The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

How Abandoned Domain Names Pose a Major Cyber Risk to Your Business

How Abandoned Domain Names Pose a Major Cyber Risk to Your Business

Iron Bastion’s cybersecurity expert Gabor Szathmari, recently published novel research on abandoned internet domains, and how they are a significant cyber risk which threatens businesses and in particular the Australian legal profession. What is an Abandoned Domain Name? A domain name is a name you can register to identify your business on the ...
The Alphabet of Electronic Conveyancing

The Alphabet of Electronic Conveyancing

ARNECC, ELN, ELNO, ECNL, PEXA... A recent cyber-attack incident against a property settlement transaction processed through the PEXA network has raised concerns over the transition from the traditional paper-based settlement process to electronic conveyancing. A number of cyber security experts have expressed their concerns about the cyber security ...

Why You Need Professional Email Hosting for Your Business

Your business deserves a reliable, safe and secure email service provider so that you can focus on your clients and not have to worry about cyber attacks. Email is an essential service for every business. However, not all email service providers are created equal. Some email services are more susceptible to hacking and data loss than others. In this ...
How To Prevent Payment Redirection Fraud At Your Conveyancing Practice

How To Prevent Payment Redirection Fraud At Your Conveyancing Practice

Enforcing Two-factor Authentication (2FA) on your email service is a robust security measure that can prevent payment redirection fraud. In the following article, we demonstrate how you can enable this powerful security feature on your corporate email accounts hosted on Office 365 or G Suite. By making this simple change, you can reduce the chances of ...

How to Protect Your Legal Practice from Payment Redirection Fraud

This article is aimed at helping legal professionals who commonly provide payment instructions for trust accounts and other transactions over email. Providing payment instructions over email puts you at risk of payment redirection fraud. In this article, you will learn why Australian legal professionals are high-value targets for cybercriminals and why ...
Is Your Conveyancing Practice Secure From Hacking?

Is Your Conveyancing Practice Secure From Hacking?

The recent media reports of fraud against conveyancing practices suggest that professionals should be taking measures for protecting their businesses from cyber attacks. Cybercriminals primarily rely on an email-based attack known as phishing to help commit payment redirection fraud. A recent Telstra Security Report found that the most common ...
Cheap Shots are taking Creep Shots of Women

Cheap Shots are taking Creep Shots of Women

Do you ever get that feeling that’s someone is watching you, or you are being followed? It freaks me out. Now, how do you feel when some random person has taken a photo of you? Well, sometimes you can never be too sure about what the case is. But, what happens when the creep shots take cheap shots? Yep, a whole new level we are heading to. What is ...
Australian Companies Urged to Consider Pros and Cons of Paying a Ransom

Australian Companies Urged to Consider Pros and Cons of Paying a Ransom

The conversation is becoming more commonplace about whether companies should pay in a ransomware attack. Unfortunately, these crippling cyber-assaults are taking place too frequently across the globe, with targets and outcomes getting more consequential and more threatening for our workforce and communities. Cyber-criminals and other nefarious actors ...
No results found.

In The News

SecurityBridge’s Bill Oliver Selected By ASUG Organizers To Discuss SAP Cybersecurity Best Practices

SecurityBridge’s Bill Oliver Selected By ASUG Organizers To Discuss SAP Cybersecurity Best Practices

Company Reveals It’s New “Cybersecurity Command Center for SAP” Initiative at the Houston, TX, Event
Recorded Future Unveils AI-Driven Enhancements to Combat Ransomware Threats with Real-Time Intelligence

Recorded Future Unveils AI-Driven Enhancements to Combat Ransomware Threats with Real-Time Intelligence

AI-Powered Threat Intelligence Delivers Enhanced Visibility, Faster Detection, and Proactive Response Across the Entire Ransomware Lifecycle
Fortinet Expands Its Cloud-Native Security Offerings With The Introduction Of Lacework FortiCNAPP

Fortinet Expands Its Cloud-Native Security Offerings With The Introduction Of Lacework FortiCNAPP

Combining Lacework’s leading cloud-native application protection platform with the Fortinet Security Fabric delivers unmatched visibility and protection across multi-cloud environments 
AusCERT Launches New Tabletop Exercise Service To Boost Incident Response Readiness

AusCERT Launches New Tabletop Exercise Service To Boost Incident Response Readiness

AUSCERT'S new TTX service enables organisations of all sizes to focus on critical aspects of cyber incident response, business continuity and crisis management and uplift capabilities.  
Tesserent Highlights Significant Pivot From NIST On Password Advice – Australian Businesses, Public Sector And Consumers Advised Not To Bother With Complex Passwords

Tesserent Highlights Significant Pivot From NIST On Password Advice – Australian Businesses, Public Sector And Consumers Advised Not To Bother With Complex Passwords

Tesserent highlights significant pivot from NIST on password advice – Australian businesses, public sector and consumers advised not to bother with complex passwords
Genetec Retains World Leader Position In Video Management Software, Analysts Confirm

Genetec Retains World Leader Position In Video Management Software, Analysts Confirm

Ongoing innovation, open architecture, and hybrid cloud solutions underpin sustained global market leadership.
Patch Tuesday Commentray from Tenable

Patch Tuesday Commentray from Tenable

This month, Microsoft addresses 117 CVEs with three rated as critical and four zero-day vulnerabilities, two of which were exploited in the wild. Remote code execution (RCE) vulnerabilities accounted for 35.9% of the vulnerabilities patched this month, followed by elevation of privilege (EOP) vulnerabilities at 23.9%. Please find below a comment from ...
Cythera Achieves ISO 27001 Security Certification And Invests In MDR Services

Cythera Achieves ISO 27001 Security Certification And Invests In MDR Services

Melbourne, 9 October 2024 - Cythera, a leading Australian cybersecurity service provider, today announced it has achieved ISO 27001 certification, demonstrating its commitment to the highest standards of information security management. The company also revealed significant enhancements to its Managed Detection and Response (MDR) service, offering ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This