The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Australia’s leaders confident with cyber disclosure ability, yet hesitant to sharing publicly – PwC Digital Trust Insights Survey
In an age of growing transparency, with consumers increasingly concerned about how their data is stored and used, domestic results indicate that Australia is lagging behind its global counterparts, according to local data released today from PwC’s 2023 Global Digital Trust Insights Survey.

The race to zero hours: Why latest guidelines spell danger for Australia’s Cybersecurity
Cybercrime is the biggest threat facing corporate Australia today, costing the economy more than an estimated $3trillion.

Russians buy fake employment & illness certificates on Telegram to avoid conscription
Since Putin’s mobilization order was announced, Flashpoint has observed a growing number of chatter and advertisements on Russian illicit communities and social media platforms, offering methods or access to avoid the draft.

IoT Software vulnerability in the IKEA TRÅDFRI smart lighting system
Researchers at the Synopsys Cybersecurity Research Center (CyRC) have discovered an availability vulnerability in the IKEA TRÅDFRI smart lighting system.

What is a ‘Denial of Service’ software vulnerability and what impact could it have on you?
By Jonathan Knudsen, Head of Global Research, Synopsys Cybersecurity Research Center
The Synopsys Cybersecurity Research Center (CyRC) recently published a vulnerability advisory related to Open5GS, which is full of dense technical detail. But what does it all mean for organizations? What’s the potential impact? To answer that, let’s take a step ...

Why You Should Care About the Optus Breach If You’re A Customer
By now, you’ve likely seen the news about Optus, Australia's second-largest telco, having suffered a serious data breach, and the exposing of the private information of their millions of current and historic users through a malicious cyber-attack.
What might not be clear to many, is the implications of the breach, and steps that can be taken toward ...

4 Critical Factors in Software Due Diligence Audits for Mergers & Acquisitions (M&A)
The fervor of mergers and acquisitions (M&As) is robust in Asia Pacific, according to leading firm EY (source). The pandemic that has ravaged economies and industries worldwide, led to an acceleration of digital transformation across many industries, even traditionally stoic and static ones like hospitality, food, entertainment, aviation, and ...

Why SD-WAN Is Worth the Hype: Transform Your Network
Is the hype surrounding software-defined wide area networks (SD-WANs) worth it? SD-WAN allows IT engineers to centrally and intelligently manage or orchestrate wide-area networks using applications like SD-WAN controllers. As this fast up-and-coming technology continues to evolve, the best way to get the most of it is to understand its value and how it ...
No results found.
In The News
Kyndryl Expands Partnership With Google Cloud to Accelerate Mainframe Modernisation for Customers With Generative AI
Kyndryl certified as a specialised Google Cloud partner for Gemini models
DriveSavers Expands to Australia, Offering Industry-Leading Data Recovery Services
Sydney, 8 April 2025 - DriveSavers, a global leader in data recovery, has officially launched its Australian operations, bringing world-class data recovery solutions to individuals and businesses across the country.
For over 40 years, DriveSavers has been at the forefront of data recovery, assisting clients ranging from Fortune 500 companies like ...

ExeQuantum Launches First Production-Ready HQC Post-Quantum API, Paving the Way for Cryptographic Diversity
Melbourne, Australia, April 2025 - ExeQuantum, a cybersecurity company specializing in post-quantum cryptography, has officially launched a production-ready implementation of HQC-192, a NIST alternate finalist KEM, now accessible through a developer-facing API.
This marks one of the first real-world deployments of HQC as a hardened, ...
Dynatrace on Azure Achieves “Protected” Status Following Australian Infosec Registered Assessor Program (IRAP) Assessment
New security status enables Dynatrace to assist all Australian Government agencies to deliver flawless and secure digital interactions on Microsoft Azure
Cloudflare Acquires Outerbase to Expand Capabilities for Database and Agent Developer Experience
Sydney, Australia, April 8, 2025 – Cloudflare, Inc. (NYSE: NET), the leading connectivity cloud company, today announced the acquisition of Outerbase, a developer database company, to dramatically enhance the developer database experience across Cloudflare Workers. With this acquisition, building database-backed applications will be more approachable — ...
Cloudflare Accelerates AI Agent Development With The Industry’s First Remote MCP Server
Sydney, Australia, April 8, 2025 – Cloudflare, Inc. (NYSE: NET), the leading connectivity cloud company, today announced several new offerings to accelerate the development of AI agents. Cloudflare now enables developers to easily build and deploy powerful AI agents with the industry’s first remote Model Context Protocol (MCP) server, generally ...
Pax8 Names Craig Foster as Chief Financial Officer
AUSTRALIA, SYDNEY (April 8, 2025) – Pax8, the leading cloud commerce marketplace, today announced the appointment of Craig Foster as its new Chief Financial Officer. In this role, Foster will set the financial course or Pax8 and oversee all aspects of the company’s financial strategy to ensure it continues driving sustainable growth and innovation. His ...
Check Point Recognised for #1 AI-Powered Cyber Security Platform by Miercom
Independent testing by Miercom places Check Point Infinity Platform ahead of top security vendors in threat prevention, Zero Trust architecture, and AI-powered cyber defence
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
