The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

How to Protect Your Legal Practice from Payment Redirection Fraud

This article is aimed at helping legal professionals who commonly provide payment instructions for trust accounts and other transactions over email. Providing payment instructions over email puts you at risk of payment redirection fraud. In this article, you will learn why Australian legal professionals are high-value targets for cybercriminals and why ...
Is Your Conveyancing Practice Secure From Hacking?

Is Your Conveyancing Practice Secure From Hacking?

The recent media reports of fraud against conveyancing practices suggest that professionals should be taking measures for protecting their businesses from cyber attacks. Cybercriminals primarily rely on an email-based attack known as phishing to help commit payment redirection fraud. A recent Telstra Security Report found that the most common ...
Cheap Shots are taking Creep Shots of Women

Cheap Shots are taking Creep Shots of Women

Do you ever get that feeling that’s someone is watching you, or you are being followed? It freaks me out. Now, how do you feel when some random person has taken a photo of you? Well, sometimes you can never be too sure about what the case is. But, what happens when the creep shots take cheap shots? Yep, a whole new level we are heading to. What is ...
Australian Companies Urged to Consider Pros and Cons of Paying a Ransom

Australian Companies Urged to Consider Pros and Cons of Paying a Ransom

The conversation is becoming more commonplace about whether companies should pay in a ransomware attack. Unfortunately, these crippling cyber-assaults are taking place too frequently across the globe, with targets and outcomes getting more consequential and more threatening for our workforce and communities. Cyber-criminals and other nefarious actors ...
A Scam Which Preys on Vulnerable People (and Works!)

A Scam Which Preys on Vulnerable People (and Works!)

This phishing campaign is a prime example of how heartless cybercriminals prey on vulnerable people. Our experts have been made aware of a new email extortion scheme targeting Australians. The email suggests that a backdoor has been installed on the victim's computer and the user was caught red-handed while pleasuring him or herself. The scammers then ...

Email Impersonation Scams: What You or Your IT Staff Can Do to Protect Your Business

A major cyber threat to Australian businesses is email-based impersonation scams targeting key personnel. The scheme involves cybercriminals mimicking business owners and executives through the use of phishing emails. Criminals typically pose as personnel in positions of authority and ask victims to perform money transfers, pay invoices, or to send the ...

Businesses Require New Techniques to Combat Phishing

The Verizon 2018 Data Breach Investigations Report provides valuable insights into emerging phishing threats. CISOs, IT managers and cybersecurity consultants should be aware of new phishing techniques this report raises in order to better manage the associated risk they bring. The most exciting finding in this year's report is the increased ...
Is the Cybersecurity of Your Business PEXA Ready?

Is the Cybersecurity of Your Business PEXA Ready?

You may have read about the highly publicised PEXA fraud which was reported whereby a Melbourne family was left homeless. As it transpired, the family’s conveyancer had their email hijacked by a cybercriminal. This lead to the conveyancer’s PEXA account being compromised and ultimately the theft of $250,000 by the criminal misdirecting settlement ...
No results found.

In The News

ManageEngine Expands Its Integration Network With 100+ Prebuilt Integrations for Enterprise Identity Management

ManageEngine Expands Its Integration Network With 100+ Prebuilt Integrations for Enterprise Identity Management

The company's IAM platform, AD360, helps converge disconnected identities. - ManageEngine AD360 expands its integration support, with 100+ new ready-to-use integrations - These integrations empower enterprises for seamless, scalable identity management across diverse IT applications
Genetec Shares Best Practices For Enhancing Cyber Resilience In Cloud-Based Systems On World Cloud Security Day

Genetec Shares Best Practices For Enhancing Cyber Resilience In Cloud-Based Systems On World Cloud Security Day

MONTRÉAL, March 31, 2025 — In recognition of World Cloud Security Day on April 3rd, Genetec Inc. (“Genetec”), the global leader in enterprise physical security software, shares key insights and best practices to help organisations protect their data and operations from increasing cyber threats. With cyberattacks becoming more frequent and ...
The Shelby Strategy

The Shelby Strategy

An analysis of REF8685's abuse of GitHub for C2 to evade defenses.
Dirk Vorster Joins Wild Tech to Strengthen Business Development and Industry Alliances

Dirk Vorster Joins Wild Tech to Strengthen Business Development and Industry Alliances

Wild Tech is pleased to announce the appointment of Dirk Vorster as Western Australia Practice Lead, bringing his extensive expertise in business development, strategic alliances, and enterprise technology solutions to the team. With a background in ERP solutions and digital transformation, Dirk has built strong relationships across industries, ...
Macquarie Cloud Services’ Cloud Reset Podcast Launches Exclusive AI Series Featuring Australia’s Tech Leaders

Macquarie Cloud Services’ Cloud Reset Podcast Launches Exclusive AI Series Featuring Australia’s Tech Leaders

Macquarie Cloud Services has unveiled a special AI-focused series within its acclaimed Cloud Reset podcast, bringing together some of Australia’s most influential tech leaders to explore how AI will shape business decisions in the years ahead. In the first episode, ‘The AI Calls You Make in 2025 Will Make or Break You by 2030’, hosts Jonathan Staff ...
Tenable Appoints Scott Magill as Country Manager for Australia and New Zealand

Tenable Appoints Scott Magill as Country Manager for Australia and New Zealand

Tenable®, the exposure management company, today announced the appointment of Scott Magill as Country Manager for Australia and New Zealand. In this role, Magill will lead Tenable’s operations and strategy in the region, driving business growth and strengthening channel partnerships.
Western Digital Global World Backup Day Survey Finds One in Four Surveyed Australians Still Avoid Backing Up Their Data

Western Digital Global World Backup Day Survey Finds One in Four Surveyed Australians Still Avoid Backing Up Their Data

Despite Positive Momentum, Many Still Face Challenges with Storage Limits, Time Constraints and Awareness
Macquarie Cloud Services Achieves 2025 Dell Technologies Titanium Partner Tier

Macquarie Cloud Services Achieves 2025 Dell Technologies Titanium Partner Tier

Macquarie Cloud Services, part of Macquarie Technology Group (ASX: MAQ) has attained Titanium tier in the Dell Technologies Partner Program for 2025. The Titanium tier is the highest level in Dell Technologies’ partner program, marking Macquarie Cloud Services as one of a select group. This attainment reflects Macquarie’s technical expertise and ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This