The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Five Ways to Identify Phishing Emails

Five Ways to Identify Phishing Emails

As phishing emails come in different shapes and formats, there is no silver bullet to identify a phishing email. However, there is a collection of red flags you should be looking for before clicking on a new message. Here is our up-to-date guide to help you recognise the latest email-based scams. What is phishing? Phishing is a cyber-attack typically ...
Why multi-factor authentication on the PEXA platform leaves security concerns

Why multi-factor authentication on the PEXA platform leaves security concerns

We published an article yesterday explaining why we see problems with the newly-introduced multi-factor authentication security measure on the PEXA electronic conveyancing platform. As a response to the growing number of conveyancing scams, such as the highly-publicised case involving the former MasterChef contestant, PEXA decided to introduce 2FA to ...
How Abandoned Domain Names Pose a Major Cyber Risk to Your Business

How Abandoned Domain Names Pose a Major Cyber Risk to Your Business

Iron Bastion’s cybersecurity expert Gabor Szathmari, recently published novel research on abandoned internet domains, and how they are a significant cyber risk which threatens businesses and in particular the Australian legal profession. What is an Abandoned Domain Name? A domain name is a name you can register to identify your business on the ...
The Alphabet of Electronic Conveyancing

The Alphabet of Electronic Conveyancing

ARNECC, ELN, ELNO, ECNL, PEXA... A recent cyber-attack incident against a property settlement transaction processed through the PEXA network has raised concerns over the transition from the traditional paper-based settlement process to electronic conveyancing. A number of cyber security experts have expressed their concerns about the cyber security ...

Why You Need Professional Email Hosting for Your Business

Your business deserves a reliable, safe and secure email service provider so that you can focus on your clients and not have to worry about cyber attacks. Email is an essential service for every business. However, not all email service providers are created equal. Some email services are more susceptible to hacking and data loss than others. In this ...

How To Prevent Payment Redirection Fraud At Your Conveyancing Practice

Enforcing Two-factor Authentication (2FA) on your email service is a robust security measure that can prevent payment redirection fraud. In the following article, we demonstrate how you can enable this powerful security feature on your corporate email accounts hosted on Office 365 or G Suite. By making this simple change, you can reduce the chances of ...

How to Protect Your Legal Practice from Payment Redirection Fraud

This article is aimed at helping legal professionals who commonly provide payment instructions for trust accounts and other transactions over email. Providing payment instructions over email puts you at risk of payment redirection fraud. In this article, you will learn why Australian legal professionals are high-value targets for cybercriminals and why ...
Is Your Conveyancing Practice Secure From Hacking?

Is Your Conveyancing Practice Secure From Hacking?

The recent media reports of fraud against conveyancing practices suggest that professionals should be taking measures for protecting their businesses from cyber attacks. Cybercriminals primarily rely on an email-based attack known as phishing to help commit payment redirection fraud. A recent Telstra Security Report found that the most common ...

In The News

Cequence Report Reveals Retail Fraud Up Nearly 700% as Cybercriminals Exploit Vulnerable Holiday Shopping Season

Cequence Report Reveals Retail Fraud Up Nearly 700% as Cybercriminals Exploit Vulnerable Holiday Shopping Season

Sydney, December 14, 2023— Cequence Security today released its “2023 Holiday Season API Security Report.” The report found that threat actors are evolving tactics, opting for a more nuanced approach that spreads attacks across a broader timeframe to blend in with legitimate traffic and evade detection ahead of peak holiday shopping times. Developed ...
Zscaler Unveils AI-Powered Analytics Across Cyber Risk, Digital Experience, SaaS Usage, and Workplace Trends 

Zscaler Unveils AI-Powered Analytics Across Cyber Risk, Digital Experience, SaaS Usage, and Workplace Trends 

AI-Powered Extensions Advance the Business Analytics Portfolio; New Business Insights Identifies Redundancies, Eliminates Wasteful Spending, and Optimises Location Usage for Maximum Efficiency and Performance 
Meet Fortinet Advisor, a Generative AI Assistant That Accelerates Threat Investigation and Remediation

Meet Fortinet Advisor, a Generative AI Assistant That Accelerates Threat Investigation and Remediation

Fortinet harnesses more than a decade of artificial intelligence (AI) innovation and deep threat expertise to empower customers with a cutting-edge generative AI tool that upskills cybersecurity teams
New Study Finds Australian Employees Most Likely to Violate Organisational Data Policies – Rubrik Zero Labs

New Study Finds Australian Employees Most Likely to Violate Organisational Data Policies – Rubrik Zero Labs

Rubrik Zero Labs Research reveals Australia’s casual culture is leading to data security blind spots
Plerion Becomes First Australian Headquartered Software Company To Achieve AWS Security Competency Status

Plerion Becomes First Australian Headquartered Software Company To Achieve AWS Security Competency Status

Aussie cybersecurity start-up Plerion doubles down on AWS in mission to simplify cloud security for customers and partners at home and across the globe. Plerion also joins the AWS ISV Accelerate Program and became AWS Security Hub Partner; plans to forge new collaborations with AWS consulting partners and managed security service providers (MSSPs) in 2024.
Lenovo’s New All-in-One, AI-Powered Solution with Microsoft Simplifies Security and Removes the Need for Multiple Vendors

Lenovo’s New All-in-One, AI-Powered Solution with Microsoft Simplifies Security and Removes the Need for Multiple Vendors

Cyber Resiliency as a Service leverages Lenovo expertise and Microsoft security solutions to help ensure business continuity by integrating greater visibility with cyber protection, detection, response, and recovery across digital estates and devices Lenovo delivers subscription-based security offerings that support regulatory compliance and align ...
GigaOm Recognises Check Point Software as a Leader in Inaugural Radar for Cloud Network Security Report

GigaOm Recognises Check Point Software as a Leader in Inaugural Radar for Cloud Network Security Report

Check Point CloudGuard Network Security is recognised for providing industry-leading advanced threat prevention for all public, private and hybrid cloud deployments
Time Is Money: Avoiding Extended Network Downtime Generated Over US$500,000 in Benefits including Productivity Gains

Time Is Money: Avoiding Extended Network Downtime Generated Over US$500,000 in Benefits including Productivity Gains

Infoblox-commissioned Total Economic Impact Study reveals how vulnerabilities in DNS are severely impacting enterprises’ bottom line

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This