The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

A Scam Which Preys on Vulnerable People (and Works!)

A Scam Which Preys on Vulnerable People (and Works!)

This phishing campaign is a prime example of how heartless cybercriminals prey on vulnerable people. Our experts have been made aware of a new email extortion scheme targeting Australians. The email suggests that a backdoor has been installed on the victim's computer and the user was caught red-handed while pleasuring him or herself. The scammers then ...

Email Impersonation Scams: What You or Your IT Staff Can Do to Protect Your Business

A major cyber threat to Australian businesses is email-based impersonation scams targeting key personnel. The scheme involves cybercriminals mimicking business owners and executives through the use of phishing emails. Criminals typically pose as personnel in positions of authority and ask victims to perform money transfers, pay invoices, or to send the ...

Businesses Require New Techniques to Combat Phishing

The Verizon 2018 Data Breach Investigations Report provides valuable insights into emerging phishing threats. CISOs, IT managers and cybersecurity consultants should be aware of new phishing techniques this report raises in order to better manage the associated risk they bring. The most exciting finding in this year's report is the increased ...
Is the Cybersecurity of Your Business PEXA Ready?

Is the Cybersecurity of Your Business PEXA Ready?

You may have read about the highly publicised PEXA fraud which was reported whereby a Melbourne family was left homeless. As it transpired, the family’s conveyancer had their email hijacked by a cybercriminal. This lead to the conveyancer’s PEXA account being compromised and ultimately the theft of $250,000 by the criminal misdirecting settlement ...
Cybersecurity Tips for Conveyancers and Solicitors using PEXA

Cybersecurity Tips for Conveyancers and Solicitors using PEXA

You may have heard of the recent cybercrime perpetrated against the Australian e-conveyancing platform PEXA. A former MasterChef finalist and her family had $250,000 stolen from a property purchase transaction on the platform at settlement. In the following article, we explain the likely ways the fraud occurred and what practical things you can do ...

How you can protect your Microsoft Exchange email service from cyber attacks

Microsoft Exchange is a popular choice for providing email services for businesses. Its email features and seamless integration with Microsoft Outlook are undoubtedly convenient and easy to use, but what about security? Microsoft Exchange runs exclusively on Windows Server, which in 2017 was affected by various critical vulnerabilities, putting ...

Report: Australia’s Top Law Firms Lead the Way in the Use of Anti-Phishing Technologies

Most of Australia’s top-tier and mid-tier law firms are well prepared in defending against phishing attacks, Iron Bastion's new study can now reveal. Iron Bastion  have assessed Australia’s top one hundred law firms for their use of anti-phishing technology. The details were gathered from various public data sources to determine whether email services ...
Zooming Around

Zooming Around

How is Zoom changing us, and how are we changing Zoom?🧐 With the current state of the world, how reliable and secure is the platform upon which so many now rely?
No results found.

In The News

Genetec Announces Alignment With ACSC’s Essential Eight Cybersecurity Framework

Genetec Announces Alignment With ACSC’s Essential Eight Cybersecurity Framework

SYDNEY, May 6, 2025—Genetec Inc. (“Genetec”), the global leader in enterprise physical security software, today announced it has been assessed to align with the Australian Cyber Security Centre’s (ACSC) Essential Eight threat mitigation requirements, as verified by CyberCX. Developed in partnership with the Australian Government, the ACSC’s ...
CyberArk Named an Overall Leader in the KuppingerCole Analysts 2025 Leadership Compass for Enterprise Secrets Management

CyberArk Named an Overall Leader in the KuppingerCole Analysts 2025 Leadership Compass for Enterprise Secrets Management

Recognition underscores CyberArk’s market leadership in Machine Identity Security
Akamai Firewall for AI Enables Secure AI Applications with Advanced Threat Protection

Akamai Firewall for AI Enables Secure AI Applications with Advanced Threat Protection

Akamai’s latest solutions use AI to strengthen security while also protecting businesses from AI-driven threats
Excite Announces $2.8 Million Capital Raise To Accelerate Growth In Cyber Security And Training Initiatives

Excite Announces $2.8 Million Capital Raise To Accelerate Growth In Cyber Security And Training Initiatives

Excite Managing Director and CEO, Mr Bryan Saba, commented: "The funds will enhance our core capabilities in digital forensics, cyber training, and offensive security whilst directly supporting revenue-generating opportunities already in play. We're building momentum across defence, government and critical infrastructure sectors, and this investment ...
Tenable Research Shows How “Prompt-Injection-Style” Hacks Can Secure the Model Context Protocol (MCP)

Tenable Research Shows How “Prompt-Injection-Style” Hacks Can Secure the Model Context Protocol (MCP)

Tenable Research has published new findings that flip the script on one of the most discussed AI attack vectors. In the blog “MCP Prompt Injection: Not Just for Evil,” Tenable’s Ben Smith demonstrates how techniques resembling prompt injection can be repurposed to audit, log and even firewall Large Language Model (LLM) tool calls running over the ...
Lumify Group Wins Cyber Security Training Business of the Year in 2025 Australian Cyber Awards

Lumify Group Wins Cyber Security Training Business of the Year in 2025 Australian Cyber Awards

Company celebrates further recognition of excellence as two employees named finalists in individual award categories
Trend Micro Delivers AI-Powered Threat Detection with AWS Infrastructure Support and NVIDIA Integration

Trend Micro Delivers AI-Powered Threat Detection with AWS Infrastructure Support and NVIDIA Integration

Proactive security with AI-powered model built for modern enterprise workloads
Workato Launches Workato One Platform, UAI and Industry’s Leading Orchestration Offering to Bring Agents to The Core of The Enterprise

Workato Launches Workato One Platform, UAI and Industry’s Leading Orchestration Offering to Bring Agents to The Core of The Enterprise

Customers now have a single place to rapidly build, deploy, and orchestrate powerful enterprise agents with complete enterprise context, skills, and governance
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This