The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Why You Need Professional Email Hosting for Your Business

Your business deserves a reliable, safe and secure email service provider so that you can focus on your clients and not have to worry about cyber attacks. Email is an essential service for every business. However, not all email service providers are created equal. Some email services are more susceptible to hacking and data loss than others. In this ...
How to Prevent Payment Redirection Fraud at Your Conveyancing Practice

How to Prevent Payment Redirection Fraud at Your Conveyancing Practice

Enforcing Two-factor Authentication (2FA) on your email service is a robust security measure that can prevent payment redirection fraud. In the following article, we demonstrate how you can enable this powerful security feature on your corporate email accounts hosted on Office 365 or G Suite. By making this simple change, you can reduce the chances of ...

How to Protect Your Legal Practice From Payment Redirection Fraud

This article is aimed at helping legal professionals who commonly provide payment instructions for trust accounts and other transactions over email. Providing payment instructions over email puts you at risk of payment redirection fraud. In this article, you will learn why Australian legal professionals are high-value targets for cybercriminals and why ...
Is Your Conveyancing Practice Secure From Hacking?

Is Your Conveyancing Practice Secure From Hacking?

The recent media reports of fraud against conveyancing practices suggest that professionals should be taking measures for protecting their businesses from cyber attacks. Cybercriminals primarily rely on an email-based attack known as phishing to help commit payment redirection fraud. A recent Telstra Security Report found that the most common ...
Cheap Shots Are Taking Creep Shots of Women

Cheap Shots Are Taking Creep Shots of Women

Do you ever get that feeling that’s someone is watching you, or you are being followed? It freaks me out. Now, how do you feel when some random person has taken a photo of you? Well, sometimes you can never be too sure about what the case is. But, what happens when the creep shots take cheap shots? Yep, a whole new level we are heading to. What Is ...
Australian Companies Urged to Consider Pros and Cons of Paying a Ransom

Australian Companies Urged to Consider Pros and Cons of Paying a Ransom

The conversation is becoming more commonplace about whether companies should pay in a ransomware attack. Unfortunately, these crippling cyber-assaults are taking place too frequently across the globe, with targets and outcomes getting more consequential and more threatening for our workforce and communities. Cyber-criminals and other nefarious actors ...
A Scam Which Preys on Vulnerable People (and Works!)

A Scam Which Preys on Vulnerable People (and Works!)

This phishing campaign is a prime example of how heartless cybercriminals prey on vulnerable people. Our experts have been made aware of a new email extortion scheme targeting Australians. The email suggests that a backdoor has been installed on the victim's computer and the user was caught red-handed while pleasuring him or herself. The scammers then ...

Email Impersonation Scams: What You or Your IT Staff Can Do to Protect Your Business

A major cyber threat to Australian businesses is email-based impersonation scams targeting key personnel. The scheme involves cybercriminals mimicking business owners and executives through the use of phishing emails. Criminals typically pose as personnel in positions of authority and ask victims to perform money transfers, pay invoices, or to send the ...
No results found.

In the News

Wavelink Signs Distribution Agreement With Penguin Solutions to Enhance Critical Infrastructure and Edge Computing Capabilities in Australia and New Zealand

Wavelink Signs Distribution Agreement With Penguin Solutions to Enhance Critical Infrastructure and Edge Computing Capabilities in Australia and New Zealand

July 15, 2025 – Wavelink, an Infinigate Group company and leader in technology distribution, services, and business development in Australia and New Zealand (ANZ), has signed a distribution agreement with Penguin Solutions, a global provider of high-availability computing and edge infrastructure solutions. This partnership expands Penguin Solutions’ ...
Trustwave Launches Managed Phishing for Microsoft Service to Strengthen Microsoft 365 Email Security

Trustwave Launches Managed Phishing for Microsoft Service to Strengthen Microsoft 365 Email Security

July 15, 2025 – Trustwave, a global cybersecurity and managed security services leader, has announced the launch of Managed Phishing for Microsoft, an advanced service designed to help organisations using Microsoft Office 365 and Defender for Office proactively defend against the evolving threat of phishing attacks. Phishing remains the most ...
Check Point Software Technologies Named a Leader in Zero Trust Platforms, Q3 2025 Evaluation

Check Point Software Technologies Named a Leader in Zero Trust Platforms, Q3 2025 Evaluation

Check Point’s Hybrid Mesh Security Platform recognised for plan to deliver AI-driven capabilities to automate network security functions
Kyndryl Partners With Microsoft to Launch the Kyndryl Microsoft Acceleration Hub to Drive Customer Innovation and Digital Transformation

Kyndryl Partners With Microsoft to Launch the Kyndryl Microsoft Acceleration Hub to Drive Customer Innovation and Digital Transformation

New Hub combines Kyndryl Consult expertise with Microsoft technologies to enable AI-first consulting capabilities and engagements
Semperis 2025 Purple Knight Report Reveals Persistent Security Gaps in Hybrid Active Directory and Entra ID Environments

Semperis 2025 Purple Knight Report Reveals Persistent Security Gaps in Hybrid Active Directory and Entra ID Environments

2025 Purple Knight Report Reveals Persistent Security Gaps in Hybrid Active Directory and Entra ID Environments The new report uncovers identity security risks, low initial assessment scores, and urgent need for remediation across Active Directory, Entra ID, and Okta—but substantial score improvements for users applying Purple Knight’s expert ...
Crypto Wallets Continue to Be Drained in Elaborate Social Media Scam

Crypto Wallets Continue to Be Drained in Elaborate Social Media Scam

Overview Continued research by Darktrace has revealed that cryptocurrency users are being targeted by threat actors in an elaborate social engineering scheme that continues to evolve. In December 2024, Cado Security Labs detailed a campaign targeting Web 3 employees in the Meeten campaign. The campaign included threat actors setting up meeting ...
Latest DigiCert Survey Finds Manual Processes Expose Organisations to Outages, Compliance Failures, and Six-Figure Losses as Certificate Volumes Climb

Latest DigiCert Survey Finds Manual Processes Expose Organisations to Outages, Compliance Failures, and Six-Figure Losses as Certificate Volumes Climb

Research highlights certificate mismanagement is draining enterprise resources and eroding digital trust
Operational Technology Cybersecurity Risk Elevates Within Executive Leadership Ranks

Operational Technology Cybersecurity Risk Elevates Within Executive Leadership Ranks

More than half (52 per cent) of organisations report that the chief information security officer/chief security officer is responsible for operational technology, up from 16 per cent in 2022, while 95 per cent of organisations report that the C-suite is responsible for operational technology, up from 41 per cent in 2022 
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This