Microsoft discovers Storm-0978 phishing campaign

Threat actor exploits vulnerability to deliver backdoor, highlighting cybersecurity risks Microsoft has recently uncovered a sophisticated phishing campaign conducted by a threat actor known as Storm-0978, which specifically targeted defence and government entities in Europe and North America. The campaign involved the exploitation of a remote code execution vulnerability (CVE-2023-36884)…

Read More

Westpac’s BT plans to modernize Panorama platform

Westpac’s business division CIO discusses challenges of divesting non-core assets Westpac’s BT is embarking on a modernization journey for its Panorama financial planning platform, aiming to migrate it to the cloud. The move not only aims to enhance the platform’s capabilities but also make it easier to separate from the…

Read More

Persistent cybercriminal reliance on outdated tactics

Intruders also targeted servers with known vulnerabilities to obtain passwords Leading cloud-enabled security solutions provider, Barracuda, has released its latest Threat Spotlight report, revealing that cybercriminals continue to exploit businesses by relying on tried and tested tactics and long-standing security weaknesses. The report, based on three months’ worth of detection…

Read More

Tragedy of Titanic submersible incident exploited by scammers

Bitdefender Antispam Lab has tracked these tailor made scams starting from June 23 The recent search for the Titanic-bound submersible operated by OceanGate Expeditions ended in tragedy for the five explorers involved. Unfortunately, scammers wasted no time in exploiting the incident for their own gain. Shortly after the US Coast…

Read More

BM achieves quantum computing breakthrough

This breakthrough showed that a quantum computer can surpass leading classical simulations IBM, a global leader in technology and innovation, has made a ground-breaking advancement in the field of quantum computing. In a study published on the cover of the prestigious scientific journal Nature, IBM researchers have demonstrated for the…

Read More

B2B buyers place greater value on third-party interactions

The findings highlight the significance of third-party sources According to a recent survey conducted by Gartner, Inc., B2B buyers assign 1.4 times more value to third-party interactions compared to digital supplier interactions. The survey, which included 771 B2B buyers, revealed that certain third-party interactions, such as reading customer references or…

Read More

Indonesia’s endpoint security software market sees growth

Endpoint security software plays a crucial role in countering attack attempts According to the International Data Corporation (IDC) Worldwide Semiannual Software Tracker, the endpoint security software market in Indonesia witnessed a year-over-year growth of 10.8 per cent in the second half of 2022. Companies in Indonesia are increasingly investing in…

Read More

The University of Sydney chooses Azul platform core

The university sought out a java runtime solution that would offer cost savings Azul, a company specializing in Java, has been selected as the sole Java provider for The University of Sydney. The university, known for its prestigious reputation and large IT infrastructure, sought a Java runtime solution that would…

Read More

Top industry trends for IT infrastructure

These trends highlight the need for I&O teams to optimize cloud infrastructure Gartner, Inc. has identified four trends that will impact cloud, data centre, and edge infrastructure in 2023. These trends come at a time of economic uncertainty, requiring infrastructure and operations (I&O) teams to adapt to new technologies and…

Read More