The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Women Needed in Cyber for Australia’s Economic Prosperity

Women Needed in Cyber for Australia’s Economic Prosperity

Many of you in the cybersecurity industry already know about my dedication and passion to encourage more women to enter into and remain in the cybersecurity and broader tech sector. Having spoken around the world at numerous conferences, founded ISACA’s SheLeadsTech program, and participated in the United Nations Commission on the Status of Women in ...
Five Ways to Identify Phishing Emails

Five Ways to Identify Phishing Emails

As phishing emails come in different shapes and formats, there is no silver bullet to identify a phishing email. However, there is a collection of red flags you should be looking for before clicking on a new message. Here is our up-to-date guide to help you recognise the latest email-based scams. What is phishing? Phishing is a cyber-attack typically ...
Why multi-factor authentication on the PEXA platform leaves security concerns

Why multi-factor authentication on the PEXA platform leaves security concerns

We published an article yesterday explaining why we see problems with the newly-introduced multi-factor authentication security measure on the PEXA electronic conveyancing platform. As a response to the growing number of conveyancing scams, such as the highly-publicised case involving the former MasterChef contestant, PEXA decided to introduce 2FA to ...
How Abandoned Domain Names Pose a Major Cyber Risk to Your Business

How Abandoned Domain Names Pose a Major Cyber Risk to Your Business

Iron Bastion’s cybersecurity expert Gabor Szathmari, recently published novel research on abandoned internet domains, and how they are a significant cyber risk which threatens businesses and in particular the Australian legal profession. What is an Abandoned Domain Name? A domain name is a name you can register to identify your business on the ...
The Alphabet of Electronic Conveyancing

The Alphabet of Electronic Conveyancing

ARNECC, ELN, ELNO, ECNL, PEXA... A recent cyber-attack incident against a property settlement transaction processed through the PEXA network has raised concerns over the transition from the traditional paper-based settlement process to electronic conveyancing. A number of cyber security experts have expressed their concerns about the cyber security ...

Why You Need Professional Email Hosting for Your Business

Your business deserves a reliable, safe and secure email service provider so that you can focus on your clients and not have to worry about cyber attacks. Email is an essential service for every business. However, not all email service providers are created equal. Some email services are more susceptible to hacking and data loss than others. In this ...
How To Prevent Payment Redirection Fraud At Your Conveyancing Practice

How To Prevent Payment Redirection Fraud At Your Conveyancing Practice

Enforcing Two-factor Authentication (2FA) on your email service is a robust security measure that can prevent payment redirection fraud. In the following article, we demonstrate how you can enable this powerful security feature on your corporate email accounts hosted on Office 365 or G Suite. By making this simple change, you can reduce the chances of ...

How to Protect Your Legal Practice from Payment Redirection Fraud

This article is aimed at helping legal professionals who commonly provide payment instructions for trust accounts and other transactions over email. Providing payment instructions over email puts you at risk of payment redirection fraud. In this article, you will learn why Australian legal professionals are high-value targets for cybercriminals and why ...

In The News

Rapid7 Releases Attack Intelligence Report Examining High-Impact Attacks and Vulnerability Data Trends

Rapid7 Releases Attack Intelligence Report Examining High-Impact Attacks and Vulnerability Data Trends

Rapid7 has released its 2024 Attack Intelligence Report, which provides expert insights and guidance that security practitioners can use to better understand and anticipate modern cyber threats. The research underpinning the Attack Intelligence Report is based on more than 1,500 curated vulnerability and exploit data points; analysis of 180-plus ...
CyberArk Supercharges Identity Security Platform with CyberArk® CORATM AI

CyberArk Supercharges Identity Security Platform with CyberArk® CORATM AI

New AI capabilities translate vast numbers of identity-centric data points into actionable insights to make organisations more secure, efficient and effective. 
CyberArk Extends Identity Security Platform with New Capabilities for Securing Every User

CyberArk Extends Identity Security Platform with New Capabilities for Securing Every User

Enhancements across platform boost security, efficiency and customer experience
Arctic Wolf 2024 Trends Report Reveals 70% Of Businesses Targeted By Business Email Compromise (BEC) Attacks

Arctic Wolf 2024 Trends Report Reveals 70% Of Businesses Targeted By Business Email Compromise (BEC) Attacks

Majority of business leaders view ransomware as top concern as demands increase, accelerating cyber insurance adoption
Australian Businesses Are Betting On AI In The Face of Customer Churn

Australian Businesses Are Betting On AI In The Face of Customer Churn

Ninety-seven percent of Australian businesses are looking to AI for enhanced customer experience despite 95% still harbouring fears over the technology, Genesys research reveals.
Report: 99% Of Australian Organisations Had Two or More Identity-Related Breaches in the Past Year

Report: 99% Of Australian Organisations Had Two or More Identity-Related Breaches in the Past Year

Australia ranks second most breached nation surveyed for occurrences of credentials theft, 3rd party and supply chain breaches, as digital transformation shared as most likely cause of breach, ahead of geo-political/state actors 99% of Australian organisations expect negative impact from using AI powered tools on cybersecurity in the next year ...
Joe Levy Appointed CEO of Sophos

Joe Levy Appointed CEO of Sophos

Sophos has today announced that Joe Levy is now chief executive officer (CEO) of the company. Levy has been acting CEO since Feb. 15. To drive a critical role in the execution of his strategy to shape the future of Sophos, Levy has named Jim Dildine Sophos’ new chief financial officer (CFO) and a member of his senior management team. Levy is a ...
Critical Memory Corruption Vulnerability in Fluent Bit’s Built-in HTTP Server

Critical Memory Corruption Vulnerability in Fluent Bit’s Built-in HTTP Server

Tenable Research has discovered a critical memory corruption vulnerability in Fluent Bit’s built-in HTTP server that could potentially result in denial of service (DoS), information leakage, or remote code execution (RCE). The issue was reported to the project’s maintainers on April 30, 2024. Fixes were committed to the project’s main branch on May 15 ...

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This