The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

How to Protect Against Double-extortion Ransomware Attacks
Of all the cybersecurity challenges facing organisations today, one of the most pervasive is ransomware attacks.
Insikt Report – Deepfakes : I Have No Mouth, and I Must Do Crime
Intelligence company Recorded Future today released the findings of its latest deepfakes research. Titled “I Have No Mouth, And I Must Do Crime”, the report looks at how the spread of deepfake technologies, specifically through advancements in AI-based voice cloning, is pushing scams to a new level.

Shadow API Usage Surges 900%, Revealing Alarming Lack of API Visibility Among Enterprise
New Research Highlights APIs are Now a Leading Attack Vector, Posing New and Significant Threats to Organisation

Rethinking How to Engage Australian Directors in Security Budget Discussions
Boards are still fractured when it comes to cybersecurity capability, skills and buy-in, but there are ways for CISOs to navigate this to keep their programs funded.

Rethinking How to Engage Australian Directors in Security Budget Discussions
Boards are still fractured when it comes to cybersecurity capability, skills and buy-in, but there are ways for CISOs to navigate this to keep their programs funded.

New Research: Digital Trust Is Integral to Innovation and Resilience, but Major Gaps Threaten Business Operations and Reputations
99 percent of respondents in ANZ say digital trust is important and 84 percent say its importance will increase in five years; but a lack of training (52 percent) and leadership buy-in (52 percent) jeopardise the value it can deliver.

Three-quarters of Australian Organisations Concerned About Threats to 5G Network and Security of Data in Motion
Thales today released the local findings of its annual Data Threat Report 2023 which shows that new techniques such as double extortion as well as the expansion of 5G networks are two drivers increasing cyber and data threats for Aussie organisations.
Recorded Future’s Monthly CVE Report Records 2,200 Cyber Vulnerabilities for April, Microsoft Still Topping the List
Australian organisations should pay attention to 15 high risk vulnerabilities across Microsoft, Apple and Google. Some of the vulnerabilities in Apple and Microsoft are being used by the Nokoya ransomware group and likely nation-state actors.
No results found.
In the News
LevelBlue Completes Acquisition of Trustwave to Form the World’s Largest Pure-Play Managed Security Services Provider
August 20, 2025 – LevelBlue, a global leader in cloud-based, artificial intelligence (AI)-driven managed security services (MSS), has completed its acquisition of Trustwave, a global provider of cybersecurity and managed detection and response (MDR) leader.
Today’s acquisition establishes LevelBlue as the world’s largest pure-play MSSP with the ...
New Fastly Threat Research Reveals AI Crawlers Make up Almost 80% of AI Bot Traffic, Meta Leads AI Crawling as ChatGPT Dominates Real-Time Web Traffic
AI bots are driving increased content scraping, operational load, and high-frequency access patterns, revealing emerging risks from unverified automation traffic.
Ping Identity Unveils Just-in-time Privileged Access Capability to Empower Enterprises Across the Full Identity Lifec
Robust Identity Trifecta answers dynamic business needs within a centralised platform
BeyondTrust Completes Australian InfoSec Registered Assessor Program (IRAP) at “PROTECTED” Classification Level
New security status enables BeyondTrust to provide assurance in helping the Australian Government reinforce cloud posture.
IRAP-assessed solutions now enable public sector agencies to ascertain BeyondTrust’s readiness for secure cloud adoption.
Oracle to Offer Google’s Gemini Models to Customers, Accelerating Enterprises’ Agentic AI Journeys
Customers will have access to highly performant, flexible Gemini multimodal models via OCI Generative AI service. Oracle will collaborate with Google Cloud on various Gemini model integrations across business applications
CrowdStrike Unveils Falcon Next-Gen Identity Security, the First Unified Solution to Protect Every Identity Across the Attack Chain
Only CrowdStrike unifies initial access, privileged access, ITDR, and SaaS security for every human, non-human, and AI agent identity into a single platform – delivered today, without delays or integration complexity
VAST Data Collaborates With SK Telecom to Optimise Korea’s Largest AI Infrastructure Based on NVIDIA Supercomputers
VAST Data today announced a partnership with SK Telecom (SKT), South Korea’s leading telecommunications provider that’s transforming itself into an AI company. To deploy its advanced AI platform on SKT’s new sovereign AI infrastructure powered by the latest NVIDIA Blackwell GPUs.
Named the Haein Cluster, this AI infrastructure, designed initially ...
From Weakest Link to Cyber Shield: ESET Launches Awareness Training in Australia
ESET launches ESET Cybersecurity Awareness Training in Australia, helping local businesses to avoid breaches resulting from human error.
ESET Cybersecurity Awareness Training helps meet ISM-0252, NIS2, HIPAA, PCI, SOX, GDPR, and CCPA compliance requirements, as well as insurance requirements.
This online educational and testing source puts 30 years ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
- 340
- 341
- 342
- 343
- 344
- 345
- 346
- 347
- 348
- 349
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
