The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Australian Companies Urged to Consider Pros and Cons of Paying a Ransom
The conversation is becoming more commonplace about whether companies should pay in a ransomware attack. Unfortunately, these crippling cyber-assaults are taking place too frequently across the globe, with targets and outcomes getting more consequential and more threatening for our workforce and communities.
Cyber-criminals and other nefarious actors ...

A Scam Which Preys on Vulnerable People (and Works!)
This phishing campaign is a prime example of how heartless cybercriminals prey on vulnerable people.
Our experts have been made aware of a new email extortion scheme targeting Australians. The email suggests that a backdoor has been installed on the victim's computer and the user was caught red-handed while pleasuring him or herself. The scammers then ...
Email Impersonation Scams: What You or Your IT Staff Can Do to Protect Your Business
A major cyber threat to Australian businesses is email-based impersonation scams targeting key personnel. The scheme involves cybercriminals mimicking business owners and executives through the use of phishing emails. Criminals typically pose as personnel in positions of authority and ask victims to perform money transfers, pay invoices, or to send the ...
Businesses Require New Techniques to Combat Phishing
The Verizon 2018 Data Breach Investigations Report provides valuable insights into emerging phishing threats. CISOs, IT managers and cybersecurity consultants should be aware of new phishing techniques this report raises in order to better manage the associated risk they bring.
The most exciting finding in this year's report is the increased ...
Is the Cybersecurity of Your Business PEXA Ready?
You may have read about the highly publicised PEXA fraud which was reported whereby a Melbourne family was left homeless. As it transpired, the family’s conveyancer had their email hijacked by a cybercriminal. This lead to the conveyancer’s PEXA account being compromised and ultimately the theft of $250,000 by the criminal misdirecting settlement ...

Cybersecurity Tips for Conveyancers and Solicitors using PEXA
You may have heard of the recent cybercrime perpetrated against the Australian e-conveyancing platform PEXA. A former MasterChef finalist and her family had $250,000 stolen from a property purchase transaction on the platform at settlement. In the following article, we explain the likely ways the fraud occurred and what practical things you can do ...
How you can protect your Microsoft Exchange email service from cyber attacks
Microsoft Exchange is a popular choice for providing email services for businesses. Its email features and seamless integration with Microsoft Outlook are undoubtedly convenient and easy to use, but what about security?
Microsoft Exchange runs exclusively on Windows Server, which in 2017 was affected by various critical vulnerabilities, putting ...
Report: Australia’s Top Law Firms Lead the Way in the Use of Anti-Phishing Technologies
Most of Australia’s top-tier and mid-tier law firms are well prepared in defending against phishing attacks, Iron Bastion's new study can now reveal.
Iron Bastion have assessed Australia’s top one hundred law firms for their use of anti-phishing technology. The details were gathered from various public data sources to determine whether email services ...
No results found.
In The News
Yubico Unveils Yubico Enrollment Suite To Fast-Track Phishing-Resistance At Scale
November 14, 2024 – Today Yubico (NASDAQ: YUBICO), the leading provider of hardware authentication security keys, announced the Yubico Enrollment Suite – a set of offerings that include Yubico FIDO Pre-reg and the brand new YubiEnroll. Built on Yubico’s previously existing capabilities to pre-register FIDO credentials in bulk, the Yubico Enrollment ...
Tenable Forecasts Data Security In The Cloud To Take Centre Stage As AI Adoption Accelerates In 2025
As 2025 approaches, Tenable, the exposure management company, is highlighting the critical need for organisations to prioritise data security in the cloud amid the rapid rise of AI adoption. In the coming year, companies will face mounting pressure to secure AI initiatives at scale while safeguarding a growing range of data assets from cyber threats. ...
CyberArk And Wiz Team Up To Provide Complete Visibility And Control For Cloud-Created Identities
Cloud-native organisations to gain full understanding over every identity in the cloud, secured with Zero Standing Privileges and at cloud velocity
CyberArk (NASDAQ: CYBR), the global leader in identity security, today announced a high-impact partnership with leading cloud security provider Wiz. The two companies are joining forces to enable customers ...
Veeam Enhances Veeam Data Cloud Vault with Predictable Cloud Storage Solution
Veeam Software announced major updates to Veeam Data Cloud Vault, a fully-managed, secure, and cloud-based storage service that leverages the power of Microsoft Azure and simplifies storing backups of mission critical data and applications offsite for unmatched business resilience. This new release, developed in collaboration with Microsoft, introduces ...
New SolarWinds Report: Automation, Self-Service, And SLAs Are Keys To ITSM Efficiency
Findings from the SolarWinds 2024 State of ITSM Report showcase several more effective methods for up-leveling ITSM
SYDNEY, Australia – November 13, 2024 – SolarWinds (NYSE:SWI), a leading provider of simple, powerful, secure observability and IT management software, today released its 2024 State of ITSM Report, which provides practical, actionable ...
Trustwave And Cybereason Merge To Form Global MDR Powerhouse For Unparalleled Cybersecurity Value
Strategic consolidation offers expanded cybersecurity suite of market-leading MDR, EDR, offensive security, DFIR, and threat intelligence
November 13, 2024 – Trustwave, a cybersecurity and managed security services leader, and Cybereason, a leading Endpoint Detection and Response (EDR) company, have announced a definitive merger agreement offering a ...
Tenable November Patch Tuesday Commentary
This month, Microsoft patched four zero-day vulnerabilities, including two that were exploited in the wild. Remote code execution (RCE) vulnerabilities accounted for 58.6% of the vulnerabilities patched this month, followed by elevation of privilege (EoP) vulnerabilities at 29.9%. A full analysis by Tenable can be found in this blog and commentary from ...
Available Now: YubiKey Bio Series – Multi-Protocol Edition Keys Expand Phishing-Resistant Authentication Options For Enterprises
As adoption of biometric logins continues to increase globally, enterprises and cybersecurity teams require stronger security combined with user convenience to improve user adoption of multi-factor authentication (MFA) and ensure productivity. Hardware security keys that leverage biometrics, like the YubiKey Bio Series, enable organisations to do so by ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..