The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Cybersecurity Tips for Conveyancers and Solicitors using PEXA
You may have heard of the recent cybercrime perpetrated against the Australian e-conveyancing platform PEXA. A former MasterChef finalist and her family had $250,000 stolen from a property purchase transaction on the platform at settlement. In the following article, we explain the likely ways the fraud occurred and what practical things you can do ...
How you can protect your Microsoft Exchange email service from cyber attacks
Microsoft Exchange is a popular choice for providing email services for businesses. Its email features and seamless integration with Microsoft Outlook are undoubtedly convenient and easy to use, but what about security?
Microsoft Exchange runs exclusively on Windows Server, which in 2017 was affected by various critical vulnerabilities, putting ...
Report: Australia’s Top Law Firms Lead the Way in the Use of Anti-Phishing Technologies
Most of Australia’s top-tier and mid-tier law firms are well prepared in defending against phishing attacks, Iron Bastion's new study can now reveal.
Iron Bastion have assessed Australia’s top one hundred law firms for their use of anti-phishing technology. The details were gathered from various public data sources to determine whether email services ...

Zooming Around
How is Zoom changing us, and how are we changing Zoom?🧐 With the current state of the world, how reliable and secure is the platform upon which so many now rely?

WHAT IS CPS234 AND WHAT DOES IT MEAN FOR ME?
An increase in the risk of cyber security brings an increase in the publicity surrounding the issue and the regulations governing it. This year we have already seen a number of new regulations coming into effect that will impact the majority of both Australian and international organisations.
In March 2018, the Australian Prudential Regulation ...

To Infinity & Beyond… With Artificial Intelligence
We are always hearing about technologies that are trending. But what happens next for technology disruptors? For me, it's about understanding these developments and actually looking intrinsically about why these particular trends are going to accelerate the cloud computing space. The way I see it is that machine learning algorithms and advanced ...

Critical Communications
Topic: Communication for internal teams on the importance of understanding risk
If all communication was abolished, society would crumble. Fast. Yet one area that I have noticed in the security industry which I believe needs a lot of attention - and often goes unmentioned - is how we communicate internally to our teams on the importance of ...

Start Your Engines
You had a neat idea. You’ve built on it, and now started to turn it into a commercial reality. It doesn’t matter if you’ve the best product or service in the universe, if it’s not developed, marketed, sold, and delivered in the best possible way you’re falling short of your potential, and will flounder. You can’t do it all on your own of course, so now ...
No results found.
In The News
New CyberArk Research: Rapid Growth of Machine Identities, AI Adoption and Cloud Native Innovations Leave Organisations More Vulnerable to Attacks
77% of security leaders view securing machine identities as vital to protecting the future of AI
Bitdefender Threat Debrief | March 2025
Bitdefender has combined information from openly available sources (OSINT) – including news reports and research – with data we gather by analysing Data Leak Portals (DLPs), websites where ransomware groups post details about their victims to develop our March 2025 Threat Debrief. It’s important to remember that we can't independently verify all of ...
Palantir and Databricks Announce Strategic Product Partnership to Deliver Secure and Efficient AI to Customers
Partnership combines Palantir’s Artificial Intelligence Platform (AIP) and Databricks’ Data Intelligence Platform to accelerate the production of AI applications and reduce TCO
Ghost in the Router: China-Linked Espionage Group UNC3886 Targets Juniper Networks
Cybersecurity firm Mandiant, Google Cloud's threat intelligence division, has uncovered a sophisticated cyber espionage campaign by the China-linked hacking group UNC3886, which has been targeting end-of-life Juniper Networks routers with custom malware.
Intel Expands Tiber Trust Services Portfolio to Combat Evolving Threats
Intel Expands Tiber Trust Services Portfolio to Combat Evolving Threats
Unlocking AI’s Full Potential: EXL’s “AI in action” Event Will Showcase Real-World Strategies to Scale AI for Business Leaders in ANZ
Building on the success of previous AI in Action events, this year’s edition will bring together visionary leaders, AI experts, and industry professionals from banking, insurance, utilities, retail, technology, transportation, and more.
Extreme Networks Announces Appointment of Anisha Vaswani as Chief Information and Customer Officer
Company creates new executive role to drive the interlock between innovation and customer experience
Claroty Announces Amir Preminger as Chief Technology Officer
Founder of Claroty’s Team82 and Former VP Research to Drive Innovation Across Products, Services, and Operations
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
