The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Is Your Conveyancing Practice Secure From Hacking?

Is Your Conveyancing Practice Secure From Hacking?

The recent media reports of fraud against conveyancing practices suggest that professionals should be taking measures for protecting their businesses from cyber attacks. Cybercriminals primarily rely on an email-based attack known as phishing to help commit payment redirection fraud. A recent Telstra Security Report found that the most common ...
Cheap Shots are taking Creep Shots of Women

Cheap Shots are taking Creep Shots of Women

Do you ever get that feeling that’s someone is watching you, or you are being followed? It freaks me out. Now, how do you feel when some random person has taken a photo of you? Well, sometimes you can never be too sure about what the case is. But, what happens when the creep shots take cheap shots? Yep, a whole new level we are heading to. What is ...
Australian Companies Urged to Consider Pros and Cons of Paying a Ransom

Australian Companies Urged to Consider Pros and Cons of Paying a Ransom

The conversation is becoming more commonplace about whether companies should pay in a ransomware attack. Unfortunately, these crippling cyber-assaults are taking place too frequently across the globe, with targets and outcomes getting more consequential and more threatening for our workforce and communities. Cyber-criminals and other nefarious actors ...
A Scam Which Preys on Vulnerable People (and Works!)

A Scam Which Preys on Vulnerable People (and Works!)

This phishing campaign is a prime example of how heartless cybercriminals prey on vulnerable people. Our experts have been made aware of a new email extortion scheme targeting Australians. The email suggests that a backdoor has been installed on the victim's computer and the user was caught red-handed while pleasuring him or herself. The scammers then ...

Email Impersonation Scams: What You or Your IT Staff Can Do to Protect Your Business

A major cyber threat to Australian businesses is email-based impersonation scams targeting key personnel. The scheme involves cybercriminals mimicking business owners and executives through the use of phishing emails. Criminals typically pose as personnel in positions of authority and ask victims to perform money transfers, pay invoices, or to send the ...

Businesses Require New Techniques to Combat Phishing

The Verizon 2018 Data Breach Investigations Report provides valuable insights into emerging phishing threats. CISOs, IT managers and cybersecurity consultants should be aware of new phishing techniques this report raises in order to better manage the associated risk they bring. The most exciting finding in this year's report is the increased ...
Is the Cybersecurity of Your Business PEXA Ready?

Is the Cybersecurity of Your Business PEXA Ready?

You may have read about the highly publicised PEXA fraud which was reported whereby a Melbourne family was left homeless. As it transpired, the family’s conveyancer had their email hijacked by a cybercriminal. This lead to the conveyancer’s PEXA account being compromised and ultimately the theft of $250,000 by the criminal misdirecting settlement ...
Cybersecurity Tips for Conveyancers and Solicitors using PEXA

Cybersecurity Tips for Conveyancers and Solicitors using PEXA

You may have heard of the recent cybercrime perpetrated against the Australian e-conveyancing platform PEXA. A former MasterChef finalist and her family had $250,000 stolen from a property purchase transaction on the platform at settlement. In the following article, we explain the likely ways the fraud occurred and what practical things you can do ...
No results found.

In The News

CIOSO Global’s Greg Sullivan Takes Main Stage At Kaseya Connect To Discuss “What Keeps CISOs Up At Night”

CIOSO Global’s Greg Sullivan Takes Main Stage At Kaseya Connect To Discuss “What Keeps CISOs Up At Night”

SAINT LOUIS, MO – April 29, 2025 – CIOSO Global, a leading provider of risk-based cybersecurity advisory services, today announced that Founding Partner Greg Sullivan has been invited to speak at Kaseya Connect Global, taking place April 28 – May 1, 2025, at the MGM Grand Resort in Las Vegas, Nevada. Hosted by Kaseya, the annual Kaseya Connect Global ...
SentinelOne Brings Deep Security Reasoning, Agentic Detection and Response, and Hyperautomation Workflows to Any SIEM or Data Source with Purple AI ‘Athena’ Release

SentinelOne Brings Deep Security Reasoning, Agentic Detection and Response, and Hyperautomation Workflows to Any SIEM or Data Source with Purple AI ‘Athena’ Release

Cybersecurity AI pioneer reveals next generation of Purple AI, sets course for delivering the industry’s first end-to-end agentic AI cybersecurity platform
Kaseya Announces Latest Innovations at Connect 2025

Kaseya Announces Latest Innovations at Connect 2025

New capabilities and commercial policies launched to help drive efficiency and streamline IT operations
New CyberArk Report Reveals Surge in Machine Identities as Cyber Priorities Lag Behind in Australian Organisations

New CyberArk Report Reveals Surge in Machine Identities as Cyber Priorities Lag Behind in Australian Organisations

Machine identities – most with unsecured access - are skyrocketing, increasing enterprise risk    Fragmented identity strategies leave critical assets exposed as cyber risks escalate Business-first mindset leaves compliance and security trailing behind
Lenovo Unveils Largest-ever Storage Refresh to Power the AI Era

Lenovo Unveils Largest-ever Storage Refresh to Power the AI Era

Lenovo today announced its largest storage portfolio refresh in company history, unveiling new Lenovo Data Storage Solutions that prepare enterprise IT for the age of AI with better efficiency, performance and scalability. The complete portfolio includes storage arrays, software defined storage (SDI), and new AI and virtualisation innovations to ...
Elastic Launches Automatic Migration to Simplify SIEM Migration

Elastic Launches Automatic Migration to Simplify SIEM Migration

Automates switch from incumbent SIEM to Elastic Security without the need to manually rebuild existing detection rules
Qualys Expands Platform to Protect Against AI and LLM Model Risk from Development to Deployment

Qualys Expands Platform to Protect Against AI and LLM Model Risk from Development to Deployment

New enhancements inTotalAI strengthen AI security capabilities with extended threat coverage, multi‑modal protections, and internal LLM scanner 
CrowdStrike Unveils New Innovations to Secure Every Area of Cloud Risk, from AI Models to Runtime Data

CrowdStrike Unveils New Innovations to Secure Every Area of Cloud Risk, from AI Models to Runtime Data

New innovations secure AI, data, identities and SaaS applications – expanding CrowdStrike’s leadership in delivering unified protection across hybrid and multi-cloud environments
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This