No results found.
Same, Same But Not Different.

Same, Same But Not Different.

The first few weeks of the year signals the back to work influx, in many cases now also a return to the office, from the ...
No results found.
No results found.

Podcasts

Episode 307 Deep Dive: Simon Hodgkinson | Current Affairs Of State-Sponsored Cyber Attacks And Their Evolving Tactics
byKBI.Media

In this episode, we sit down with Simon Hodgkinson, Strategic Advisor at Semperis, as he shares his insights on the persistent and evolving tactics of state sponsored cyber actors targeting Australian organizations. Simon explores motivations behind these attacks, emphasizing that their primary drivers are often espionage and the prepositioning of access in critical infrastructure rather than financial gain. He discusses the persistent targeting of Australia due to its geopolitical alliances, the growing desensitization to data breaches, and the rising threats to sectors like healthcare. Simon also highlights the dual-edged role of AI in both defending against and enabling sophisticated cyberattacks, the importance of speed in responding to incidents, and the necessity of robust foundational controls to manage growing risks.

Simon Hodgkinson, Strategic Advisor at Semperis

Simon Hodgkinson is the former Chief Information Security Officer (CISO) at bp. He was responsible for cybersecurity including strategy, governance, architecture, education, counter threat operations, and incident response. He joined bp in 2002 and has held several senior IT leadership roles.

Prior to becoming CISO, he was the VP for Infrastructure & Integration Services at bp. During this time, he drove a significant improvement in IT operational integrity, led a transformation program and spearheaded the commitment to improve employees’ IT experience. He led the CISO function in bp Supply & Trading, where he delivered a program to improve cyber-controls, many of which have been implemented across the bp group. Before joining bp, Simon worked in IT for a dotcom, an investment bank, and commercial software companies.

No results found.
No results found.
No results found.
No results found.
No results found.
No results found.
No results found.
No results found.
No results found.
Account Takeover Attacks on Social Media: A Rising Threat for Content Creators and Influencers

Account Takeover Attacks on Social Media: A Rising Threat for Content Creators and Influencers

In 2024 and continuing into 2025, social media platforms were prime targets for cybercriminals, with content creators facing the brunt of the malicious attacks, including a surge in account takeovers, malicious live streams, and sophisticated phishing campaigns. Bitdefender Labs has been at the forefront in analysing these threats, and the numbers paint a stark picture of a rapidly evolving threat landscape that harms the livelihood of both content creators and followers. Let’s examine the most striking trends from 2024, along with key attack ...
No results found.

Business News ↓

Qualys Names New Managing Director for Australia And New Zealand cover

Cyber Risk is Business Risk: Qualys Calls For Strategic Shift During Global Cybersecurity Week

This Global Cybersecurity Week is a timely reminder that cyber risk is no longer a technical issue – it’s a business imperative.   As threat actors move faster and AI amplifies the speed and precision of attacks, organisations must evolve how they manage and reduce risk over time. The era of “patch when you can” is over. Traditional, reactive vulnerability management is no longer fit for purpose.  To stay ahead,...

How Adopting Maturity Models Can Improve Enterprise IT Security

Introduction With high-profile cyberattacks occurring around the world at an alarming rate, software developers are focusing on using software security models that can guide their organisations toward embedding secure development best practices. Essentially, organisations can align their processes with one of two global industry standards for self-assessment and security maturity. The first is the Building Security...

Why Web Application Firewalls are a Critical Shield for Fintech Security

As digital banking, fintech innovations, and mobile transactions continue to reshape the global financial landscape, cybersecurity threats have become increasingly sophisticated. The financial sector, being the backbone of the global economy, is a prime target for cyberattacks. As organisations adopt cloud-based services, digital transactions, and third-party integrations, they introduce new security...

The Real Corporate Penetration Testing Process: How Companies Get Hacked Before The Hackers Do! 🚀

Hey guys, I’m sn0x — a cybersecurity researcher, bug hunter, and security enthusiast. I hold multiple certifications, including CNSP, EWPTXv2, CEH v11–12, GRC, RHCSA, and Cisco Cyber Threat Management. I’ve been ranked #1 in India and #2 globally on TryHackMe, secured #134 on Hack The Box in 2021, and even won HTB Battlegrounds twice. But hey, this isn’t a job interview, so let’s not make it sound like a LinkedIn...

Data Management – It’s A High-stakes Game

In today’s digital-first economy, data can be both a powerful asset and a significant liability. Companies that proactively manage their data can achieve multiple positive business outcomes such as making optimal use of their storage infrastructure while simultaneously servicing next-generation workloads such as GenAI. Those that fail to act run the risk of spiralling costs in addition to large exposure in the case...

Account Takeover Attacks on Social Media: A Rising Threat for Content Creators and Influencers

In 2024 and continuing into 2025, social media platforms were prime targets for cybercriminals, with content creators facing the brunt of the malicious attacks, including a surge in account takeovers, malicious live streams, and sophisticated phishing campaigns. Bitdefender Labs has been at the forefront in analysing these threats, and the numbers paint a stark picture of a rapidly evolving threat landscape that...

The Growing Nexus of Cyber Security and Financial Warfare – An Australian’s Perspective

Opening Remarks Sadly, it has become an undeniable reality that the traditional boundaries between conventional warfare and economic statecraft are rapidly dissolving. Cyber security and financial warfare have evolved into critical instruments of geopolitical influence and power projection, with significant implications for nations like Australia. The interconnectedness of global financial markets and digital...

