Blogs & Media

Xiph Cyber brings you the latest industry news and views.

Every day a new threat is manufactured, and every day an innovative counter to that threat is created. Our industry moves quickly, and those that can't or won't keep up are fast left behind in high-risk territory.

At Xiph Cyber, our commitment to protecting your privacy and the sovereignty of your data means we invest a lot of time and effort in maintaining up-to-the-minute awareness of the shifts in our industry. You'll find the latest news and our own blogs right here.

Browse categories: Case Studies , Security

What is a spoofing attack?

Mar 22, 2023

Believe it or not, you may already have been a victim of spoofing. For example, have you ever received an email or text message purporting to be from your bank or telco provider, asking you to confirm your credentials by clicking on a link? Just like that, you’ve been spoofed.

Everything you need to know about ChatGPT & Open AI

Mar 16, 2023

Unless you’ve been living under a rock, chances are you’ve heard of ChatGPT – the powerful new artificial intelligence (AI) chatbot from OpenAI. It’s taking the internet by storm with its eerily human ways, and knack for bad poems and terrible jokes, but how does it work? And more importantly, can we rely on it? Here’s everything you need to know.

Government to reform Australia’s shaky metadata retention laws

Mar 08, 2023

The Government will finally overhaul Australia's murky metadata retention laws which allowed stated-based agencies like local councils, Australia Post, and even the RSPCA to access the telecommunications data of everyday people.

Network security for businesses

Mar 01, 2023

Whether it’s implementing Zero Trust security, penetration testing, access controls, or regularly conducting vulnerability assessments ─ one thing is for sure, businesses big or small ─ should use every tool in their cyber arsenal to protect their network and data.

What’s a SQL injection?

Feb 22, 2023

In our modern world, cyber threats and hacking techniques are aplenty and always evolving, especially ones that can exploit data applications, such as SQL injection attacks.

Business attack surfaces & cyber risks

Feb 15, 2023

Reducing your business’ attack surface is a basic, but critical cyber security measure. While many small and medium-sized businesses (SMBs) may think they’re too small to be attractive targets to hackers, the reality is quite the opposite as smaller organisations tend to have overall weaker cyber security aka a larger attack surface. This makes them more susceptible to data breaches and more attractive to cyber criminals.

5 common cyber threats to small businesses

Feb 09, 2023

In the eyes of cyber hackers, bigger fish aren’t always the best. Small and medium-sized businesses (SMBs) often prove to be the golden goose due to their lack of resources and expertise to fight cyber threats, compared to large enterprises. Small businesses tend to have less robust technological defences, less awareness of threats and less time and money to dedicate to cyber security ─ making them easier targets for hackers.

How secure is single sign-on (SSO) for businesses?

Feb 02, 2023

Single sign-on (SSO) makes it easy for your employees to access all their applications with only one username and password instead of dozens – but how secure is it?

Penetration testing for businesses

Jan 25, 2023

Just like playing Monopoly can teach you about investing without risking your own money ─ penetration testing simulates a cyber attack on your business’ IT infrastructure to help you avoid or better prepare for real cyber threats.

The data TikTok is really collecting & what it’s doing with your information

Jan 19, 2023

Unless you’ve been living under a rock, chances are you’ve used or at least heard of TikTok ─ the video-sharing app with billions (yes, billions) of users worldwide. Most people use TikTok to find, share and create viral content, but users of the platform should be aware of its data practices and links to China. Here’s what you need to know about TikTok’s data harvesting, and how to keep your information safe.