The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Why Multi-factor Authentication on the PEXA Platform Leaves Security Concerns

Why Multi-factor Authentication on the PEXA Platform Leaves Security Concerns

We published an article yesterday explaining why we see problems with the newly-introduced multi-factor authentication security measure on the PEXA electronic conveyancing platform. As a response to the growing number of conveyancing scams, such as the highly-publicised case involving the former MasterChef contestant, PEXA decided to introduce 2FA to ...
How Abandoned Domain Names Pose a Major Cyber Risk to Your Business

How Abandoned Domain Names Pose a Major Cyber Risk to Your Business

Iron Bastion’s cybersecurity expert Gabor Szathmari, recently published novel research on abandoned internet domains, and how they are a significant cyber risk which threatens businesses and in particular the Australian legal profession. What Is an Abandoned Domain Name? A domain name is a name you can register to identify your business on the ...
The Alphabet of Electronic Conveyancing

The Alphabet of Electronic Conveyancing

ARNECC, ELN, ELNO, ECNL, PEXA... A recent cyber-attack incident against a property settlement transaction processed through the PEXA network has raised concerns over the transition from the traditional paper-based settlement process to electronic conveyancing. A number of cyber security experts have expressed their concerns about the cyber security ...

Why You Need Professional Email Hosting for Your Business

Your business deserves a reliable, safe and secure email service provider so that you can focus on your clients and not have to worry about cyber attacks. Email is an essential service for every business. However, not all email service providers are created equal. Some email services are more susceptible to hacking and data loss than others. In this ...
How to Prevent Payment Redirection Fraud at Your Conveyancing Practice

How to Prevent Payment Redirection Fraud at Your Conveyancing Practice

Enforcing Two-factor Authentication (2FA) on your email service is a robust security measure that can prevent payment redirection fraud. In the following article, we demonstrate how you can enable this powerful security feature on your corporate email accounts hosted on Office 365 or G Suite. By making this simple change, you can reduce the chances of ...

How to Protect Your Legal Practice From Payment Redirection Fraud

This article is aimed at helping legal professionals who commonly provide payment instructions for trust accounts and other transactions over email. Providing payment instructions over email puts you at risk of payment redirection fraud. In this article, you will learn why Australian legal professionals are high-value targets for cybercriminals and why ...
Is Your Conveyancing Practice Secure From Hacking?

Is Your Conveyancing Practice Secure From Hacking?

The recent media reports of fraud against conveyancing practices suggest that professionals should be taking measures for protecting their businesses from cyber attacks. Cybercriminals primarily rely on an email-based attack known as phishing to help commit payment redirection fraud. A recent Telstra Security Report found that the most common ...
Cheap Shots Are Taking Creep Shots of Women

Cheap Shots Are Taking Creep Shots of Women

Do you ever get that feeling that’s someone is watching you, or you are being followed? It freaks me out. Now, how do you feel when some random person has taken a photo of you? Well, sometimes you can never be too sure about what the case is. But, what happens when the creep shots take cheap shots? Yep, a whole new level we are heading to. What Is ...
No results found.

In the News

Latest DigiCert Survey Finds Manual Processes Expose Organisations to Outages, Compliance Failures, and Six-Figure Losses as Certificate Volumes Climb

Latest DigiCert Survey Finds Manual Processes Expose Organisations to Outages, Compliance Failures, and Six-Figure Losses as Certificate Volumes Climb

Research highlights certificate mismanagement is draining enterprise resources and eroding digital trust
Operational Technology Cybersecurity Risk Elevates Within Executive Leadership Ranks

Operational Technology Cybersecurity Risk Elevates Within Executive Leadership Ranks

More than half (52 per cent) of organisations report that the chief information security officer/chief security officer is responsible for operational technology, up from 16 per cent in 2022, while 95 per cent of organisations report that the C-suite is responsible for operational technology, up from 41 per cent in 2022 
Bitdefender Forges Partnership With Creators Guild of America

Bitdefender Forges Partnership With Creators Guild of America

Bitdefender has announced a strategic partnership with the Creators Guild of America to provide digital security solutions tailored for online content creators. The partnership aims to raise awareness of the critical need for creators to protect their digital identities, content, and personal information from increasingly sophisticated and costly cyber ...
Tenable Research Warns of Critical AI Tool Vulnerability That Requires Immediate Attention [CVE-2025-49596]

Tenable Research Warns of Critical AI Tool Vulnerability That Requires Immediate Attention [CVE-2025-49596]

Tenable Research has identified a critical remote code execution vulnerability (CVE-2025-49596) in Anthropic's widely adopted MCP Inspector, an open-source tool crucial for AI development. With a CVSS score of 9.4, this flaw leverages default, insecure configurations, leaving organisations exposed by design. MCP Inspector is a popular tool with over ...
S&P 500 Fetches DataDog

S&P 500 Fetches DataDog

NASDAQ-listed monitoring and security platform for cloud applications, Datadog, has announced its inclusion on the S&P 500 Index, effective prior to the opening of trading today. The S&P 500 is widely regarded as the best single gauge of large-cap U.S. equities, tracking the stock performance of 500 leading US companies. Datadog’s addition ...

AI-Generated Media Drives Real-World Fraud, Identity Theft, and Business Compromise

Trend Micro uncovers the criminal playbook for deepfake-enabled cybercrime
HID and ASSA ABLOY Recognised With Renowned Red Dot Award for Innovative Biometric eGate Design

HID and ASSA ABLOY Recognised With Renowned Red Dot Award for Innovative Biometric eGate Design

Combining an Aesthetically Appealing Design, Function and Innovation, the BG100 Speedgate Sets New Benchmark for Passenger Experience in Air Travel
State of Data Readiness – Report Suggests Large Gap Between Expectation and Reality

State of Data Readiness – Report Suggests Large Gap Between Expectation and Reality

A new report released by Commvault has revealed a significant gap between perceived and actual cyber readiness among Australian and New Zealand (ANZ) organisations—raising alarm bells for boards and business leaders across the region.
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This