The Voice of Cyberยฎ
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
Is Your Conveyancing Practice Secure From Hacking?
The recent media reports of fraud against conveyancing practices suggest that professionals should be taking measures for protecting their businesses from cyber attacks. Cybercriminals primarily rely on an email-based attack known as phishing to help commit payment redirection fraud. A recent Telstra Security Report found thatย the most common ...
Cheap Shots are taking Creep Shots of Women
Do you ever get that feeling thatโs someone is watching you, or you are being followed? It freaks me out. Now, how do you feel when some random person has taken a photo of you?
Well, sometimes you can never be too sure about what the case is. But, what happens when the creep shots take cheap shots? Yep, a whole new level we are heading to.
What is ...
Australian Companies Urged to Consider Pros and Cons of Paying a Ransom
The conversation is becoming more commonplace about whether companies should pay in a ransomware attack. Unfortunately, these crippling cyber-assaults are taking place too frequently across the globe, with targets and outcomes getting more consequential and more threatening for our workforce and communities.
Cyber-criminals and other nefarious actors ...
A Scam Which Preys on Vulnerable People (and Works!)
This phishing campaign is a prime example of how heartless cybercriminals prey on vulnerable people.
Our experts have been made aware of a new email extortion scheme targeting Australians. The email suggests that a backdoor has been installed on the victim's computer and the user was caught red-handed whileย pleasuringย him or herself. The scammers then ...
Email Impersonation Scams: What You or Your IT Staff Can Do to Protect Your Business
A major cyber threat to Australian businesses is email-based impersonation scams targeting key personnel. The scheme involves cybercriminals mimicking business owners and executives through the use of phishing emails. Criminals typically pose as personnel in positions of authority and ask victims to perform money transfers, pay invoices, or to send the ...
Businesses Require New Techniques to Combat Phishing
Theย Verizon 2018 Data Breach Investigations Reportย provides valuable insights into emerging phishing threats. CISOs, IT managers and cybersecurity consultants should be aware of new phishing techniques this report raises in order to better manage the associated risk they bring.
The most exciting finding in this year's report is the increased ...
Is the Cybersecurity of Your Business PEXA Ready?
You may have read about the highly publicised PEXA fraud which was reported whereby a Melbourne family was left homeless. As it transpired, the familyโs conveyancer had their email hijacked by a cybercriminal. This lead to the conveyancerโs PEXA account being compromised and ultimately the theft of $250,000 by the criminal misdirecting settlement ...
Cybersecurity Tips for Conveyancers and Solicitors using PEXA
You may have heard of the recent cybercrime perpetrated against the Australian e-conveyancing platform PEXA.ย A former MasterChef finalist and her family had $250,000 stolen from a property purchase transaction on the platform at settlement. In the following article, we explain the likely ways the fraud occurred and what practical things you can do ...
In The News
SecurityBridge Introduces Its Next-Generation Security Dashboard for SAP
New Dashboard Provides a Customized, At-A-Glance View of the Entire SAP Security Landscape
Superloop Achieves Accreditation for Prisma SASE From Palo Alto Networks
SYDNEY, Australia, 16 May 2024ย โ Palo Alto Networks, the global cybersecurity leader, announced today that Australian telecommunications provider, Superloop, has achieved Palo Alto Networksโ MSSP accreditation for Prisma SASE. This accreditation underscores Superloopโs proven expertise in delivering SD-WAN and Cloud Security Services.
To obtain this ...
Tesserent Advice on Managing and Enhancing Third-party Supplier Risks Following MediSecure Incident
"It's important for organisations to protect sensitive information, safeguard intellectual property, maintain supply chain integrity, ensure compliance with regulations, and mitigate operational risks.ย
Tenable Warns That Kinsing Malware Is Exploiting Apache Tomcat Servers With New Advanced Stealth Techniques
Kinsing malware has previously been seen targeting Linux-based cloud infrastructures, now hitting Apache Tomcat servers
Qualys Names New Managing Director for Australia And New Zealand
Qualys, the cybersecurity vulnerability management company, has recently appointed Sam Salehi to be the new Managing Director for Australia & New Zealand.
Previously, Salehi was a Sales Director in the Asia Pacific region at Trustwave, which fostered the commercial experience, relationships, and nuanced understanding of the region to take into ...
Github Offers Details On Internal Accessibility Programs; Amplifies Voices Of Disabled Devs
GitHub celebrates Global Accessibility Awareness Day by launching another instalment of the Coding Accessibility series and sharing how it scales accessibility within GitHub and beyond
Zscaler Unveils AI Innovations to Power the Industryโs Most Comprehensive Data Protection Platform
New Data Security Posture Management (DSPM), Inline email protection and Gen-AI security advancements safeguard data-in-motion and data-at-rest across all
exfiltration channels
Alteryx Unveils Industryโs First AI Assistant Designed to Empower Users to Seamlessly Build Analytical Workflows
Alteryx AiDIN Copilot designed to streamline analytics workflows with natural language AI to make it easier to onboard new users and drive decisions up to seven times faster across the enterprise
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..