Threat actor exploits vulnerability to deliver backdoor, highlighting cybersecurity risks Microsoft has recently uncovered a sophisticated phishing campaign conducted by a threat actor known as Storm-0978, which specifically targeted defence and government entities in Europe and North America. The campaign involved the exploitation of a remote code execution vulnerability (CVE-2023-36884)…
Read MoreInformation Technology
Westpac’s BT plans to modernize Panorama platform
Westpac’s business division CIO discusses challenges of divesting non-core assets Westpac’s BT is embarking on a modernization journey for its Panorama financial planning platform, aiming to migrate it to the cloud. The move not only aims to enhance the platform’s capabilities but also make it easier to separate from the…
Read MorePersistent cybercriminal reliance on outdated tactics
Intruders also targeted servers with known vulnerabilities to obtain passwords Leading cloud-enabled security solutions provider, Barracuda, has released its latest Threat Spotlight report, revealing that cybercriminals continue to exploit businesses by relying on tried and tested tactics and long-standing security weaknesses. The report, based on three months’ worth of detection…
Read MoreTragedy of Titanic submersible incident exploited by scammers
Bitdefender Antispam Lab has tracked these tailor made scams starting from June 23 The recent search for the Titanic-bound submersible operated by OceanGate Expeditions ended in tragedy for the five explorers involved. Unfortunately, scammers wasted no time in exploiting the incident for their own gain. Shortly after the US Coast…
Read MoreBM achieves quantum computing breakthrough
This breakthrough showed that a quantum computer can surpass leading classical simulations IBM, a global leader in technology and innovation, has made a ground-breaking advancement in the field of quantum computing. In a study published on the cover of the prestigious scientific journal Nature, IBM researchers have demonstrated for the…
Read MoreB2B buyers place greater value on third-party interactions
The findings highlight the significance of third-party sources According to a recent survey conducted by Gartner, Inc., B2B buyers assign 1.4 times more value to third-party interactions compared to digital supplier interactions. The survey, which included 771 B2B buyers, revealed that certain third-party interactions, such as reading customer references or…
Read MoreIndonesia’s endpoint security software market sees growth
Endpoint security software plays a crucial role in countering attack attempts According to the International Data Corporation (IDC) Worldwide Semiannual Software Tracker, the endpoint security software market in Indonesia witnessed a year-over-year growth of 10.8 per cent in the second half of 2022. Companies in Indonesia are increasingly investing in…
Read MoreTech conference, Go Girl, Get Real With It
Encouraging Victorian high school girls to get excited about careers in ESTEAM Go Girl, Get Real with It is a new inaugural event launched by Vic ICT for Women in Victoria, Australia. It is designed for Victorian students in Years 5-12 and aims to inspire and encourage girls aged 10…
Read MoreThe University of Sydney chooses Azul platform core
The university sought out a java runtime solution that would offer cost savings Azul, a company specializing in Java, has been selected as the sole Java provider for The University of Sydney. The university, known for its prestigious reputation and large IT infrastructure, sought a Java runtime solution that would…
Read MoreTop industry trends for IT infrastructure
These trends highlight the need for I&O teams to optimize cloud infrastructure Gartner, Inc. has identified four trends that will impact cloud, data centre, and edge infrastructure in 2023. These trends come at a time of economic uncertainty, requiring infrastructure and operations (I&O) teams to adapt to new technologies and…
Read More