The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Is Your Conveyancing Practice Secure From Hacking?

Is Your Conveyancing Practice Secure From Hacking?

The recent media reports of fraud against conveyancing practices suggest that professionals should be taking measures for protecting their businesses from cyber attacks. Cybercriminals primarily rely on an email-based attack known as phishing to help commit payment redirection fraud. A recent Telstra Security Report found that the most common ...
Cheap Shots are taking Creep Shots of Women

Cheap Shots are taking Creep Shots of Women

Do you ever get that feeling that’s someone is watching you, or you are being followed? It freaks me out. Now, how do you feel when some random person has taken a photo of you? Well, sometimes you can never be too sure about what the case is. But, what happens when the creep shots take cheap shots? Yep, a whole new level we are heading to. What is ...
Australian Companies Urged to Consider Pros and Cons of Paying a Ransom

Australian Companies Urged to Consider Pros and Cons of Paying a Ransom

The conversation is becoming more commonplace about whether companies should pay in a ransomware attack. Unfortunately, these crippling cyber-assaults are taking place too frequently across the globe, with targets and outcomes getting more consequential and more threatening for our workforce and communities. Cyber-criminals and other nefarious actors ...
A Scam Which Preys on Vulnerable People (and Works!)

A Scam Which Preys on Vulnerable People (and Works!)

This phishing campaign is a prime example of how heartless cybercriminals prey on vulnerable people. Our experts have been made aware of a new email extortion scheme targeting Australians. The email suggests that a backdoor has been installed on the victim's computer and the user was caught red-handed while pleasuring him or herself. The scammers then ...

Email Impersonation Scams: What You or Your IT Staff Can Do to Protect Your Business

A major cyber threat to Australian businesses is email-based impersonation scams targeting key personnel. The scheme involves cybercriminals mimicking business owners and executives through the use of phishing emails. Criminals typically pose as personnel in positions of authority and ask victims to perform money transfers, pay invoices, or to send the ...

Businesses Require New Techniques to Combat Phishing

The Verizon 2018 Data Breach Investigations Report provides valuable insights into emerging phishing threats. CISOs, IT managers and cybersecurity consultants should be aware of new phishing techniques this report raises in order to better manage the associated risk they bring. The most exciting finding in this year's report is the increased ...
Is the Cybersecurity of Your Business PEXA Ready?

Is the Cybersecurity of Your Business PEXA Ready?

You may have read about the highly publicised PEXA fraud which was reported whereby a Melbourne family was left homeless. As it transpired, the family’s conveyancer had their email hijacked by a cybercriminal. This lead to the conveyancer’s PEXA account being compromised and ultimately the theft of $250,000 by the criminal misdirecting settlement ...
Cybersecurity Tips for Conveyancers and Solicitors using PEXA

Cybersecurity Tips for Conveyancers and Solicitors using PEXA

You may have heard of the recent cybercrime perpetrated against the Australian e-conveyancing platform PEXA. A former MasterChef finalist and her family had $250,000 stolen from a property purchase transaction on the platform at settlement. In the following article, we explain the likely ways the fraud occurred and what practical things you can do ...
No results found.

In The News

CyberArk Integration with Microsoft Defender for Identity Speeds Identification and Containment of Cyber Threats

CyberArk Integration with Microsoft Defender for Identity Speeds Identification and Containment of Cyber Threats

CyberArk (NASDAQ: CYBR) today announced a new integration between CyberArk Privileged Access Manager (PAM) and Microsoft Defender for Identity, giving organisations a unified, comprehensive view of their entire identity security landscape to allow quicker, more effective threat response and containment. Defender for Identity is a cloud-based ...
Dragos and Yokogawa Forge Global Partnership to Strengthen Cybersecurity for Industrial Systems Worldwide

Dragos and Yokogawa Forge Global Partnership to Strengthen Cybersecurity for Industrial Systems Worldwide

Dragos and Yokogawa Electric have partnered to enhance industrial cybersecurity. By integrating Dragos’s OT cybersecurity platform with Yokogawa’s CENTUM VP system, the collaboration will provide visibility, threat detection, and response capabilities for industrial systems, advancing cybersecurity resilience amid digital transformation in industrial ...
Cisco Unveils AI Defense to Secure the AI Transformation of Enterprises

Cisco Unveils AI Defense to Secure the AI Transformation of Enterprises

Cisco’s end-to-end solution protects both the development and use of AI applications so enterprises can advance their AI initiatives with confidence. AI Defense safeguards against the misuse of AI tools, data leakage, and increasingly sophisticated threats, which existing security solutions are not equipped to handle. ...
Cybersecurity In 2025: Insights and Predictions From Yubico’s Experts

Cybersecurity In 2025: Insights and Predictions From Yubico’s Experts

With 2024 behind us, we saw another challenging year in the world of cybersecurity – highlighted by new and evolving threats like Artificial Intelligence (AI)-driven phishing and increasingly sophisticated cyber attacks overall. Yubico’s September Global State of Authentication Survey confirmed the challenges, even underscoring the potential risks of ...
Aristotle Metadata Welcomes Shad Sears As Chief Commercial Officer and Chief Information Security Officer

Aristotle Metadata Welcomes Shad Sears As Chief Commercial Officer and Chief Information Security Officer

Aristotle Metadata is thrilled to announce the appointment of Shad Sears as their new Chief Commercial Officer (CCO) and Chief Information Security Officer (CISO). Shad brings a wealth of experience in cybersecurity, commercial leadership and strategic development to our team.
ExtraHop® Celebrates Banner Year, Welcomes New CEO to Lead Next Phase of Growth

ExtraHop® Celebrates Banner Year, Welcomes New CEO to Lead Next Phase of Growth

Industry veteran with experience scaling notable network security brands joins world-class management team to accelerate momentum
Semperis Announces Lightning Intelligence to Provide Easy SaaS Offering for Active Directory and Entra ID Security Posture Assessment

Semperis Announces Lightning Intelligence to Provide Easy SaaS Offering for Active Directory and Entra ID Security Posture Assessment

New easy-to-deploy online security posture assessment for hybrid AD environments provides unprecedented visibility into security vulnerabilities, reducing cyberattack risk for small and mid-sized organisations and the most complex identity environments
Patch Tuesday Commentray from Tenable

Patch Tuesday Commentray from Tenable

Microsoft patched a whopping 157 CVEs in its inaugural Patch Tuesday for 2025. Not only is this the largest number of CVEs patched in January, it is the largest number of CVEs patched across any Patch Tuesday release since 2017. Microsoft set a record in April 2024, patching 147 CVEs. Since 2017, the average number of CVEs patched in January was 60. ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This