The Voice of Cyberยฎ
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
Phishing Is the Top Reason Behind Australian Data Breaches
The latestย Notifiable Data Breaches Quarterly Statistics Reportย by theย Office of the Australian Information Commissioner (OAIC)ย confirms that half of the reported data breaches in July to September 2018 quarter are attributable to phishing.
According to the report, the top five sectors by data breach notifications in the last quarter were:
Health ...
How Economists Can Help Protect Personal Data
If you are about to hand over your private details in exchange for a store loyalty card, are you confident that your data remains in safe hands?
It can be difficult to predict if the supermarket manages your sensitive details securely and responsibly. The company may store them on vulnerable servers waiting for hackers to attack. Also, your data might ...
TikTok – Not a Shock?
The new app on the block; TikTok has been on our radar for a while; in a way that was questionable in terms of the value it provided, but even bigger concerns about the security and privacy side of it.
What’s up Doc?
So I am pretty bad at going to the doctor on time, yes I am one ofย those people who get the overdue notifications on the weekly.
I finally had enough courage to turn up to get my regular medication. Generally, when doctors release scripts itโs one of those situations where you put your script in your bag and run out.
When I needed to return back to ...
Women Needed in Cyber for Australiaโs Economic Prosperity
Many of you in the cybersecurity industry already know about my dedication and passion to encourage more women to enter into and remain in the cybersecurity and broader tech sector. Having spoken around the world at numerous conferences, founded ISACAโs SheLeadsTech program, and participated in the United Nations Commission on the Status of Women in ...
Five Ways to Identify Phishing Emails
As phishing emails come in different shapes and formats, there is no silver bullet to identify a phishing email. However, there is a collection of red flags you should be looking for before clicking on a new message. Here is our up-to-date guide to help you recognise the latest email-based scams.
What is phishing? Phishing is a cyber-attack typically ...
Why multi-factor authentication on the PEXA platform leaves security concerns
We published an article yesterday explaining why we seeย problems with the newly-introduced multi-factor authentication security measure on the PEXA electronic conveyancing platform.
As a response to the growing number of conveyancing scams, such as theย highly-publicised case involving the former MasterChef contestant, PEXA decided to introduce 2FA to ...
How Abandoned Domain Names Pose a Major Cyber Risk to Your Business
Iron Bastionโs cybersecurity expert Gabor Szathmari, recently published novelย research on abandoned internet domains, and how they are a significant cyber risk which threatens businesses and in particular the Australian legal profession.
What is an Abandoned Domain Name?
A domain name is a name you can register to identify your business on the ...
In The News
Check Point Software Unveils Research Revealing How Organisations Are Harnessing GenAI To Improve Cyber Security
Report shows the already widespread use of GenAI by security teams and how it is improving their efficiency and helping to bridge the skills gap
Forrester Names Palo Alto Networks a Leader In XDR
With Cortex XDR, Palo Alto Networks Is Recognised as a Leader in the 2024 Forrester Wave for Extended Detection and Response Platforms
Tenable to Acquire Eureka Security to Add Data Security Posture Management to its Cloud Security Platform
Unified CNAPP will provide comprehensive protection across infrastructure, workloads, identities and data for rapidly growing cloud security customer base
CrowdStrike Falcon for Insurability Fast Tracks Companies for Cyber Insurance Eligibility
CrowdStrike Falcon for Insurability Fast Tracks Companies for Cyber Insurance Eligibility
New program allows insurance carriers to provide companies with the best-in-class protection of the Falcon platform at preferred rates
Trustwave Unveils New Offerings To Maximise Value Of Microsoft Security Investments
June 6, 2024 โ Trustwave, a leading cybersecurity and managed security services provider, has announced an expanded portfolio of offerings designed to help organisations unlock the full potential of Microsoft Security under their Microsoft 365 enterprise plans, including E5 and G5.
Leveraging its deep expertise and enduring partnership with ...
OneAdvanced Completes The Integration Of Three Australian Software Companies As It Repositions The Company
A leading provider of sector-focused software,ย OneAdvanced,ย has marked a significant milestone by successfully integrating the three Australian software companies it acquired: Portt, Mitrefinch and Science Warehouse. This achievement will drive the company's growth and enhance the value it delivers to customers across multiple vertical sectors.
The ...
CyRC Vulnerability Advisory: CVE-2024-5184s Prompt Injection in EmailGPT Service
Researchers at Synopsys are warning EmailGPT users to remove the application from their networks immediately. The AI tool, that is developed to streamline your email management process with AI capabilities, is found containing prompt injection vulnerabilities that allows attacks to overwrite instructions, change the behaviour or the AI and exfiltrate ...
Keeper Security Shares Top Cyber Threats During the 2024 Paris Olympic Games
AUSTRALIA - June 6, 2024ย โ The 2024 Summer Olympic games are nearly upon us, and as millions of fans around the globe plan to watch or attend the international sporting event, organizers are preparing for unprecedented cybersecurity challenges. Hosted in Paris, and spread out across 16 other cities throughout France, the Olympics present significant ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..