Login

Promote Your Company       |     Contact

  • Home
  • Business News
  • Tech News
  • KBI.FM Podcasts
  • Subscribe

Independent Cyber News.

  • Business
  • Technology
  • National Security
  • KBI.FM
  • Subscribe
How Analysing 700,000 Security Incidents Helped Our Understanding of Living Off the Land Tactics

How Analysing 700,000 Security Incidents Helped Our Understanding of Living Off the Land Tactics

by Bitdefender | Jun 4, 2025 | Exposure Management, Security Operations, Threat Intelligence

This article shares initial findings from internal Bitdefender Labs research into Living off the Land (LOTL) techniques. Our team at Bitdefender Labs, comprised of hundreds of security researchers with close ties to academia, conducted this analysis as foundational...
Can Cyber Security Be a Platform for Innovation and Growth?

Can Cyber Security Be a Platform for Innovation and Growth?

by John Penn | May 20, 2025 | Compliance & Legal, Cyber Resilience, Leadership

Introduction The rapidly evolving cyber-risk landscape sees a cyber attack every six minutes in Australia, with a new wave of threats enabled by AI.1 The ability to manage cyber risks whilst at the same time delivering technological transformation places CISOs and...
How Analysing 700,000 Security Incidents Helped Our Understanding of Living Off the Land Tactics

Holiday Shopping and the Dark Market Parallel

by Bitdefender | Dec 5, 2024 | Security Awareness, Threat Intelligence

As Black Friday and Cyber Monday deals continue throughout the holiday season, millions of consumers will log on to snag the best offers of the year. But they aren’t the only ones on the hunt for seasonal discounts. Cybercriminals, too, flock to dark markets, browsing...
JFrog Prevents Supply Chain Attack Through Binary Secret Scanning

JFrog Prevents Supply Chain Attack Through Binary Secret Scanning

by Brian Moussalli | Jul 23, 2024 | Supply Chain, Threat Intelligence

The JFrog Security Research team has recently discovered and reported a leaked access token with administrator access to Python’s, PyPI’s and Python Software Foundation’s GitHub repositories, which was leaked in a public Docker container hosted on Docker Hub. As a...
Is Using Generative AI at Work Cheating? A Quarter of Aussie Office Workers Say “Yes”

Is Using Generative AI at Work Cheating? A Quarter of Aussie Office Workers Say “Yes”

by Pete Murray | Feb 21, 2024 | Artificial Intelligence, Reports & Predictions, Work & Careers

New research released today by Veritas Technologies shows that confusion over generative AI in the workplace is simultaneously creating a divide between employees while also increasing the risk of exposing sensitive information. More than two-thirds (68%) of...
How Analysing 700,000 Security Incidents Helped Our Understanding of Living Off the Land Tactics

Investigating Worldwide SMS Scams, and Tens of Millions of Dollars in Fraud

by The Production Team | Jan 30, 2024 | Reports & Predictions, Security Awareness, Telco

SMS services remain a critical part of telecommunications; they don’t require Internet access, and companies use them to inform their customers. This combination of features makes them incredibly useful for criminals who use the technology as a stepping stone in...
« Older Entries

Recent Posts

  • The Countdown to Quantum Has Begun
  • Five Telecom Habits Of Smart Small Businesses
  • Rethinking The Office Phone: Why Cloud PBX Is The Future For SMBs
  • The Scattered Spider, Airline Attacks and How to Be Breach Ready!
  • NBN Or Mobile Broadband? How To Choose The Right Business Internet Setup

Recent Comments

  1. Pedro Lunes on Episode 10: Jasun Tate

connect@kbi.media
partners@kbi.media

119 Willoughby Rd,
Crows Nest NSW 2065
Australia

  • Follow
  • Follow
Partner with KBI

Business News

Assessment & Audit
Banking & Finance
Compliance & Legal
Continuous Business
Crisis Management
Crypto, Blockchain, & NFTs
Cyber Resilience
Executive Communication
Exposure Management
Governance & Risk
Innovation
Investment
Leadership
Learning & Education
Mergers & Acquisitions
Product Development
Reports & Predictions
Sales & Marketing
Secure Communications
Small-to-Medium Businesses
Supply Chain
Sustainability
Vendor Management
Work & Careers

Tech News

Application Security
Artificial Intelligence
Biometrics
CAASM
Cloud Security
Critical Infrastructure
Data Management
Digital Forensics
Encryption & Cipher
Endpoint Protection
Identity & Access Management
IoT & Robotics
Microsegmentation
Network Security
Offensive Security
OSINT
OT Security
Security Awareness
Security Operations
Social Engineering
Telecommunications
Threat Intelligence
Zero Trust

National Security News

AUKUS
ANZ
East Asia and Pacific
Europe and Central Asia
Latin America and Caribbean
Middle East and North Africa
North America
South Asia
Sub-Saharan Africa

Other Resources

Personal Security

Our Podcasts

KBKast
Destination Cyber
Cyber Commerce
KBI.FM Podcast Network

Partner With KBI

Promote Your Business
PR Agency Registration

Content Production

Podcast Production
Webcast Interviews
Streaming Series
Written & SEO Services

Copyright © 2025 TMFE Pty Ltd, KBI, All Rights Reserved | Crafted by Stilt.Design

Terms   |   Privacy Policy   |   Support

Business News

Assessment & Audit
Banking & Finance
Compliance & Legal
Continuous Business
Crisis Management
Crypto, Blockchain, & NFTs
Cyber Resilience
Executive Communication
Exposure Management
Governance & Risk
Innovation
Investment
Leadership
Learning & Education
Mergers & Acquisitions
Product Development
Reports & Predictions
Sales & Marketing
Secure Communications
Small-to-Medium Businesses
Supply Chain
Sustainability
Vendor Management
Work & Careers

Assessment & Audit
Banking & Finance
Compliance & Legal
Continuous Business
Crisis Management
Crypto, Blockchain, & NFTs
Cyber Resilience
Executive Communication

Exposure Management
Governance & Risk
Innovation
Investment
Leadership
Learning & Education
Mergers & Acquisitions
Product Development

Reports & Predictions
Sales & Marketing
Secure Communications
Small-to-Medium Businesses
Supply Chain
Sustainability
Vendor Management
Work & Careers

Tech News

Application Security
Artificial Intelligence
Biometrics
CAASM
Cloud Security
Critical Infrastructure
Data Management
Digital Forensics

Encryption & Cipher
Endpoint Protection
Identity & Access Management
IoT & Robotics
Microsegmentation
Network Security
Offensive Security
OSINT
OT Security
Security Awareness
Security Operations
Social Engineering
Telecommunications
Threat Intelligence
Zero Trust
Application Security
Artificial Intelligence
Biometrics
CAASM
Cloud Security
Critical Infrastructure
Data Management
Digital Forensics
Encryption & Cipher
Endpoint Protection
Identity & Access Management
IoT & Robotics
Microsegmentation
Network Security
Offensive Security
OSINT
OT Security
Security Awareness
Security Operations
Social Engineering
Telecommunications
Threat Intelligence
Zero Trust

National Security

AUKUS
ANZ
East Asia and Pacific

Europe and Central Asia
Latin America and Caribbean
Middle East and North Africa

North America
South Asia
Sub-Saharan Africa
AUKUS
ANZ
East Asia and Pacific
Europe and Central Asia
Latin America and Caribbean
Middle East and North Africa
North America
South Asia
Sub-Saharan Africa

KBI.FM - The Cyber Podcast Network

Threats & Reports

No results found.
No results found.
No results found.
No results found.