The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

How to Protect Your Legal Practice from Payment Redirection Fraud

This article is aimed at helping legal professionals who commonly provide payment instructions for trust accounts and other transactions over email. Providing payment instructions over email puts you at risk of payment redirection fraud. In this article, you will learn why Australian legal professionals are high-value targets for cybercriminals and why ...
Is Your Conveyancing Practice Secure From Hacking?

Is Your Conveyancing Practice Secure From Hacking?

The recent media reports of fraud against conveyancing practices suggest that professionals should be taking measures for protecting their businesses from cyber attacks. Cybercriminals primarily rely on an email-based attack known as phishing to help commit payment redirection fraud. A recent Telstra Security Report found that the most common ...
Cheap Shots are taking Creep Shots of Women

Cheap Shots are taking Creep Shots of Women

Do you ever get that feeling that’s someone is watching you, or you are being followed? It freaks me out. Now, how do you feel when some random person has taken a photo of you? Well, sometimes you can never be too sure about what the case is. But, what happens when the creep shots take cheap shots? Yep, a whole new level we are heading to. What is ...
Australian Companies Urged to Consider Pros and Cons of Paying a Ransom

Australian Companies Urged to Consider Pros and Cons of Paying a Ransom

The conversation is becoming more commonplace about whether companies should pay in a ransomware attack. Unfortunately, these crippling cyber-assaults are taking place too frequently across the globe, with targets and outcomes getting more consequential and more threatening for our workforce and communities. Cyber-criminals and other nefarious actors ...
A Scam Which Preys on Vulnerable People (and Works!)

A Scam Which Preys on Vulnerable People (and Works!)

This phishing campaign is a prime example of how heartless cybercriminals prey on vulnerable people. Our experts have been made aware of a new email extortion scheme targeting Australians. The email suggests that a backdoor has been installed on the victim's computer and the user was caught red-handed while pleasuring him or herself. The scammers then ...

Email Impersonation Scams: What You or Your IT Staff Can Do to Protect Your Business

A major cyber threat to Australian businesses is email-based impersonation scams targeting key personnel. The scheme involves cybercriminals mimicking business owners and executives through the use of phishing emails. Criminals typically pose as personnel in positions of authority and ask victims to perform money transfers, pay invoices, or to send the ...

Businesses Require New Techniques to Combat Phishing

The Verizon 2018 Data Breach Investigations Report provides valuable insights into emerging phishing threats. CISOs, IT managers and cybersecurity consultants should be aware of new phishing techniques this report raises in order to better manage the associated risk they bring. The most exciting finding in this year's report is the increased ...
Is the Cybersecurity of Your Business PEXA Ready?

Is the Cybersecurity of Your Business PEXA Ready?

You may have read about the highly publicised PEXA fraud which was reported whereby a Melbourne family was left homeless. As it transpired, the family’s conveyancer had their email hijacked by a cybercriminal. This lead to the conveyancer’s PEXA account being compromised and ultimately the theft of $250,000 by the criminal misdirecting settlement ...
No results found.

In The News

AI Adoption Accelerates in APAC, But Consumers Struggle with Trust, Security, and Job Displacement Concerns

AI Adoption Accelerates in APAC, But Consumers Struggle with Trust, Security, and Job Displacement Concerns

New F5 research reveals an AI paradox, where APAC consumers are enthusiastic about AI’s potential but remain wary of its risks Building trust through transparency, security, and responsible use is key to driving broader adoption
Inside The Russian-Speaking Underground: The Frontline of Global Cybercrime

Inside The Russian-Speaking Underground: The Frontline of Global Cybercrime

Trend Micro’s new research paper highlights cybercriminal underground’s expanding reach 
Found Means Fixed: Reduce Security Debt at Scale With GitHub Security Campaigns

Found Means Fixed: Reduce Security Debt at Scale With GitHub Security Campaigns

Starting today, security campaigns are generally available for all GitHub Advanced Security and GitHub Code Security customers to help them take control of their security debt and manage risk by unlocking collaboration between developers and security teams.
Tenable Commentary: April Patch Tuesday

Tenable Commentary: April Patch Tuesday

Microsoft patched 121 CVEs in its April 2025 Patch Tuesday release, with 11 rated critical and 110 rated as important. Elevation of privilege vulnerabilities accounted for 40.5% of the vulnerabilities patched this month, followed by remote code execution vulnerabilities at 25.6%. CVE-2025-29824, an elevation of privilege bug in Windows Common Log File ...
Fastly Unveils DDoS Attack Insights to Strengthen Protection and Security Transparency

Fastly Unveils DDoS Attack Insights to Strengthen Protection and Security Transparency

New capabilities provide deeper visibility into attack mitigation, helping organisations validate the efficacy of their automated DDoS protection
Sophos Names Chris Bell as Senior Vice President of Global Channel, Alliances and Corporate Development to Lead Next Evolution of Global Channel Strategy

Sophos Names Chris Bell as Senior Vice President of Global Channel, Alliances and Corporate Development to Lead Next Evolution of Global Channel Strategy

Sophos today announced it has named Chris Bell as senior vice president of global channel, alliances and corporate development, where he will lead the evolution of Sophos’ global channel strategy. This key appointment reinforces Sophos’ channel-first commitment to deliver a world-class partner experience. Bell joined Sophos following its acquisition ...
Australia Under Attack As Higher Cyber Threat Activity Observed, Armis Report Finds

Australia Under Attack As Higher Cyber Threat Activity Observed, Armis Report Finds

56% of respondents from Australia – higher than the global average (43%) – believe the threat is imminent, disclosing that they have already had to report an act of cyberwarfare. 79% of Australian IT leaders believe that global geopolitical tensions are only worsening the threat. In fact, over half (51%) have experienced more threat activity on their ...
BeyondTrust Named a Leader in the 2025 GigaOm Radar Report for Cloud Infrastructure Entitlement Management (CIEM) Solutions

BeyondTrust Named a Leader in the 2025 GigaOm Radar Report for Cloud Infrastructure Entitlement Management (CIEM) Solutions

Company recognised for aggressive technical innovation and advanced features that focus on a platform solution, offering broad functionality and use case support Report highlights BeyondTrust’s strengths in securing cloud environments by enforcing least privilege access, identifying identity-based risks, and mitigating misconfigurations 
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This