345
- 346
- 347
- 348
- 349
- 350
- 351
- 352
- 353
- 354
- 355
- 356
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
