The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Tenable Research Finds 72% of Organisations Remain Vulnerable to “Nightmare” Log4j Vulnerability
Tenable®, the Exposure Management company, today announced the results of a telemetry study examining the scope and impact of the critical Log4j vulnerability, known as Log4Shell, in the months following its initial disclosure. According to the data collected from over 500 million tests, 72% of organisations remain vulnerable to the Log4Shell ...

Lookout Threat Lab Discovers Predatory Loan Apps on Google Play and Apple App Store
Data exfiltration from devices used to pressure for repayment by harassing the customer or their contacts

9 Out of 10 Organisations in Asia-Pacific Report Digital Trust as ‘Extremely Important’: DigiCert Survey
In APAC, organisations report digital trust as important due to the expanding threat landscape within the region. Also, 91% of consumers are concerned about cyber threats, more than the rest of the world.

Bitdefender Threat Debrief – November 2022
Bitdefender has released its November Threat Debrief, a monthly series analysing threat news, trends, and research from the previous month. It includes a Ransomware Report highlighting the top ransomware families detected, as well as the top countries affected including Australia, and the top trojans targeting Android during October.

Genetec Releases 2022 State of Physical Security Report
Cybersecurity concerns are on the rise; Data from physical security technology seen as ‘mission-critical’ tool for business operations; Industry embraces hybrid cloud infrastructure and unified solutions.

Why an Effective Security Strategy Requires Three Pillars
The cybersecurity strategies followed by many organisations tend to be rather piecemeal affairs. Multiple products are deployed to tackle different threats with little thought given to creating a cohesive whole.
Such an approach is concerning for a number of reasons. It makes effective management difficult to achieve because IT teams need to monitor ...

AIIA Urges Government To Reconsider Increases In Data Breach Penalties
AIIA urges Government to reconsider increases in data breach penalties as part of wider Privacy Act review: penalties regime needs to not discourage good behaviour.
Australia's peak body for innovation technology, the Australian Information Industry Association (AIIA), is calling on the Albanese Government to take a positive, collaborative approach ...

As Virtual AGM Attendance Soars, How Does Technology Safeguard Against Cyber Threats?
Virtual attendance at Annual General Meetings (AGM) has soared in recent years, providing unheralded levels of engagement, access and accountability. Traditionally, AGMs have been essentially a closed club, limited to only those with the time to visit in person. Today, though, through technology and amendments to the Corporations Act, shareholders and ...
No results found.
In The News
Honeywell To Provide Automation And Safety Controls For First Fully Integrated Rare Earths Refinery In Australia
Honeywell today announced its Integrated Controls and Safety System (ICSS) will be designed and implemented in Iluka Resources’ (Iluka) Eneabba rare earths refinery in Western Australia to help improve production efficiency and create a safer environment for its workers. Through a strategic partnership between the Australian Government and Iluka, the ...
Wild Tech Malaysia Awarded Major Microsoft Dynamics 365 ERP Implementation Project by New Hoong Fatt Group
Wild Tech Malaysia is proud to announce its selection as the service provider for a comprehensive Microsoft Dynamics 365 Enterprise Resource Planning (ERP) implementation project for New Hoong Fatt (“NHF”) Group, a leading Malaysian automotive replacement parts solutions provider.
This strategic implementation will modernise and integrate business ...
Tenable Research in Verizon DBIR: Additional Research Analysis
Vulnerability exploitation surged as the initial access vector for 20% of breaches—a 34% increase year over year and now rivalling the top initial access vector (credential abuse), according to the newly released 2025 Verizon Data Breach Investigation Report (DBIR). To dig deep into this risk, Tenable contributed enriched data on the most exploited ...
New Report Reveals Overconfidence In Cyber Preparedness Among Australian Businesses
Veeam announced the findings of their latest research, From Risk to Resilience: Veeam 2025 Ransomware Trends and Proactive Strategies Report, revealing alarming insights into the evolving threat landscape of ransomware attacks. With cyber threats becoming more sophisticated and frequent, the report underlines the need for organisations to prioritise ...
Armis Launches Vulnerability Intelligence Database to Enhance Preemptive Security
“The Armis Vulnerability Intelligence Database is a critical, accessible resource built by the security community, for the security community. It translates vulnerability data into real-world impact so that businesses can adapt quickly and make more informed decisions to manage cyber threats.”
CyberArk Strengthens Identity Security for AI Agents with Accenture’s AI Refinery
Companies team to empower organisations to securely leverage AI agents
Rapid7 Introduces Intelligence Hub Within Its Command Platform for Threat Intelligence With Curated, Actionable Insights
Rapid7 has released Intelligence Hub, an integrated threat intelligence solution that will provide security teams with meaningful context and actionable insights for accelerated detection and response. It addresses several key challenges faced by security teams, including siloed intelligence platforms, lack of context, and the inability to prioritise ...
Tenable Research Exposes ConfusedComposer, A Privilege Escalation Vulnerability in Google Cloud Platform
ConfusedComposer Exploits Hidden Cloud Service Dependencies
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
