The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Phishing Is the Top Reason Behind Australian Data Breaches
The latest Notifiable Data Breaches Quarterly Statistics Report by the Office of the Australian Information Commissioner (OAIC) confirms that half of the reported data breaches in July to September 2018 quarter are attributable to phishing.
According to the report, the top five sectors by data breach notifications in the last quarter were:
Health ...

How Economists Can Help Protect Personal Data
If you are about to hand over your private details in exchange for a store loyalty card, are you confident that your data remains in safe hands?
It can be difficult to predict if the supermarket manages your sensitive details securely and responsibly. The company may store them on vulnerable servers waiting for hackers to attack. Also, your data might ...

TikTok – Not a Shock?
The new app on the block; TikTok has been on our radar for a while; in a way that was questionable in terms of the value it provided, but even bigger concerns about the security and privacy side of it.

What’s up Doc?
So I am pretty bad at going to the doctor on time, yes I am one of those people who get the overdue notifications on the weekly.
I finally had enough courage to turn up to get my regular medication. Generally, when doctors release scripts it’s one of those situations where you put your script in your bag and run out.
When I needed to return back to ...

Women Needed in Cyber for Australia’s Economic Prosperity
Many of you in the cybersecurity industry already know about my dedication and passion to encourage more women to enter into and remain in the cybersecurity and broader tech sector. Having spoken around the world at numerous conferences, founded ISACA’s SheLeadsTech program, and participated in the United Nations Commission on the Status of Women in ...

Five Ways to Identify Phishing Emails
As phishing emails come in different shapes and formats, there is no silver bullet to identify a phishing email. However, there is a collection of red flags you should be looking for before clicking on a new message. Here is our up-to-date guide to help you recognise the latest email-based scams.
What is phishing? Phishing is a cyber-attack typically ...

Why Multi-factor Authentication on the PEXA Platform Leaves Security Concerns
We published an article yesterday explaining why we see problems with the newly-introduced multi-factor authentication security measure on the PEXA electronic conveyancing platform.
As a response to the growing number of conveyancing scams, such as the highly-publicised case involving the former MasterChef contestant, PEXA decided to introduce 2FA to ...

How Abandoned Domain Names Pose a Major Cyber Risk to Your Business
Iron Bastion’s cybersecurity expert Gabor Szathmari, recently published novel research on abandoned internet domains, and how they are a significant cyber risk which threatens businesses and in particular the Australian legal profession.
What Is an Abandoned Domain Name?
A domain name is a name you can register to identify your business on the ...
No results found.
In the News
News: 75% of Building Management Systems Contain Known Exploited Vulnerabilities and 51% Are Insecurely Connected to the Internet
New Research from Claroty's Team82 Reveals Riskiest Building Management System Exposures
Presence of KEVs, KEVs Linked to Ransomware, and Insecure Internet Exposure Found to be Pervasive Among BMS, BAS According to New Report
SYDNEY—June 26, 2025—Claroty, the cyber-physical systems (CPS) protection company, today announced new research on the ...
DataDog Reinforces APJ Presence Through Senior Leadership Expansion
Industry veteran Adrian Towsey to further drive company’s regional expansion as rising technology spend heightens demand for observability, security and generative AI
Barracuda Launches Managed Vulnerability Security That Extends the BarracudaONE Platform
Sydney, Australia – 26 June, 2025 — Barracuda Networks, Inc., a leading cybersecurity company providing complete protection against complex threats for all sized businesses, today announced the launch of Barracuda Managed Vulnerability Security. This fully managed service, powered by Barracuda’s global Security Operations Centre (SOC), extends the ...
Bitdefender Launches Powerful External Attack Surface Management Solution for Businesses and Managed Service Providers
Bitdefender today announced Bitdefender GravityZone External Attack Surface Management (EASM), a new solution that gives businesses, managed service providers (MSPs) and their customers comprehensive visibility into their internet-facing assets and associated vulnerabilities. GravityZone EASM dramatically reduces threat exposure and strengthens ...
$61.6m European Military Contract
DroneShield Limited (ASX: DRO) has received a package of three standalone follow-on contracts for $61.6 million from its privately owned in-country European reseller that is contractually required to distribute the products to a European military customer. The contracts are for handheld detection and counterdrone systems and associated accessories. ...
ManageEngine Launches MSP Central: A Platform Built for Strengthening Modern MSP Infrastructure
Built in-house, MSP Central enables MSPs to centralise service workflows, device control, threat protection, and performance monitoring in a single platform
Manage clients securely with integrated RMM, PSA, and advanced server monitoring on a multi-tenant, role-based platform
Boost technician productivity with AI-driven ticket insights, ...
Global Cybersecurity Professionals Cite Top Threats, Concerns, and Challenges in New Bitdefender Report
Bitdefender has released the 2025 Cybersecurity Assessment Report, an annual report based on an independent survey and analysis of cybersecurity professionals revealing the most urgent concerns, key challenges, and threat perceptions shaping enterprise security.
The report is based on an independent survey and analysis of over 1,200 IT and security ...
Nearly Half of Australian Companies Opt to Pay the Ransom, Sophos Report Finds
Australian median ransom demand is US$217,000; yet 52% of Australian companies negotiated a lower amount than the initial demand
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
- 340
- 341
- 342
- 343
- 344
- 345
- 346
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
