The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

The Alphabet of Electronic Conveyancing

The Alphabet of Electronic Conveyancing

ARNECC, ELN, ELNO, ECNL, PEXA... A recent cyber-attack incident against a property settlement transaction processed through the PEXA network has raised concerns over the transition from the traditional paper-based settlement process to electronic conveyancing. A number of cyber security experts have expressed their concerns about the cyber security ...

Why You Need Professional Email Hosting for Your Business

Your business deserves a reliable, safe and secure email service provider so that you can focus on your clients and not have to worry about cyber attacks. Email is an essential service for every business. However, not all email service providers are created equal. Some email services are more susceptible to hacking and data loss than others. In this ...
How To Prevent Payment Redirection Fraud At Your Conveyancing Practice

How To Prevent Payment Redirection Fraud At Your Conveyancing Practice

Enforcing Two-factor Authentication (2FA) on your email service is a robust security measure that can prevent payment redirection fraud. In the following article, we demonstrate how you can enable this powerful security feature on your corporate email accounts hosted on Office 365 or G Suite. By making this simple change, you can reduce the chances of ...

How to Protect Your Legal Practice from Payment Redirection Fraud

This article is aimed at helping legal professionals who commonly provide payment instructions for trust accounts and other transactions over email. Providing payment instructions over email puts you at risk of payment redirection fraud. In this article, you will learn why Australian legal professionals are high-value targets for cybercriminals and why ...
Is Your Conveyancing Practice Secure From Hacking?

Is Your Conveyancing Practice Secure From Hacking?

The recent media reports of fraud against conveyancing practices suggest that professionals should be taking measures for protecting their businesses from cyber attacks. Cybercriminals primarily rely on an email-based attack known as phishing to help commit payment redirection fraud. A recent Telstra Security Report found that the most common ...
Cheap Shots are taking Creep Shots of Women

Cheap Shots are taking Creep Shots of Women

Do you ever get that feeling that’s someone is watching you, or you are being followed? It freaks me out. Now, how do you feel when some random person has taken a photo of you? Well, sometimes you can never be too sure about what the case is. But, what happens when the creep shots take cheap shots? Yep, a whole new level we are heading to. What is ...
Australian Companies Urged to Consider Pros and Cons of Paying a Ransom

Australian Companies Urged to Consider Pros and Cons of Paying a Ransom

The conversation is becoming more commonplace about whether companies should pay in a ransomware attack. Unfortunately, these crippling cyber-assaults are taking place too frequently across the globe, with targets and outcomes getting more consequential and more threatening for our workforce and communities. Cyber-criminals and other nefarious actors ...
A Scam Which Preys on Vulnerable People (and Works!)

A Scam Which Preys on Vulnerable People (and Works!)

This phishing campaign is a prime example of how heartless cybercriminals prey on vulnerable people. Our experts have been made aware of a new email extortion scheme targeting Australians. The email suggests that a backdoor has been installed on the victim's computer and the user was caught red-handed while pleasuring him or herself. The scammers then ...
No results found.

In The News

JFrog and GitHub Expand Partnership, Deliver Single Pane of Glass for Security and Copilot Chat to Empower Developers

JFrog and GitHub Expand Partnership, Deliver Single Pane of Glass for Security and Copilot Chat to Empower Developers

JFrog Ltd.  (“JFrog”) (Nasdaq: FROG), the Liquid Software company and creators of the JFrog Software Supply Chain Platform, and GitHub, the world’s leading code development platform, today unveiled new integrations at JFrog’s annual user conference. The deepening collaboration provides developers with a consolidated view of project status and security ...
ColorTokens Acquires PureID to Strengthen Xshield Microsegmentation Platform with Powerful Identity-Based Segmentation

ColorTokens Acquires PureID to Strengthen Xshield Microsegmentation Platform with Powerful Identity-Based Segmentation

SAN JOSE, Calif., September 11, 2024 – ColorTokens Inc., the leading global enterprise microsegmentation company, announced today that it has acquired PureID, an innovative startup providing secure identity and access management. This acquisition will significantly strengthen ColorTokens’ microsegmentation capabilities by integrating robust identity ...
Armis Appoints Christina Kemper to Vice President of International

Armis Appoints Christina Kemper to Vice President of International

Armis, the asset intelligence cybersecurity company, today announced the appointment of Christina Kemper to VP of International. In her role, Kemper will accelerate international sales growth and expand Armis’ global presence forging strategic partnerships with organisations across EMEA and Asia Pacific to help businesses manage their cyber risk ...
BeyondTrust Named a Leader in 2024 Gartner® Magic Quadrant™ for Privileged Access Management

BeyondTrust Named a Leader in 2024 Gartner® Magic Quadrant™ for Privileged Access Management

For the sixth consecutive year, BeyondTrust is named a Leader in the Gartner® Magic Quadrant™ for Privileged Access Management (PAM) BeyondTrust’s  ‘Ability to Execute’ and ‘Completeness of Vision’ are the reasons why it was named a Gartner Magic Quadrant™ Leader Being recognised as a Leader in PAM and ITDR, we believe, BeyondTrust is uniquely poised ...
Genetec Expands Security Center SaaS With The Launch of Operations Center, The Industry’s First Work Management Solution For Physical Security Operations

Genetec Expands Security Center SaaS With The Launch of Operations Center, The Industry’s First Work Management Solution For Physical Security Operations

MONTRÉAL, September 11, 2024 — Genetec Inc. (“Genetec”), a leading technology provider of unified security, public safety, operations, and business intelligence solutions, today announced the launch of Operations Center, a cloud-based work management solution designed specifically for physical security operations. Available as part of Security Center ...
JFrog Unveils First Runtime Security Solution to Deliver Complete Software Integrity and Lineage from Code to Cloud

JFrog Unveils First Runtime Security Solution to Deliver Complete Software Integrity and Lineage from Code to Cloud

Complete software lifecycle security enables organisations to simultaneously shift left  & right, helping developers save time with quick threat detection and risk remediation 
JFrog Collaborates with NVIDIA to Deliver Secure AI Models With NVIDIA NIM

JFrog Collaborates with NVIDIA to Deliver Secure AI Models With NVIDIA NIM

Aiming to meet the increasing demand for enterprise-ready generative AI, the JFrog Platform integrates NVIDIA NIM to deliver GPU-optimised AI model services 
Check Point Software Named a Leader in GigaOm Radar for Security Policy as Code

Check Point Software Named a Leader in GigaOm Radar for Security Policy as Code

Built for the Modern CISO, Check Point's CloudGuard is recognised for delivering a cohesive approach to protecting cloud infrastructures, from code to cloud
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This