The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Cheap Shots are taking Creep Shots of Women

Cheap Shots are taking Creep Shots of Women

Do you ever get that feeling that’s someone is watching you, or you are being followed? It freaks me out. Now, how do you feel when some random person has taken a photo of you? Well, sometimes you can never be too sure about what the case is. But, what happens when the creep shots take cheap shots? Yep, a whole new level we are heading to. What is ...
Australian Companies Urged to Consider Pros and Cons of Paying a Ransom

Australian Companies Urged to Consider Pros and Cons of Paying a Ransom

The conversation is becoming more commonplace about whether companies should pay in a ransomware attack. Unfortunately, these crippling cyber-assaults are taking place too frequently across the globe, with targets and outcomes getting more consequential and more threatening for our workforce and communities. Cyber-criminals and other nefarious actors ...
A Scam Which Preys on Vulnerable People (and Works!)

A Scam Which Preys on Vulnerable People (and Works!)

This phishing campaign is a prime example of how heartless cybercriminals prey on vulnerable people. Our experts have been made aware of a new email extortion scheme targeting Australians. The email suggests that a backdoor has been installed on the victim's computer and the user was caught red-handed while pleasuring him or herself. The scammers then ...

Email Impersonation Scams: What You or Your IT Staff Can Do to Protect Your Business

A major cyber threat to Australian businesses is email-based impersonation scams targeting key personnel. The scheme involves cybercriminals mimicking business owners and executives through the use of phishing emails. Criminals typically pose as personnel in positions of authority and ask victims to perform money transfers, pay invoices, or to send the ...

Businesses Require New Techniques to Combat Phishing

The Verizon 2018 Data Breach Investigations Report provides valuable insights into emerging phishing threats. CISOs, IT managers and cybersecurity consultants should be aware of new phishing techniques this report raises in order to better manage the associated risk they bring. The most exciting finding in this year's report is the increased ...
Is the Cybersecurity of Your Business PEXA Ready?

Is the Cybersecurity of Your Business PEXA Ready?

You may have read about the highly publicised PEXA fraud which was reported whereby a Melbourne family was left homeless. As it transpired, the family’s conveyancer had their email hijacked by a cybercriminal. This lead to the conveyancer’s PEXA account being compromised and ultimately the theft of $250,000 by the criminal misdirecting settlement ...
Cybersecurity Tips for Conveyancers and Solicitors using PEXA

Cybersecurity Tips for Conveyancers and Solicitors using PEXA

You may have heard of the recent cybercrime perpetrated against the Australian e-conveyancing platform PEXA. A former MasterChef finalist and her family had $250,000 stolen from a property purchase transaction on the platform at settlement. In the following article, we explain the likely ways the fraud occurred and what practical things you can do ...

How you can protect your Microsoft Exchange email service from cyber attacks

Microsoft Exchange is a popular choice for providing email services for businesses. Its email features and seamless integration with Microsoft Outlook are undoubtedly convenient and easy to use, but what about security? Microsoft Exchange runs exclusively on Windows Server, which in 2017 was affected by various critical vulnerabilities, putting ...

In The News

CJD Equipment uplifts cyber security and connectivity with Macquarie Telecom

CJD Equipment uplifts cyber security and connectivity with Macquarie Telecom

Macquarie Telecom today announced it has signed a deal with CJD Equipment, a leading Australian distributor of construction equipment and trucks to provide cyber security and networking services as the organisation moves to the cloud. Founded in 1974, CJD Equipment supplies Australia’s construction and mining sectors with excavators, wheel loaders, ...
Trustwave Spiderlabs Uncovers Critical Cybersecurity Vulnerabilities Exposing Manufacturers To Costly Attacks

Trustwave Spiderlabs Uncovers Critical Cybersecurity Vulnerabilities Exposing Manufacturers To Costly Attacks

December 07, 2023 – Trustwave, a leading cybersecurity and managed security services provider, has unveiled comprehensive research highlighting the distinct cybersecurity threats confronting manufacturers. The report, "2023 Manufacturing Threat Landscape: Trustwave Threat Intelligence Briefing and Mitigation Strategies," explores industry-specific ...
Proliferation of AI-driven Attacks Anticipated in 2024

Proliferation of AI-driven Attacks Anticipated in 2024

Trend Micro urges industry-led regulation and innovative defence strategies
WatchGuard Threat Lab Report Shows Rise in Threat Actors Exploiting Remote Access Software

WatchGuard Threat Lab Report Shows Rise in Threat Actors Exploiting Remote Access Software

Notable findings from the research also show an 89% increase in endpoint ransomware attacks and a decline in malware arriving over encrypted connections.
Teamviewer Integrates Lansweeper Technology Into Its Remote Monitoring And Management Offering

Teamviewer Integrates Lansweeper Technology Into Its Remote Monitoring And Management Offering

December 06, 2023 – TeamViewer, a leading global provider of remote connectivity and workplace digitalisation solutions, today announced the integration of Lansweeper’s technology for asset discovery and inventory into its remote monitoring and management (RMM) offering. This provides IT departments with a comprehensive, unified IT management solution ...
Pax8 Names Robb Reck Chief Trust and Security Officer

Pax8 Names Robb Reck Chief Trust and Security Officer

Sydney, Australia (December 6, 2023) – Pax8, the leading cloud commerce marketplace, today announced the appointment of Robb Reck as Chief Trust and Security Officer (CTSO). In his new role, Reck will ensure Pax8 maintains the trust of managed service providers (MSPs), vendors, and customers, by advancing the security measures of the Pax8 Marketplace. ...
BSIMM14 Report: Application Security Automation Soars

BSIMM14 Report: Application Security Automation Soars

Synopsys Software Integrity Group report highlights how customers embracing automation are improving security processes throughout the software life cycle.
 Australian And New Zealand Leads In GenAI-Related Security In Response To Significant Security Concerns

 Australian And New Zealand Leads In GenAI-Related Security In Response To Significant Security Concerns

· 97% of Australian and New Zealand organisations are using GenAI tools in some guise · 85% consider GenAI tools to be a potential security risk in Australian and New Zealand · 85% of Australian and New Zealand organisations have implemented GenAI related security measures · IT teams, not general employees, emerge as the overwhelming force behind ...

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This