The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

How Economists Can Help Protect Personal Data
If you are about to hand over your private details in exchange for a store loyalty card, are you confident that your data remains in safe hands?
It can be difficult to predict if the supermarket manages your sensitive details securely and responsibly. The company may store them on vulnerable servers waiting for hackers to attack. Also, your data might ...

TikTok – Not a Shock?
The new app on the block; TikTok has been on our radar for a while; in a way that was questionable in terms of the value it provided, but even bigger concerns about the security and privacy side of it.

What’s up Doc?
So I am pretty bad at going to the doctor on time, yes I am one of those people who get the overdue notifications on the weekly.
I finally had enough courage to turn up to get my regular medication. Generally, when doctors release scripts it’s one of those situations where you put your script in your bag and run out.
When I needed to return back to ...

Women Needed in Cyber for Australia’s Economic Prosperity
Many of you in the cybersecurity industry already know about my dedication and passion to encourage more women to enter into and remain in the cybersecurity and broader tech sector. Having spoken around the world at numerous conferences, founded ISACA’s SheLeadsTech program, and participated in the United Nations Commission on the Status of Women in ...

Five Ways to Identify Phishing Emails
As phishing emails come in different shapes and formats, there is no silver bullet to identify a phishing email. However, there is a collection of red flags you should be looking for before clicking on a new message. Here is our up-to-date guide to help you recognise the latest email-based scams.
What is phishing? Phishing is a cyber-attack typically ...

Why multi-factor authentication on the PEXA platform leaves security concerns
We published an article yesterday explaining why we see problems with the newly-introduced multi-factor authentication security measure on the PEXA electronic conveyancing platform.
As a response to the growing number of conveyancing scams, such as the highly-publicised case involving the former MasterChef contestant, PEXA decided to introduce 2FA to ...

How Abandoned Domain Names Pose a Major Cyber Risk to Your Business
Iron Bastion’s cybersecurity expert Gabor Szathmari, recently published novel research on abandoned internet domains, and how they are a significant cyber risk which threatens businesses and in particular the Australian legal profession.
What is an Abandoned Domain Name?
A domain name is a name you can register to identify your business on the ...

The Alphabet of Electronic Conveyancing
ARNECC, ELN, ELNO, ECNL, PEXA...
A recent cyber-attack incident against a property settlement transaction processed through the PEXA network has raised concerns over the transition from the traditional paper-based settlement process to electronic conveyancing. A number of cyber security experts have expressed their concerns about the cyber security ...
In The News
Canberra College De-Risks Information Management And Strengthens Compliance With Castlepoint
Radford College introduces Castlepoint to create single view of sensitive data and PII, forming a baseline for its information management framework
Infoblox Exposes: Chinese Cybercrime Syndicate Linking European Football Sponsors, Human Trafficking and a Trillion-Dollar Illegal Gambling Economy
Infoblox has exposed Vigorish Viper, a Chinese cybercrime syndicate using sophisticated technology to take advantage of the AU$2.5 trillion illegal gambling economy, with links to money laundering and human trafficking operations across Southeast Asia.
Research reveals that Vigorish Viper has been central to the sponsorship controversy surrounding ...
Konica Minolta Australia Releases 2024 Australian IT Trends: Driving Digital Transformation Report, Revealing 68 Per Cent Of Australian Executives Prioritise Improving Operational Efficiencies
23 July, 2024 — Konica Minolta Australia has released its 2024 Australian IT trends: Driving digital transformation report, revealing valuable insights into the current trends, challenges, and opportunities in the Australian IT market.
Konica Minolta Australia and CoreData surveyed 200 IT decision-makers across Australia in April 2024, capturing ...
SolarWinds Receives Global Recognitions for Powerful IT Management Solutions and Industry Excellence
CRN, CSO, Fortress Cybersecurity Award, and others honoring SolarWinds products, solutions, and executives in first half of 2024
Revolver Rabbit’s Million-Dollar Masquerade: Infoblox Uncovers The Hidden World of RDGAs
Sydney, Australia, July 18, 2024 - Infoblox Threat Intel released a threat landscape study of the use of registered domain generation algorithms (RDGAs) by malicious actors today.
An RDGA differs from the traditional malware domain generation algorithm (DGA) in that all the domains are registered. Infoblox was the first to describe the technique ...
BlackBerry Introduces CylanceMDR Pro: Expansive Platform Ecosystem Powered by AI
Unified approach to predictive cyber-defense with simple pricing, increases visibility and boosts security posture, without changing existing software stack
Exabeam and LogRhythm Complete Merger and Announce New Company Details
The combined organisation will empower customers with a best-of-breed, AI-driven security operations platform fortified with high-integrity data ingestion
Imperva 2024 DDoS Threat Landscape Report: More Automation, Finserv Biggest Targets, Telco Attacks Rise 548 %, New Variants Spreading
Cybersecurity expert Imperva (now a Thales company) today released its 2024 DDoS Threat Landscape report which looks at DDoS attacks activity for the first half of 2024, showing that the volume and sophistication of DDoS attacks are on the rise.
According to the report, a major factor behind the increase is automation and easy access to DDoS tools ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..