The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Phishing Is the Top Reason Behind Australian Data Breaches

Phishing Is the Top Reason Behind Australian Data Breaches

The latest Notifiable Data Breaches Quarterly Statistics Report by the Office of the Australian Information Commissioner (OAIC) confirms that half of the reported data breaches in July to September 2018 quarter are attributable to phishing. According to the report, the top five sectors by data breach notifications in the last quarter were: Health ...
How Economists Can Help Protect Personal Data

How Economists Can Help Protect Personal Data

If you are about to hand over your private details in exchange for a store loyalty card, are you confident that your data remains in safe hands? It can be difficult to predict if the supermarket manages your sensitive details securely and responsibly. The company may store them on vulnerable servers waiting for hackers to attack. Also, your data might ...
TikTok – Not a Shock?

TikTok – Not a Shock?

The new app on the block; TikTok has been on our radar for a while; in a way that was questionable in terms of the value it provided, but even bigger concerns about the security and privacy side of it.
What’s up Doc?

What’s up Doc?

So I am pretty bad at going to the doctor on time, yes I am one of those people who get the overdue notifications on the weekly. I finally had enough courage to turn up to get my regular medication. Generally, when doctors release scripts it’s one of those situations where you put your script in your bag and run out. When I needed to return back to ...
Women Needed in Cyber for Australia’s Economic Prosperity

Women Needed in Cyber for Australia’s Economic Prosperity

Many of you in the cybersecurity industry already know about my dedication and passion to encourage more women to enter into and remain in the cybersecurity and broader tech sector. Having spoken around the world at numerous conferences, founded ISACA’s SheLeadsTech program, and participated in the United Nations Commission on the Status of Women in ...
Five Ways to Identify Phishing Emails

Five Ways to Identify Phishing Emails

As phishing emails come in different shapes and formats, there is no silver bullet to identify a phishing email. However, there is a collection of red flags you should be looking for before clicking on a new message. Here is our up-to-date guide to help you recognise the latest email-based scams. What is phishing? Phishing is a cyber-attack typically ...
Why multi-factor authentication on the PEXA platform leaves security concerns

Why multi-factor authentication on the PEXA platform leaves security concerns

We published an article yesterday explaining why we see problems with the newly-introduced multi-factor authentication security measure on the PEXA electronic conveyancing platform. As a response to the growing number of conveyancing scams, such as the highly-publicised case involving the former MasterChef contestant, PEXA decided to introduce 2FA to ...
How Abandoned Domain Names Pose a Major Cyber Risk to Your Business

How Abandoned Domain Names Pose a Major Cyber Risk to Your Business

Iron Bastion’s cybersecurity expert Gabor Szathmari, recently published novel research on abandoned internet domains, and how they are a significant cyber risk which threatens businesses and in particular the Australian legal profession. What is an Abandoned Domain Name? A domain name is a name you can register to identify your business on the ...
No results found.

In The News

A/NZ AI Anxiety Remains Despite Broad Recognition of Value: ManageEngine Study

A/NZ AI Anxiety Remains Despite Broad Recognition of Value: ManageEngine Study

Nearly two-thirds of respondents believe organisations cannot afford to ignore AI despite 57 per cent expressing some anxiety
Barracuda Researchers Reveal Two Emerging Email Threats Including Revamped ‘EvilProxy’ Phishing Kit

Barracuda Researchers Reveal Two Emerging Email Threats Including Revamped ‘EvilProxy’ Phishing Kit

Email Threat Radar – June 2025, During May, Barracuda threat analysts identified several notable email-based threats targeting organisations around the world and designed to evade detection and boost the chances of success, including: The EvilProxy phishing kit resurfacing with new attacks and tactics, such as: Spoofing the Upwork employment ...
Pax8 Launches Data and AI Guided Growth Program Designed to Empower MSPs with Cutting-edge AI Knowledge and Resources

Pax8 Launches Data and AI Guided Growth Program Designed to Empower MSPs with Cutting-edge AI Knowledge and Resources

SYDNEY, NSW (June 11, 2025) - Pax8, the leading cloud commerce Marketplace, has rolled out the next journey of its Guided Growth enablement framework, its newly curated Data and AI Guided Growth curriculum. The newest installment of the Pax8 innovative learning journey is designed to support managed service providers (MSPs) in overcoming AI adoption ...
Pax8 Introduces the Era of Managed Intelligence in its 2025 Research Report: The Agentic Inflection Point

Pax8 Introduces the Era of Managed Intelligence in its 2025 Research Report: The Agentic Inflection Point

SYDNEY, NSW (June 11, 2025) Pax8, the leading cloud commerce Marketplace, today released its inaugural research report, The Agentic Inflection Point: And the Rise of the Managed Intelligence Provider. The comprehensive study defines the future of small-to-midsized business (SMB) operations, transformed by agentic labor and the democratisation of ...
Tenable Patch Tuesday Commentary – June 2025

Tenable Patch Tuesday Commentary – June 2025

Microsoft addresses 65 CVEs in its June 2025 Patch Tuesday release, nine of which are critical and 56 of which are important. Tenable’s count omitted one vulnerability reported by CERT CC. Remote code execution (RCE) vulnerabilities accounted for 38.5% of the vulnerabilities patched this month, followed by information disclosure vulnerabilities at ...

KnowBe4 Wins Multiple 2025 Top Rated Awards From TrustRadius

KnowBe4 recognised as a leader in Security Awareness Training category for the sixth consecutive time, PhishER won in three categories and Compliance Plus won in two categories
Honeywell Unveils AI-Powered Building Management Solution

Honeywell Unveils AI-Powered Building Management Solution

Honeywell today announced the launch of Honeywell Connected Solutions, an AI-powered platform that integrates critical building software and technologies into a single interface to help enable more efficient operations. The platform's early adopters – Verizon Communications Inc. and Vanderbilt University – have already begun using the solution in their ...
Pax8 Announces Voyager Alliance Rewards

Pax8 Announces Voyager Alliance Rewards

SYDNEY, NSW (June 11, 2025) Pax8, the leading cloud commerce Marketplace, today announced Pax8 Voyager Alliance Rewards, an upcoming points-based rewards system that will include curated redemption opportunities and an exclusive partner dashboard to track points. Voyager Alliance Rewards will be structured based on partners’ Voyager Alliance tiers and ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This