Login

Promote Your Company       |     Contact

  • Home
  • Business News
  • Tech News
  • KBI.FM Podcasts
  • Subscribe

Independent Cyber News.

  • Business
  • Technology
  • National Security
  • KBI.FM
  • Subscribe
Active Subscription Scam Campaigns Flooding the Internet

Active Subscription Scam Campaigns Flooding the Internet

by Bitdefender | May 1, 2025 | Personal Security, Security Awareness, Threat Intelligence

Bitdefender researchers have uncovered a surge in subscription scams, both in scale and sophistication, spurred by a massive campaign involving hundreds of fraudulent websites. What sets this campaign apart is the significant investment cybercriminals have undertaken...
Data Management – It’s A High-stakes Game

Data Management – It’s A High-stakes Game

by Andy Milburn | Apr 16, 2025 | Compliance & Legal, Crisis Management, Data Management, Risk Management, Security Operations

In today’s digital-first economy, data can be both a powerful asset and a significant liability. Companies that proactively manage their data can achieve multiple positive business outcomes such as making optimal use of their storage infrastructure while...
Active Subscription Scam Campaigns Flooding the Internet

Account Takeover Attacks on Social Media: A Rising Threat for Content Creators and Influencers

by Ionut Baltariu | Apr 10, 2025 | Personal Security, Reports & Predictions, Security Awareness, Threat Intelligence

In 2024 and continuing into 2025, social media platforms were prime targets for cybercriminals, with content creators facing the brunt of the malicious attacks, including a surge in account takeovers, malicious live streams, and sophisticated phishing campaigns....
The Growing Nexus of Cyber Security and Financial Warfare – An Australian’s Perspective

The Growing Nexus of Cyber Security and Financial Warfare – An Australian’s Perspective

by James Tennant | Apr 9, 2025 | Banking & Finance, Leadership

Opening Remarks Sadly, it has become an undeniable reality that the traditional boundaries between conventional warfare and economic statecraft are rapidly dissolving. Cyber security and financial warfare have evolved into critical instruments of geopolitical...
Google’s Acquisition of Wiz Signals a Shift in Cloud Security

Google’s Acquisition of Wiz Signals a Shift in Cloud Security

by Scott Magill | Apr 8, 2025 | Cloud Security

Overview The cloud security landscape is facing a seismic shift. With Google’s recent acquisition of Wiz, one of the industry’s most prominent cloud security providers, many in the industry are considering the implications of cloud providers also serving as vendors....
Active Subscription Scam Campaigns Flooding the Internet

RedCurl’s Ransomware Debut

by Bitdefender | Mar 27, 2025 | Reports & Predictions, Security Operations, Threat Intelligence

Introduction This research, conducted by Bitdefender Labs, presents the first documented analysis of a ransomware campaign attributed to the RedCurl group (also known as Earth Kapre or Red Wolf). RedCurl has historically maintained a low profile, relying heavily on...
« Older Entries

Recent Posts

  • The Blind Spot In Your Cyber Strategy
  • How Wiz Is Rewriting the Cloud Security Story
  • WTF is Happening in Tech?
  • Computer Emergency Response Teams and Their Critical Role in Protecting Australian Digital Assets
  • Don’t Let Generative AI And LLMs Become A Third-Party Vulnerability

Recent Comments

  1. Pedro Lunes on Episode 10: Jasun Tate

connect@kbi.media
partners@kbi.media

119 Willoughby Rd,
Crows Nest NSW 2065
Australia

  • Follow
  • Follow
Partner with KBI

Business News

Assessment & Audit
Banking & Finance
Compliance & Legal
Continuous Business
Crisis Management
Crypto, Blockchain, & NFTs
Cyber Resilience
Executive Communication
Exposure Management
Governance & Risk
Innovation
Investment
Leadership
Learning & Education
Mergers & Acquisitions
Product Development
Reports & Predictions
Sales & Marketing
Secure Communications
Small-to-Medium Businesses
Supply Chain
Sustainability
Vendor Management
Work & Careers

Tech News

Application Security
Artificial Intelligence
Biometrics
CAASM
Cloud Security
Critical Infrastructure
Data Management
Digital Forensics
Encryption & Cipher
Endpoint Protection
Identity & Access Management
IoT & Robotics
Microsegmentation
Network Security
Offensive Security
OSINT
OT Security
Security Awareness
Security Operations
Social Engineering
Telecommunications
Threat Intelligence
Zero Trust

National Security News

AUKUS
ANZ
East Asia and Pacific
Europe and Central Asia
Latin America and Caribbean
Middle East and North Africa
North America
South Asia
Sub-Saharan Africa

Other Resources

Personal Security

Our Podcasts

KBKast
Destination Cyber
Cyber Commerce
KBI.FM Podcast Network

Partner With KBI

Promote Your Business
PR Agency Registration

Content Production

Podcast Production
Webcast Interviews
Streaming Series
Written & SEO Services

Copyright © 2025 TMFE Pty Ltd, KBI, All Rights Reserved | Crafted by Stilt.Design

Terms   |   Privacy Policy   |   Support

Business News

Assessment & Audit
Banking & Finance
Compliance & Legal
Continuous Business
Crisis Management
Crypto, Blockchain, & NFTs
Cyber Resilience
Executive Communication
Exposure Management
Governance & Risk
Innovation
Investment
Leadership
Learning & Education
Mergers & Acquisitions
Product Development
Reports & Predictions
Sales & Marketing
Secure Communications
Small-to-Medium Businesses
Supply Chain
Sustainability
Vendor Management
Work & Careers

Assessment & Audit
Banking & Finance
Compliance & Legal
Continuous Business
Crisis Management
Crypto, Blockchain, & NFTs
Cyber Resilience
Executive Communication

Exposure Management
Governance & Risk
Innovation
Investment
Leadership
Learning & Education
Mergers & Acquisitions
Product Development

Reports & Predictions
Sales & Marketing
Secure Communications
Small-to-Medium Businesses
Supply Chain
Sustainability
Vendor Management
Work & Careers

Tech News

Application Security
Artificial Intelligence
Biometrics
CAASM
Cloud Security
Critical Infrastructure
Data Management
Digital Forensics

Encryption & Cipher
Endpoint Protection
Identity & Access Management
IoT & Robotics
Microsegmentation
Network Security
Offensive Security
OSINT
OT Security
Security Awareness
Security Operations
Social Engineering
Telecommunications
Threat Intelligence
Zero Trust
Application Security
Artificial Intelligence
Biometrics
CAASM
Cloud Security
Critical Infrastructure
Data Management
Digital Forensics
Encryption & Cipher
Endpoint Protection
Identity & Access Management
IoT & Robotics
Microsegmentation
Network Security
Offensive Security
OSINT
OT Security
Security Awareness
Security Operations
Social Engineering
Telecommunications
Threat Intelligence
Zero Trust

National Security

AUKUS
ANZ
East Asia and Pacific

Europe and Central Asia
Latin America and Caribbean
Middle East and North Africa

North America
South Asia
Sub-Saharan Africa
AUKUS
ANZ
East Asia and Pacific
Europe and Central Asia
Latin America and Caribbean
Middle East and North Africa
North America
South Asia
Sub-Saharan Africa

KBI.FM - The Cyber Podcast Network

Threats & Reports

No results found.
No results found.
No results found.
No results found.