The Voice of Cyberยฎ

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Is Your Conveyancing Practice Secure From Hacking?

Is Your Conveyancing Practice Secure From Hacking?

The recent media reports of fraud against conveyancing practices suggest that professionals should be taking measures for protecting their businesses from cyber attacks. Cybercriminals primarily rely on an email-based attack known as phishing to help commit payment redirection fraud. A recent Telstra Security Report found thatย the most common ...
Cheap Shots are taking Creep Shots of Women

Cheap Shots are taking Creep Shots of Women

Do you ever get that feeling thatโ€™s someone is watching you, or you are being followed? It freaks me out. Now, how do you feel when some random person has taken a photo of you? Well, sometimes you can never be too sure about what the case is. But, what happens when the creep shots take cheap shots? Yep, a whole new level we are heading to. What is ...
Australian Companies Urged to Consider Pros and Cons of Paying a Ransom

Australian Companies Urged to Consider Pros and Cons of Paying a Ransom

The conversation is becoming more commonplace about whether companies should pay in a ransomware attack. Unfortunately, these crippling cyber-assaults are taking place too frequently across the globe, with targets and outcomes getting more consequential and more threatening for our workforce and communities. Cyber-criminals and other nefarious actors ...
A Scam Which Preys on Vulnerable People (and Works!)

A Scam Which Preys on Vulnerable People (and Works!)

This phishing campaign is a prime example of how heartless cybercriminals prey on vulnerable people. Our experts have been made aware of a new email extortion scheme targeting Australians. The email suggests that a backdoor has been installed on the victim's computer and the user was caught red-handed whileย pleasuringย him or herself. The scammers then ...

Email Impersonation Scams: What You or Your IT Staff Can Do to Protect Your Business

A major cyber threat to Australian businesses is email-based impersonation scams targeting key personnel. The scheme involves cybercriminals mimicking business owners and executives through the use of phishing emails. Criminals typically pose as personnel in positions of authority and ask victims to perform money transfers, pay invoices, or to send the ...

Businesses Require New Techniques to Combat Phishing

Theย Verizon 2018 Data Breach Investigations Reportย provides valuable insights into emerging phishing threats. CISOs, IT managers and cybersecurity consultants should be aware of new phishing techniques this report raises in order to better manage the associated risk they bring. The most exciting finding in this year's report is the increased ...
Is the Cybersecurity of Your Business PEXA Ready?

Is the Cybersecurity of Your Business PEXA Ready?

You may have read about the highly publicised PEXA fraud which was reported whereby a Melbourne family was left homeless. As it transpired, the familyโ€™s conveyancer had their email hijacked by a cybercriminal. This lead to the conveyancerโ€™s PEXA account being compromised and ultimately the theft of $250,000 by the criminal misdirecting settlement ...
Cybersecurity Tips for Conveyancers and Solicitors using PEXA

Cybersecurity Tips for Conveyancers and Solicitors using PEXA

You may have heard of the recent cybercrime perpetrated against the Australian e-conveyancing platform PEXA.ย A former MasterChef finalist and her family had $250,000 stolen from a property purchase transaction on the platform at settlement. In the following article, we explain the likely ways the fraud occurred and what practical things you can do ...

In The News

Superloop Wins Expanded Multi-million-dollar Business Contract as Ixom Signs on to 2028

Superloop Wins Expanded Multi-million-dollar Business Contract as Ixom Signs on to 2028

Superloop designed, deployed and manages a high availability global network with best of breed enterprise security services for Ixom across more than locations 40. Superloop services are dual internet services connected to Palo Alto Networksโ€™ Prisma SD-WAN. The Superloop service is powered by Palo Alto Networksโ€™ Secure Access Service Edge (SASE) ...
Rapid7 Releases Attack Intelligence Report Examining High-Impact Attacks and Vulnerability Data Trends

Rapid7 Releases Attack Intelligence Report Examining High-Impact Attacks and Vulnerability Data Trends

Rapid7 has released its 2024 Attack Intelligence Report, which provides expert insights and guidance that security practitioners can use to better understand and anticipate modern cyber threats. The research underpinning the Attack Intelligence Report is based on more than 1,500 curated vulnerability and exploit data points; analysis of 180-plus ...
CyberArk Supercharges Identity Security Platform with CyberArkยฎ CORATM AI

CyberArk Supercharges Identity Security Platform with CyberArkยฎ CORATM AI

New AI capabilities translate vast numbers of identity-centric data points into actionable insights to make organisations more secure, efficient and effective.ย 
CyberArk Extends Identity Security Platform with New Capabilities for Securing Every User

CyberArk Extends Identity Security Platform with New Capabilities for Securing Every User

Enhancements across platform boost security, efficiency and customer experience
Arctic Wolf 2024 Trends Report Reveals 70% Of Businesses Targeted By Business Email Compromise (BEC) Attacks

Arctic Wolf 2024 Trends Report Reveals 70% Of Businesses Targeted By Business Email Compromise (BEC) Attacks

Majority of business leaders view ransomware as top concern as demands increase, accelerating cyber insurance adoption
Australian Businesses Are Betting On AI In The Face of Customer Churn

Australian Businesses Are Betting On AI In The Face of Customer Churn

Ninety-seven percent of Australian businesses are looking to AI for enhanced customer experience despite 95% still harbouring fears over the technology, Genesys research reveals.
Report: 99% Of Australian Organisations Had Two or More Identity-Related Breaches in the Past Year

Report: 99% Of Australian Organisations Had Two or More Identity-Related Breaches in the Past Year

Australia ranks second most breached nation surveyed for occurrences of credentials theft, 3rd party and supply chain breaches, as digital transformation shared as most likely cause of breach, ahead of geo-political/state actors 99% of Australian organisations expect negative impact from using AI powered tools on cybersecurity in the next year ...
Joe Levy Appointed CEO of Sophos

Joe Levy Appointed CEO of Sophos

Sophos hasย today announced that Joe Levy is now chief executive officer (CEO) of the company. Levy has been acting CEO since Feb. 15. To drive a critical role in the execution of his strategy to shape the future of Sophos, Levy has named Jim Dildine Sophosโ€™ new chief financial officer (CFO) and a member of his senior management team. Levy is a ...

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This