The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

The race to zero hours: Why latest guidelines spell danger for Australia’s Cybersecurity

The race to zero hours: Why latest guidelines spell danger for Australia’s Cybersecurity

Cybercrime is the biggest threat facing corporate Australia today, costing the economy more than an estimated $3trillion.
Russians buy fake employment & illness certificates on Telegram to avoid conscription

Russians buy fake employment & illness certificates on Telegram to avoid conscription

Since Putin’s mobilization order was announced, Flashpoint has observed a growing number of chatter and advertisements on Russian illicit communities and social media platforms, offering methods or access to avoid the draft.
IoT Software vulnerability in the IKEA TRÅDFRI smart lighting system

IoT Software vulnerability in the IKEA TRÅDFRI smart lighting system

Researchers at the Synopsys Cybersecurity Research Center (CyRC) have discovered an availability vulnerability in the IKEA TRÅDFRI smart lighting system.
What is a ‘Denial of Service’ software vulnerability and what impact could it have on you?

What is a ‘Denial of Service’ software vulnerability and what impact could it have on you?

By Jonathan Knudsen, Head of Global Research, Synopsys Cybersecurity Research Center The Synopsys Cybersecurity Research Center (CyRC) recently published a vulnerability advisory related to Open5GS, which is full of dense technical detail. But what does it all mean for organizations? What’s the potential impact? To answer that, let’s take a step ...
Why You Should Care About the Optus Breach If You’re A Customer

Why You Should Care About the Optus Breach If You’re A Customer

By now, you’ve likely seen the news about Optus, Australia's second-largest telco, having suffered a serious data breach, and the exposing of the private information of their millions of current and historic users through a malicious cyber-attack. What might not be clear to many, is the implications of the breach, and steps that can be taken toward ...
4 Critical Factors in Software Due Diligence Audits for Mergers & Acquisitions (M&A)

4 Critical Factors in Software Due Diligence Audits for Mergers & Acquisitions (M&A)

The fervor of mergers and acquisitions (M&As) is robust in Asia Pacific, according to leading firm EY (source). The pandemic that has ravaged economies and industries worldwide, led to an acceleration of digital transformation across many industries, even traditionally stoic and static ones like hospitality, food, entertainment, aviation, and ...
Why SD-WAN Is Worth the Hype: Transform Your Network

Why SD-WAN Is Worth the Hype: Transform Your Network

Is the hype surrounding software-defined wide area networks (SD-WANs) worth it? SD-WAN allows IT engineers to centrally and intelligently manage or orchestrate wide-area networks using applications like SD-WAN controllers. As this fast up-and-coming technology continues to evolve, the best way to get the most of it is to understand its value and how it ...
MyCISO Launches in Style

MyCISO Launches in Style

Thursday, 18th August, I was the MC of the MyCISO Launch event hosted at the stunning ‘Shell House’ in Sydney, Australia. The team has been working on the development of the MyCISO product for a number of years, so the launch was a huge milestone for them. The launch opened with guest speaker, Jan Schreuder, Co-Founder of the Cyber Leadership ...
No results found.

In The News

Delinea Partners with Microsoft to Ensure Seamless Transition and Continued Security as Microsoft Entra Permissions Management Retires

Delinea Partners with Microsoft to Ensure Seamless Transition and Continued Security as Microsoft Entra Permissions Management Retires

Collaboration enables customers to easily switch to Delinea’s advanced CIEM solution, safeguarding human and machine identities in public, multi-cloud environments
Datadog Unveils Plans for Data Centre in Australia

Datadog Unveils Plans for Data Centre in Australia

Datadog today announced plans for a new data centre to be located in Australia. The data centre instance, which will be built on AWS, will be Datadog’s first in Australia and adds to existing locations in North America, Asia, Europe and AWS GovCloud. The Australian data centre will store and process data locally, creating sovereign capacity to help ...
Sophos IR and MDR Cases Highlight Attackers Are Exfiltrating Data in Just Three Days

Sophos IR and MDR Cases Highlight Attackers Are Exfiltrating Data in Just Three Days

Sophos today released the 2025 Sophos Active Adversary Report, which details attacker behavior and techniques from over 400 Managed Detection and Response (MDR) and Incident Response (IR) cases in 2024. The report found that the primary way attackers gained initial access to networks (56% of all cases across MDR and IR) was by exploiting external ...
Motorola Solutions Expands Avigilon Enterprise Security Suite to Accelerate Response During Emergencies

Motorola Solutions Expands Avigilon Enterprise Security Suite to Accelerate Response During Emergencies

Motorola Solutions today announced several new advanced features in its Avigilon physical security suite, debuting Alta SOS this week at ISC West. The new features for Avigilon Alta and Avigilon Unity unify enterprises’ physical security solutions to better protect employees, visitors and service providers, and directly coordinate with public ...
OpenText Announces Availability of Titanium X Powered By the Latest Cloud Editions 25.2

OpenText Announces Availability of Titanium X Powered By the Latest Cloud Editions 25.2

Sydney, Australia – April 2, 2025 – OpenText™, today introduced the availability of Project Titanium X, now ready with Cloud Editions 25.2 (CE 25.2), the culmination of two years of strategic engineering powering the next generation of Business Clouds, Business AI and Business Technology. Cloud Editions 25.2 brings together a comprehensive set of ...
Exabeam Nova Unleashes the Future of Agentic AI in Cybersecurity

Exabeam Nova Unleashes the Future of Agentic AI in Cybersecurity

Proactive Multi-Agent Experience Uplevels the SOC, Enables Security Leaders, Analysts, and Investigators to Increase Productivity and Impact
JFrog Enables Trusted AI – Uncovers Critical Security Threats Emerging from AI’s Expansion in the Software Supply Chain

JFrog Enables Trusted AI – Uncovers Critical Security Threats Emerging from AI’s Expansion in the Software Supply Chain

The Software Supply Chain State of the Union 2025 Report Reveals “Quad-fecta” of Security Exploits, Mis-scored CVEs, Poor ML Model Governance, & more are Jeopardising Trust in Newly Created Software 
Tenable Research Uncovers A Privilege Escalation Vulnerability In Google Cloud Run – Security Flaw Highlights The Cascading Risks Of Cloud Service Dependencies

Tenable Research Uncovers A Privilege Escalation Vulnerability In Google Cloud Run – Security Flaw Highlights The Cascading Risks Of Cloud Service Dependencies

Tenable, the cloud exposure management company, has identified a privilege escalation vulnerability in Google Cloud Run called ImageRunner. The vulnerability could have allowed attackers to bypass permissions, gain unauthorised access to container images and potentially expose sensitive data. Cloud Run, Google’s serverless container platform, uses a ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This