The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

TikTok – Not a Shock?
The new app on the block; TikTok has been on our radar for a while; in a way that was questionable in terms of the value it provided, but even bigger concerns about the security and privacy side of it.

What’s up Doc?
So I am pretty bad at going to the doctor on time, yes I am one of those people who get the overdue notifications on the weekly.
I finally had enough courage to turn up to get my regular medication. Generally, when doctors release scripts it’s one of those situations where you put your script in your bag and run out.
When I needed to return back to ...

Women Needed in Cyber for Australia’s Economic Prosperity
Many of you in the cybersecurity industry already know about my dedication and passion to encourage more women to enter into and remain in the cybersecurity and broader tech sector. Having spoken around the world at numerous conferences, founded ISACA’s SheLeadsTech program, and participated in the United Nations Commission on the Status of Women in ...

Five Ways to Identify Phishing Emails
As phishing emails come in different shapes and formats, there is no silver bullet to identify a phishing email. However, there is a collection of red flags you should be looking for before clicking on a new message. Here is our up-to-date guide to help you recognise the latest email-based scams.
What is phishing? Phishing is a cyber-attack typically ...

Why multi-factor authentication on the PEXA platform leaves security concerns
We published an article yesterday explaining why we see problems with the newly-introduced multi-factor authentication security measure on the PEXA electronic conveyancing platform.
As a response to the growing number of conveyancing scams, such as the highly-publicised case involving the former MasterChef contestant, PEXA decided to introduce 2FA to ...

How Abandoned Domain Names Pose a Major Cyber Risk to Your Business
Iron Bastion’s cybersecurity expert Gabor Szathmari, recently published novel research on abandoned internet domains, and how they are a significant cyber risk which threatens businesses and in particular the Australian legal profession.
What is an Abandoned Domain Name?
A domain name is a name you can register to identify your business on the ...

The Alphabet of Electronic Conveyancing
ARNECC, ELN, ELNO, ECNL, PEXA...
A recent cyber-attack incident against a property settlement transaction processed through the PEXA network has raised concerns over the transition from the traditional paper-based settlement process to electronic conveyancing. A number of cyber security experts have expressed their concerns about the cyber security ...
Why You Need Professional Email Hosting for Your Business
Your business deserves a reliable, safe and secure email service provider so that you can focus on your clients and not have to worry about cyber attacks. Email is an essential service for every business. However, not all email service providers are created equal. Some email services are more susceptible to hacking and data loss than others. In this ...
No results found.
In The News
Popular OT/IoT Router Firmware Images Contain Outdated Software and Exploitable N-Day Vulnerabilities Affecting the Kernel
Forescout and Finite State today announced today the release of a new report, “Rough Around the Edges,” that analyses the state of software supply chain in OT/IoT routers, which are essential for connecting critical devices across various environments to the internet. The research revealed that OT and IoT cellular routers, and others used in small ...
ColorTokens Lands & Expands In APAC Region with New Hires
Microsegmentation company establishes strong presence in APAC with key appointments across ASEAN and ANZ, with growth and global commitment to breach readiness.

SentinelOne® Continues to Redefine End-to-End Security with Singularity™ Platform
Major new advancements delivered on secure-by-design, unified agent unleash power of industry-leading AI-security technology, turbocharging protection across every endpoint, identity and cloud workload
LAS VEGAS, NV - August 5, 2024 - SentinelOne (NYSE: S), a global leader in AI-powered security, today announced a series of groundbreaking ...
Arctic Wolf Expands Cyber JumpStart Portal Program to Help Business Leaders Fast-track Their Security Journey and Improve Insurability At No Cost
With the support of its global insurance community, Arctic Wolf opens Cyber JumpStart program directly to businesses to manage cyber risk and advance insurability and business resilience
Newgen Recognized in an Analyst Report on Task-Centric Automation Software Landscape
Newgen Software, a global provider of a unified low-code platform, announced that it has been acknowledged in Forrester's report, The Task-Centric Automation Software Landscape, Q3 2024, among notable vendors.

The National Vulnerability Database (NVD) Crisis: Defend Against Unpatched Vulnerabilities
Update on the National Vulnerability Database (NVD) Crisis and urgent need for virtual patching alternatives to cover the gap

Qualys Advances Enterprise TruRisk Platform to De-Risk Generative AI and LLM Usage from Security and Compliance Challenges
New solution, Qualys TotalAI, enables holistic discovery and vulnerability assessment of AI workloads to detect data leaks, injection issues and model theft
Qualys, Inc. (NASDAQ: QLYS), a leading provider of disruptive cloud-based IT, security and compliance solutions announced it is expanding its portfolio with Qualys TotalAI, designed to address ...
Rapid7 Launches the Command Platform, A Unified Attack Defense and Response Platform That Provides Better Visibility Across The Attack Surface
Rapid7 Command Platform provides a unified threat exposure, detection, and response platform so customers can integrate their critical security data to provide a unified view of vulnerabilities, exposures, and threats from endpoint to cloud to close security gaps and prevent attacks.
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..