The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Cheap Shots are taking Creep Shots of Women

Cheap Shots are taking Creep Shots of Women

Do you ever get that feeling that’s someone is watching you, or you are being followed? It freaks me out. Now, how do you feel when some random person has taken a photo of you? Well, sometimes you can never be too sure about what the case is. But, what happens when the creep shots take cheap shots? Yep, a whole new level we are heading to. What is ...
Australian Companies Urged to Consider Pros and Cons of Paying a Ransom

Australian Companies Urged to Consider Pros and Cons of Paying a Ransom

The conversation is becoming more commonplace about whether companies should pay in a ransomware attack. Unfortunately, these crippling cyber-assaults are taking place too frequently across the globe, with targets and outcomes getting more consequential and more threatening for our workforce and communities. Cyber-criminals and other nefarious actors ...
A Scam Which Preys on Vulnerable People (and Works!)

A Scam Which Preys on Vulnerable People (and Works!)

This phishing campaign is a prime example of how heartless cybercriminals prey on vulnerable people. Our experts have been made aware of a new email extortion scheme targeting Australians. The email suggests that a backdoor has been installed on the victim's computer and the user was caught red-handed while pleasuring him or herself. The scammers then ...

Email Impersonation Scams: What You or Your IT Staff Can Do to Protect Your Business

A major cyber threat to Australian businesses is email-based impersonation scams targeting key personnel. The scheme involves cybercriminals mimicking business owners and executives through the use of phishing emails. Criminals typically pose as personnel in positions of authority and ask victims to perform money transfers, pay invoices, or to send the ...

Businesses Require New Techniques to Combat Phishing

The Verizon 2018 Data Breach Investigations Report provides valuable insights into emerging phishing threats. CISOs, IT managers and cybersecurity consultants should be aware of new phishing techniques this report raises in order to better manage the associated risk they bring. The most exciting finding in this year's report is the increased ...
Is the Cybersecurity of Your Business PEXA Ready?

Is the Cybersecurity of Your Business PEXA Ready?

You may have read about the highly publicised PEXA fraud which was reported whereby a Melbourne family was left homeless. As it transpired, the family’s conveyancer had their email hijacked by a cybercriminal. This lead to the conveyancer’s PEXA account being compromised and ultimately the theft of $250,000 by the criminal misdirecting settlement ...
Cybersecurity Tips for Conveyancers and Solicitors using PEXA

Cybersecurity Tips for Conveyancers and Solicitors using PEXA

You may have heard of the recent cybercrime perpetrated against the Australian e-conveyancing platform PEXA. A former MasterChef finalist and her family had $250,000 stolen from a property purchase transaction on the platform at settlement. In the following article, we explain the likely ways the fraud occurred and what practical things you can do ...

How you can protect your Microsoft Exchange email service from cyber attacks

Microsoft Exchange is a popular choice for providing email services for businesses. Its email features and seamless integration with Microsoft Outlook are undoubtedly convenient and easy to use, but what about security? Microsoft Exchange runs exclusively on Windows Server, which in 2017 was affected by various critical vulnerabilities, putting ...
No results found.

In The News

Check Point Software Emerges As A Leader In Attack Surface Management After Acquiring Cyberint, According To Latest GigaOm Radar Report

Check Point Software Emerges As A Leader In Attack Surface Management After Acquiring Cyberint, According To Latest GigaOm Radar Report

Cyberint, rebranded as Check Point External Risk Management, offers a comprehensive view of an organization's cyber threats across the open, deep, and dark web Sydney, 4 April 2025 – Check Point Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, has emerged as a leading player in Attack Surface ...
AI-Driven Attacks To Become Faster, More Sophisticated, And Harder To Detect By 2026, New Delinea Report Shows

AI-Driven Attacks To Become Faster, More Sophisticated, And Harder To Detect By 2026, New Delinea Report Shows

SYDNEY – April 4, 2025 – Delinea, a leading provider of solutions for securing human and machine identities through centralised authorisation, today released its inaugural Cybersecurity and the AI Threat Landscape report. The report, based on exclusive Delinea Labs research and an analysis of several third-party studies and real-world cyber incidents, ...
Thoughtworks Technology Radar Highlights GenAI’s Impact And Key Factors Shaping Today’s Software Development And Delivery

Thoughtworks Technology Radar Highlights GenAI’s Impact And Key Factors Shaping Today’s Software Development And Delivery

Thoughtworks, a global technology consultancy that integrates strategy, design and engineering to drive digital innovation, today presents the 32nd edition of the Technology Radar. The biannual report is built on Thoughtworks’ frontline experiences solving its clients’ most complex business challenges. The latest edition of the Thoughtworks ...
SolarWinds Unveils Next-Generation Solutions To Tackle Modern IT Operational Resiliency Challenges

SolarWinds Unveils Next-Generation Solutions To Tackle Modern IT Operational Resiliency Challenges

SolarWinds (NYSE:SWI), a leading provider of simple, powerful, and secure observability and IT management solutions, today announced a major step forward in helping businesses achieve IT operational resilience. The latest enhancements across the SolarWinds portfolio integrate expanded capabilities across observability, incident response, service ...
CyberArk Secure Browser Achieves SOC 2 Type 2 Compliance

CyberArk Secure Browser Achieves SOC 2 Type 2 Compliance

CyberArk (NASDAQ: CYBR), the global leader in identity security, today announced that CyberArk Secure Browser has achieved SOC 2 Type 2 Compliance, underscoring CyberArk’s commitment to apply the right level of privilege controls to secure every user’s action, from endpoint to application. This certification confirms that CyberArk Secure Browser uses ...
New Research: Gen AI Scraper Bots Clogging Websites with Half a Million Fake Requests Per Day

New Research: Gen AI Scraper Bots Clogging Websites with Half a Million Fake Requests Per Day

Generative AI ‘gray bots’ pound websites up to half a million times a day Generative AI scraper bots target websites 24 hours a day with up to half a million requests for information, according to the latest Barracuda detection data. In a new report, Barracuda threat analysts highlight the relentless behaviour of generative AI (Gen AI) bots, which ...
Delinea Partners with Microsoft to Ensure Seamless Transition and Continued Security as Microsoft Entra Permissions Management Retires

Delinea Partners with Microsoft to Ensure Seamless Transition and Continued Security as Microsoft Entra Permissions Management Retires

Collaboration enables customers to easily switch to Delinea’s advanced CIEM solution, safeguarding human and machine identities in public, multi-cloud environments
Datadog Unveils Plans for Data Centre in Australia

Datadog Unveils Plans for Data Centre in Australia

Datadog today announced plans for a new data centre to be located in Australia. The data centre instance, which will be built on AWS, will be Datadog’s first in Australia and adds to existing locations in North America, Asia, Europe and AWS GovCloud. The Australian data centre will store and process data locally, creating sovereign capacity to help ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This