The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Is Your Conveyancing Practice Secure From Hacking?

Is Your Conveyancing Practice Secure From Hacking?

The recent media reports of fraud against conveyancing practices suggest that professionals should be taking measures for protecting their businesses from cyber attacks. Cybercriminals primarily rely on an email-based attack known as phishing to help commit payment redirection fraud. A recent Telstra Security Report found that the most common ...
Cheap Shots are taking Creep Shots of Women

Cheap Shots are taking Creep Shots of Women

Do you ever get that feeling that’s someone is watching you, or you are being followed? It freaks me out. Now, how do you feel when some random person has taken a photo of you? Well, sometimes you can never be too sure about what the case is. But, what happens when the creep shots take cheap shots? Yep, a whole new level we are heading to. What is ...
Australian Companies Urged to Consider Pros and Cons of Paying a Ransom

Australian Companies Urged to Consider Pros and Cons of Paying a Ransom

The conversation is becoming more commonplace about whether companies should pay in a ransomware attack. Unfortunately, these crippling cyber-assaults are taking place too frequently across the globe, with targets and outcomes getting more consequential and more threatening for our workforce and communities. Cyber-criminals and other nefarious actors ...
A Scam Which Preys on Vulnerable People (and Works!)

A Scam Which Preys on Vulnerable People (and Works!)

This phishing campaign is a prime example of how heartless cybercriminals prey on vulnerable people. Our experts have been made aware of a new email extortion scheme targeting Australians. The email suggests that a backdoor has been installed on the victim's computer and the user was caught red-handed while pleasuring him or herself. The scammers then ...

Email Impersonation Scams: What You or Your IT Staff Can Do to Protect Your Business

A major cyber threat to Australian businesses is email-based impersonation scams targeting key personnel. The scheme involves cybercriminals mimicking business owners and executives through the use of phishing emails. Criminals typically pose as personnel in positions of authority and ask victims to perform money transfers, pay invoices, or to send the ...

Businesses Require New Techniques to Combat Phishing

The Verizon 2018 Data Breach Investigations Report provides valuable insights into emerging phishing threats. CISOs, IT managers and cybersecurity consultants should be aware of new phishing techniques this report raises in order to better manage the associated risk they bring. The most exciting finding in this year's report is the increased ...
Is the Cybersecurity of Your Business PEXA Ready?

Is the Cybersecurity of Your Business PEXA Ready?

You may have read about the highly publicised PEXA fraud which was reported whereby a Melbourne family was left homeless. As it transpired, the family’s conveyancer had their email hijacked by a cybercriminal. This lead to the conveyancer’s PEXA account being compromised and ultimately the theft of $250,000 by the criminal misdirecting settlement ...
Cybersecurity Tips for Conveyancers and Solicitors using PEXA

Cybersecurity Tips for Conveyancers and Solicitors using PEXA

You may have heard of the recent cybercrime perpetrated against the Australian e-conveyancing platform PEXA. A former MasterChef finalist and her family had $250,000 stolen from a property purchase transaction on the platform at settlement. In the following article, we explain the likely ways the fraud occurred and what practical things you can do ...

In The News

Extreme Networks Introduces New Cloud-Managed Universal Wi-Fi 7 Access Point, Industry’s Easiest to Deploy/Provision Switches

Extreme Networks Introduces New Cloud-Managed Universal Wi-Fi 7 Access Point, Industry’s Easiest to Deploy/Provision Switches

Extreme Networks has announced two new solutions designed to help highly distributed enterprise organisations create improved network connectivity, security and application performance: the AP5020, Extreme’s first Wi-Fi 7 access point, and the 4000 Series cloud-managed switches.
SolarWinds Names Brian Goldfarb Chief Marketing Officer

SolarWinds Names Brian Goldfarb Chief Marketing Officer

Former Marketing Executive at Tenable, Splunk, and Google to Oversee Global Marketing Efforts of World-Class Observability, Database, and Service Management Solution Provider
Aquion And Trustwave Announce Strategic Partnership To Boost Cybersecurity In Australia And New Zealand

Aquion And Trustwave Announce Strategic Partnership To Boost Cybersecurity In Australia And New Zealand

Sydney, Australia  - Jan 30, 2024 - Aquion, a specialist in value-added software distribution, proudly announces its strategic partnership with global managed cybersecurity leader Trustwave. This collaboration aims to enhance cybersecurity in Australia and New Zealand, leveraging Trustwave's advanced technologies. Stephen Balicki, CEO and Founder of ...
Orange Cyberdefense Expands Partnership with Qualys, Strengthening Managed Cybersecurity Portfolio to Deliver an End-to-End Vulnerability Intelligence Service

Orange Cyberdefense Expands Partnership with Qualys, Strengthening Managed Cybersecurity Portfolio to Deliver an End-to-End Vulnerability Intelligence Service

Qualys VMDR with TruRisk enables Orange Cyberdefense managed service customers to de-risk their business
Atturra Partners With MyCISO To Launch Managed Security Program Service

Atturra Partners With MyCISO To Launch Managed Security Program Service

Atturra has launched a strategic partnership with Australian SaaS start-up, MyCISO, to underpin its managed service for security program management in the education and commercial sectors.
ExtraHop Expands CrowdStrike Falcon LogScale Integration

ExtraHop Expands CrowdStrike Falcon LogScale Integration

ExtraHop customers can now store records in LogScale, enabling greater flexibility and streamlining network data analysis
Orro Partners with SentinelOne® to Deliver Cyber Resilience

Orro Partners with SentinelOne® to Deliver Cyber Resilience

Orro to host Singularity XDR in Australia, providing sovereign data capabilities to help small and medium sized businesses drive regulatory compliance.
Genetec Shares Best Practices on Data Privacy Day 2024

Genetec Shares Best Practices on Data Privacy Day 2024

SYDNEY AUSTRALIA, January 29, 2024—In support of International Data Privacy Day, Genetec Inc. (“Genetec”), a leading technology provider of unified security, public safety, operations, and business intelligence solutions, shares data protection best practices to help physical security leaders in Australia and New Zealand protect privacy, safeguard ...

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This