The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
How to Protect Your Legal Practice From Payment Redirection Fraud
This article is aimed at helping legal professionals who commonly provide payment instructions for trust accounts and other transactions over email. Providing payment instructions over email puts you at risk of payment redirection fraud. In this article, you will learn why Australian legal professionals are high-value targets for cybercriminals and why ...

Is Your Conveyancing Practice Secure From Hacking?
The recent media reports of fraud against conveyancing practices suggest that professionals should be taking measures for protecting their businesses from cyber attacks. Cybercriminals primarily rely on an email-based attack known as phishing to help commit payment redirection fraud. A recent Telstra Security Report found that the most common ...

Cheap Shots Are Taking Creep Shots of Women
Do you ever get that feeling that’s someone is watching you, or you are being followed? It freaks me out. Now, how do you feel when some random person has taken a photo of you?
Well, sometimes you can never be too sure about what the case is. But, what happens when the creep shots take cheap shots? Yep, a whole new level we are heading to.
What Is ...

Australian Companies Urged to Consider Pros and Cons of Paying a Ransom
The conversation is becoming more commonplace about whether companies should pay in a ransomware attack. Unfortunately, these crippling cyber-assaults are taking place too frequently across the globe, with targets and outcomes getting more consequential and more threatening for our workforce and communities.
Cyber-criminals and other nefarious actors ...

A Scam Which Preys on Vulnerable People (and Works!)
This phishing campaign is a prime example of how heartless cybercriminals prey on vulnerable people.
Our experts have been made aware of a new email extortion scheme targeting Australians. The email suggests that a backdoor has been installed on the victim's computer and the user was caught red-handed while pleasuring him or herself. The scammers then ...
Email Impersonation Scams: What You or Your IT Staff Can Do to Protect Your Business
A major cyber threat to Australian businesses is email-based impersonation scams targeting key personnel. The scheme involves cybercriminals mimicking business owners and executives through the use of phishing emails. Criminals typically pose as personnel in positions of authority and ask victims to perform money transfers, pay invoices, or to send the ...
Businesses Require New Techniques to Combat Phishing
The Verizon 2018 Data Breach Investigations Report provides valuable insights into emerging phishing threats. CISOs, IT managers and cybersecurity consultants should be aware of new phishing techniques this report raises in order to better manage the associated risk they bring.
The most exciting finding in this year's report is the increased ...
Is the Cybersecurity of Your Business PEXA Ready?
You may have read about the highly publicised PEXA fraud which was reported whereby a Melbourne family was left homeless. As it transpired, the family’s conveyancer had their email hijacked by a cybercriminal. This lead to the conveyancer’s PEXA account being compromised and ultimately the theft of $250,000 by the criminal misdirecting settlement ...
No results found.
In the News
Securonix and Prophecy International Partner to Deliver Trusted Data Pipelines, Enhancing Security Analytics and Customer Confidence
Prophecy’s Snare Suite will enhance Securonix threat detection by delivering streamlined log management and high-fidelity telemetry
Fortinet Strengthens Code-to-Cloud Security With CNAPP Enhancements and Launches Expanded Solution Availability in AWS Marketplace
New Lacework FortiCNAPP innovations and expanded solution availability in AWS Marketplace accelerate full application life-cycle protection and threat detection and response
World Banking Leaders Warn of Increasing Sophistication of Criminal Money Laundering, BioCatch Reports
Nearly 80% of the 800 fraud-management, anti-money laundering (AML), and risk and compliance leaders surveyed in BioCatch’s first-ever Dark Economy Survey say criminal enterprises today are more sophisticated at laundering money than financial institutions (FIs) are at detecting that laundering. Equally concerning, 83% of respondents agree there exists ...
UiPath Showcases Next-Generation Enterprise-Grade Platform at Australian Agentic Automation Summit
Breaks down the barriers to enterprise AI adoption by enhancing security and compliance, improving accuracy and reliability, overcoming stalled pilot projects, and avoiding vendor lock-in
Tenable Report Warns Cloud Security Gaps Threaten Australian Businesses
9% of cloud storage resources contain sensitive data, while 54% of organisations have secrets embedded in workloads, exposing critical vulnerabilities
Bitdefender to Acquire Mesh Security, Expanding Its Email Security Capabilities
Bitdefender has announced it has agreed to acquire Mesh Security Limited (Mesh), a provider of advanced email security solutions. Through the acquisition, Mesh’s email security technology and capabilities will be integrated into Bitdefender’s extended detection and response (XDR) platform and managed detection and response (MDR) services.
The ...
Oracle Advances National Security With New Sovereign, Air-Gapped Cloud Offering
Oracle Compute Cloud@Customer Isolated manages classified workloads to support mission success
SentinelOne Teams With AWS to Bring Best in Class Cloud Security Protection to Customers Through the New AWS Security Hub
As an initial launch partner, SentinelOne and AWS gives security teams the data, visibility, and automation to protect their AWS environments from build time to run time
MOUNTAIN VIEW, Calif. — June 17, 2025 — SentinelOne® (NYSE: S), a global leader in AI-powered security, today announced that it is a launch partner for the new AWS Security Hub. The ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
- 340
- 341
- 342
- 343
- 344
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
