The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Australian Companies Urged to Consider Pros and Cons of Paying a Ransom

Australian Companies Urged to Consider Pros and Cons of Paying a Ransom

The conversation is becoming more commonplace about whether companies should pay in a ransomware attack. Unfortunately, these crippling cyber-assaults are taking place too frequently across the globe, with targets and outcomes getting more consequential and more threatening for our workforce and communities. Cyber-criminals and other nefarious actors ...
A Scam Which Preys on Vulnerable People (and Works!)

A Scam Which Preys on Vulnerable People (and Works!)

This phishing campaign is a prime example of how heartless cybercriminals prey on vulnerable people. Our experts have been made aware of a new email extortion scheme targeting Australians. The email suggests that a backdoor has been installed on the victim's computer and the user was caught red-handed while pleasuring him or herself. The scammers then ...

Email Impersonation Scams: What You or Your IT Staff Can Do to Protect Your Business

A major cyber threat to Australian businesses is email-based impersonation scams targeting key personnel. The scheme involves cybercriminals mimicking business owners and executives through the use of phishing emails. Criminals typically pose as personnel in positions of authority and ask victims to perform money transfers, pay invoices, or to send the ...

Businesses Require New Techniques to Combat Phishing

The Verizon 2018 Data Breach Investigations Report provides valuable insights into emerging phishing threats. CISOs, IT managers and cybersecurity consultants should be aware of new phishing techniques this report raises in order to better manage the associated risk they bring. The most exciting finding in this year's report is the increased ...
Is the Cybersecurity of Your Business PEXA Ready?

Is the Cybersecurity of Your Business PEXA Ready?

You may have read about the highly publicised PEXA fraud which was reported whereby a Melbourne family was left homeless. As it transpired, the family’s conveyancer had their email hijacked by a cybercriminal. This lead to the conveyancer’s PEXA account being compromised and ultimately the theft of $250,000 by the criminal misdirecting settlement ...
Cybersecurity Tips for Conveyancers and Solicitors using PEXA

Cybersecurity Tips for Conveyancers and Solicitors using PEXA

You may have heard of the recent cybercrime perpetrated against the Australian e-conveyancing platform PEXA. A former MasterChef finalist and her family had $250,000 stolen from a property purchase transaction on the platform at settlement. In the following article, we explain the likely ways the fraud occurred and what practical things you can do ...

How you can protect your Microsoft Exchange email service from cyber attacks

Microsoft Exchange is a popular choice for providing email services for businesses. Its email features and seamless integration with Microsoft Outlook are undoubtedly convenient and easy to use, but what about security? Microsoft Exchange runs exclusively on Windows Server, which in 2017 was affected by various critical vulnerabilities, putting ...

Report: Australia’s Top Law Firms Lead the Way in the Use of Anti-Phishing Technologies

Most of Australia’s top-tier and mid-tier law firms are well prepared in defending against phishing attacks, Iron Bastion's new study can now reveal. Iron Bastion  have assessed Australia’s top one hundred law firms for their use of anti-phishing technology. The details were gathered from various public data sources to determine whether email services ...
No results found.

In The News

Australia Under Attack As Higher Cyber Threat Activity Observed, Armis Report Finds

Australia Under Attack As Higher Cyber Threat Activity Observed, Armis Report Finds

56% of respondents from Australia – higher than the global average (43%) – believe the threat is imminent, disclosing that they have already had to report an act of cyberwarfare. 79% of Australian IT leaders believe that global geopolitical tensions are only worsening the threat. In fact, over half (51%) have experienced more threat activity on their ...
BeyondTrust Named a Leader in the 2025 GigaOm Radar Report for Cloud Infrastructure Entitlement Management (CIEM) Solutions

BeyondTrust Named a Leader in the 2025 GigaOm Radar Report for Cloud Infrastructure Entitlement Management (CIEM) Solutions

Company recognised for aggressive technical innovation and advanced features that focus on a platform solution, offering broad functionality and use case support Report highlights BeyondTrust’s strengths in securing cloud environments by enforcing least privilege access, identifying identity-based risks, and mitigating misconfigurations 
Kyndryl Expands Partnership With Google Cloud to Accelerate Mainframe Modernisation for Customers With Generative AI

Kyndryl Expands Partnership With Google Cloud to Accelerate Mainframe Modernisation for Customers With Generative AI

Kyndryl certified as a specialised Google Cloud partner for Gemini models
DriveSavers Expands to Australia, Offering Industry-Leading Data Recovery Services

DriveSavers Expands to Australia, Offering Industry-Leading Data Recovery Services

Sydney, 8 April 2025 - DriveSavers, a global leader in data recovery, has officially launched its Australian operations, bringing world-class data recovery solutions to individuals and businesses across the country. For over 40 years, DriveSavers has been at the forefront of data recovery, assisting clients ranging from Fortune 500 companies like ...
ExeQuantum Launches First Production-Ready HQC Post-Quantum API, Paving the Way for Cryptographic Diversity

ExeQuantum Launches First Production-Ready HQC Post-Quantum API, Paving the Way for Cryptographic Diversity

Melbourne, Australia, April 2025 - ExeQuantum, a cybersecurity company specializing in post-quantum cryptography, has officially launched a production-ready implementation of HQC-192, a NIST alternate finalist KEM, now accessible through a developer-facing API. This marks one of the first real-world deployments of HQC as a hardened, ...
Dynatrace on Azure Achieves “Protected” Status Following Australian Infosec Registered Assessor Program (IRAP) Assessment

Dynatrace on Azure Achieves “Protected” Status Following Australian Infosec Registered Assessor Program (IRAP) Assessment

New security status enables Dynatrace to assist all Australian Government agencies to deliver flawless and secure digital interactions on Microsoft Azure 
Cloudflare Acquires Outerbase to Expand Capabilities for Database and Agent Developer Experience

Cloudflare Acquires Outerbase to Expand Capabilities for Database and Agent Developer Experience

Sydney, Australia, April 8, 2025 – Cloudflare, Inc. (NYSE: NET), the leading connectivity cloud company, today announced the acquisition of Outerbase, a developer database company, to dramatically enhance the developer database experience across Cloudflare Workers. With this acquisition, building database-backed applications will be more approachable — ...
Cloudflare Accelerates AI Agent Development With The Industry’s First Remote MCP Server

Cloudflare Accelerates AI Agent Development With The Industry’s First Remote MCP Server

Sydney, Australia, April 8, 2025 – Cloudflare, Inc. (NYSE: NET), the leading connectivity cloud company, today announced several new offerings to accelerate the development of AI agents. Cloudflare now enables developers to easily build and deploy powerful AI agents with the industry’s first remote Model Context Protocol (MCP) server, generally ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This