The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

The Alphabet of Electronic Conveyancing

The Alphabet of Electronic Conveyancing

ARNECC, ELN, ELNO, ECNL, PEXA... A recent cyber-attack incident against a property settlement transaction processed through the PEXA network has raised concerns over the transition from the traditional paper-based settlement process to electronic conveyancing. A number of cyber security experts have expressed their concerns about the cyber security ...

Why You Need Professional Email Hosting for Your Business

Your business deserves a reliable, safe and secure email service provider so that you can focus on your clients and not have to worry about cyber attacks. Email is an essential service for every business. However, not all email service providers are created equal. Some email services are more susceptible to hacking and data loss than others. In this ...

How To Prevent Payment Redirection Fraud At Your Conveyancing Practice

Enforcing Two-factor Authentication (2FA) on your email service is a robust security measure that can prevent payment redirection fraud. In the following article, we demonstrate how you can enable this powerful security feature on your corporate email accounts hosted on Office 365 or G Suite. By making this simple change, you can reduce the chances of ...

How to Protect Your Legal Practice from Payment Redirection Fraud

This article is aimed at helping legal professionals who commonly provide payment instructions for trust accounts and other transactions over email. Providing payment instructions over email puts you at risk of payment redirection fraud. In this article, you will learn why Australian legal professionals are high-value targets for cybercriminals and why ...
Is Your Conveyancing Practice Secure From Hacking?

Is Your Conveyancing Practice Secure From Hacking?

The recent media reports of fraud against conveyancing practices suggest that professionals should be taking measures for protecting their businesses from cyber attacks. Cybercriminals primarily rely on an email-based attack known as phishing to help commit payment redirection fraud. A recent Telstra Security Report found that the most common ...
Cheap Shots are taking Creep Shots of Women

Cheap Shots are taking Creep Shots of Women

Do you ever get that feeling that’s someone is watching you, or you are being followed? It freaks me out. Now, how do you feel when some random person has taken a photo of you? Well, sometimes you can never be too sure about what the case is. But, what happens when the creep shots take cheap shots? Yep, a whole new level we are heading to. What is ...
Australian Companies Urged to Consider Pros and Cons of Paying a Ransom

Australian Companies Urged to Consider Pros and Cons of Paying a Ransom

The conversation is becoming more commonplace about whether companies should pay in a ransomware attack. Unfortunately, these crippling cyber-assaults are taking place too frequently across the globe, with targets and outcomes getting more consequential and more threatening for our workforce and communities. Cyber-criminals and other nefarious actors ...
A Scam Which Preys on Vulnerable People (and Works!)

A Scam Which Preys on Vulnerable People (and Works!)

This phishing campaign is a prime example of how heartless cybercriminals prey on vulnerable people. Our experts have been made aware of a new email extortion scheme targeting Australians. The email suggests that a backdoor has been installed on the victim's computer and the user was caught red-handed while pleasuring him or herself. The scammers then ...

In The News

Verizon 2023 Data Breach Investigations Report: frequency and cost of social engineering attacks skyrocket

Verizon 2023 Data Breach Investigations Report: frequency and cost of social engineering attacks skyrocket

Human error continues to play a significant role in breaches across all industries
BeyondTrust Survey Finds 90% of Australian Enterprises Are Aligning Their Security Programs to the Essential Eight

BeyondTrust Survey Finds 90% of Australian Enterprises Are Aligning Their Security Programs to the Essential Eight

Just under half of organisations struggling to learn the lessons of recent high profile cybersecurity attacks.
The anatomy of Illuminati scams: We spoke to the grand masters so you don’t have to

The anatomy of Illuminati scams: We spoke to the grand masters so you don’t have to

Bitdefender Antispam Lab researchers alerted users to an ongoing scam campaign involving so-called ‘Illuminati cabals’ inciting credulous individuals to join their world-controlling organisation – all in return for riches and a lavish lifestyle.
ExtraHop® Recognised with a Customers’ Choice Distinction in Gartner Peer Insights™ Voice of the Customer for Network Detection and Response

ExtraHop® Recognised with a Customers’ Choice Distinction in Gartner Peer Insights™ Voice of the Customer for Network Detection and Response

ExtraHop recognised as one of the highly rated providers of NDR solutions for customers looking to modernise security operations
Pax8 and CrowdStrike Announce Strategic Partnership to Revolutionise Cybersecurity for Managed Service Providers in the  IT Channel

Pax8 and CrowdStrike Announce Strategic Partnership to Revolutionise Cybersecurity for Managed Service Providers in the IT Channel

 Pax8, the leading cloud commerce marketplace and CrowdStrike (Nasdaq: CRWD), a leader in cloud-delivered protection of endpoints, cloud workloads, identity and data have announced a strategic partnership. The new alliance will give Managed Service Providers (MSPs) access to bundled product offerings of the CrowdStrike Falcon platform, available ...
Cipherpoint Subsidiary Excite IT Signs SOCaaS Agreement with Trend Micro

Cipherpoint Subsidiary Excite IT Signs SOCaaS Agreement with Trend Micro

Cipherpoint Limited [ASX: CPT] (the Company) has announced that Excite IT Pty Ltd, its recently acquired wholly owned subsidiary, has entered into an agreement with Trend Micro Australia Pty Ltd to provide security operations services to support Trend’s managed detection and response service in Australia.
MINTERELLISON CONSULTING expands cyber security practice

MINTERELLISON CONSULTING expands cyber security practice

MinterEllison Consulting, the consulting business of MinterEllison, is pleased to announce the addition of four experienced consultants to its national cyber security practice.
Palo Alto Networks and Ingram Micro Australia and New Zealand join forces to bring cutting-edge cybersecurity solutions to businesses

Palo Alto Networks and Ingram Micro Australia and New Zealand join forces to bring cutting-edge cybersecurity solutions to businesses

Palo Alto Networks (NASDAQ: PANW), the global cybersecurity leader, has announced a strategic distribution agreement with Ingram Micro. With heightened demand for cybersecurity solutions across Australia and New Zealand, the agreement will add the full range of Palo Alto Networks solutions, including Prisma Access, Prisma Cloud and Cortex security ...

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governements, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This