Security Is An Arms Race, and The Bad Guys Are Two Steps Ahead

Cloud environments are a notorious ransomware attack hot spot. It’s a calculated strategy on the part of the cybercriminals. As the old adage goes, ‘follow the money’, and that’s exactly what they’re doing. Predictions suggest cloud infrastructure spend will reach over US$135 billion in 2026, accounting for over 67 per cent of total compute and storage infrastructure spend. Cloud environments have grown in...

How Organisations Can Achieve Secure-By-Design By 2030

Governments worldwide, from the UK to Australia, have set ambitious goals to enhance software security by 2030, particularly within critical infrastructure. However, achieving a secure-by-design (SBD) approach is not merely a matter of deploying advanced security tools or implementing stringent policies. Rather, it necessitates a fundamental shift in organisational culture, prioritising security at every level of...

The New Secure Communications Realities for Governments

The Eroding Trust in Consumer Messaging Apps Consumer-grade messaging apps like Signal, WhatsApp and Telegram offer basic end-to-end encryption, effectively securing the content of messages. However, encryption alone is just one piece of a much larger secure communication puzzle. These platforms fall critically short in providing four essential guarantees for government and critical infrastructure entities:...

RedCurl’s Ransomware Debut

Introduction This research, conducted by Bitdefender Labs, presents the first documented analysis of a ransomware campaign attributed to the RedCurl group (also known as Earth Kapre or Red Wolf). RedCurl has historically maintained a low profile, relying heavily on Living-off-the-Land (LOTL) techniques for corporate cyberespionage and data exfiltration. This shift to ransomware marks a significant evolution in its...

Securing AI Innovation: Why the Fundamentals of Cybersecurity Still Matter

The increasing use of AI in both defensive and offensive cyber strategies is prompting enterprises to explore new security solutions. However, as the French writer Alphonse Karr once said, “The more things change, the more they stay the same.” The core question for businesses is not whether AI requires a radical rethinking of cybersecurity—but rather, what value is at risk from AI misuse, and how much of that risk...

Overcoming the Social Media Fraud Challenge with Graph Databases

Introduction Australia’s parliamentary elections are coming under increasing pressure due to the increasing amount of misinformation and disinformation being shared on social media platforms. People share content that is intentionally misleading or not based in fact. Others share this content without checking sources or its validity. The challenge is becoming more acute with the rise of AI-generated audio and video...
Microsoft’s Platforms and Services Prioritise Security from Inception, Rather than as an Afterthought cover

Microsoft’s Platforms and Services Prioritise Security from Inception, Rather than as an Afterthought

Overview Microsoft’s long-standing Executive, Bret Arsenault, Corporate Vice President and Chief Cybersecurity advisor at Microsoft, detailed Microsoft’s Secure Future Initiative (SFI) - their strategic approach to addressing emerging cyber threats and managing secure software development. With decades of experience at Microsoft, what Arsenault described as “...five different careers at the same company.”,...

Securing Society: Cyber-Physical Safety in Australia’s Critical Infrastructure

Why Cyber-Physical Security Must Be a Leadership Priority   Australia’s critical infrastructure faces escalating cyber-physical threats, with adversaries targeting industrial control systems, operational technology (OT) and critical medical services. Security failures in these environments don’t just disrupt operations; they pose real risks to public safety, national security and our economic stability. This...
Are Defenders Prepped for the Next Cyber Chapter? cover

Are Defenders Prepped for the Next Cyber Chapter?

Securing AI isn’t just about defending against cyber threats - it’s about establishing governance frameworks that ensure AI is used responsibly. With AI adoption accelerating, organisations are needing to align leadership, compliance teams, and IT security to manage risks without stifling innovation. Janice Le, General Manager of Microsoft Security, explored the on-going challenges of governing AI and the strategic...
No results found.
No results found.
No results found.
No results found.
No results found.
No results found.
No results found.
No results found.

Markets & Trading

YOUR SECURITY NEWSFEED

The KBI Dossier

The Cybersecurity news feed delivered straight to your Inbox.

Technology News ↓

World Password Day – Insight by CyberArk: Passwords Alone Can’t Defend Against Today’s Identity Threats

As the boundaries between our personal and professional lives continue to blur, World Password Day is a timely reminder that this convergence extends to how we manage passwords. The human element remains a well-known challenge for security and identity professionals. With password reuse common across personal and corporate accounts, a single compromised credential can expose entire organisations to risk. Credential...

Active Subscription Scam Campaigns Flooding the Internet

Bitdefender researchers have uncovered a surge in subscription scams, both in scale and sophistication, spurred by a massive campaign involving hundreds of fraudulent websites. What sets this campaign apart is the significant investment cybercriminals have undertaken to make these fake sites look convincingly legitimate. Gone are the days when a suspicious email, SMS, or basic phishing link could easily fool users....

How Adopting Maturity Models Can Improve Enterprise IT Security

Introduction With high-profile cyberattacks occurring around the world at an alarming rate, software developers are focusing on using software security models that can guide their organisations toward embedding secure development best practices. Essentially, organisations can align their processes with one of two global industry standards for self-assessment and security maturity. The first is the Building Security...

Why Web Application Firewalls are a Critical Shield for Fintech Security

As digital banking, fintech innovations, and mobile transactions continue to reshape the global financial landscape, cybersecurity threats have become increasingly sophisticated. The financial sector, being the backbone of the global economy, is a prime target for cyberattacks. As organisations adopt cloud-based services, digital transactions, and third-party integrations, they introduce new security...
No results found.
No results found.
No results found.
No results found.
No results found.
No results found.
No results found.
No results found.
No results found.
No results found.
No results found.