We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!
We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!
Supply Chain Breach on Popular Axios npm Library
Quick Overview
A recent supply chain breach has affected the widely used Axios npm library.
With over 300 million weekly downloads, Axios significantly influences developers globally.
Malicious actors released a harmful package, plain-crypto-js@4.2.1, via a compromised maintainer account.
The malicious software targets Windows, Linux, and macOS systems, deploying a remote access Trojan (RAT).
Experts recommend locking to secure Axios versions to prevent potential breaches.
Overview
The popular JavaScript library Axios, which achieves an impressive 300 million weekly downloads, has become the latest victim of a complex supply chain attack. This incident has raised concerns within the developer community and highlighted the weaknesses present in software supply chains.
Details of the Attack
The attack initiated with the hijacking of the npm account belonging to Axios’s main maintainer, Jason Saayman. The attacker altered the account email to an anonymous ProtonMail address, disseminating the harmful package through npm’s command-line interface, evading GitHub’s continuous integration processes.
Security firm Socket identified a harmful dependency, plain-crypto-js@4.2.1, while the attacker methodically orchestrated the breach over an 18-hour span, first publishing a legitimate version to build trust.
Impact of the Malware
The malicious payload targets various platforms, including Windows, Linux, and macOS, to introduce a remote access Trojan (RAT). The sophisticated attack employs obfuscation and anti-analysis methods, offering robust RAT functionalities.
Suggested Measures
Developers utilizing Axios are encouraged to promptly secure their projects by locking to safe version axios@1.14.0 or axios@0.30.3 to avert any possible breach. Additionally, tracking network logs for any activity connecting to the C2 server at sfrclak.com or the IP address 142.11.206.73 can aid in identifying intrusions.
Final Thoughts
While the individuals behind the breach remain unknown, the lack of evidence for cryptocurrency mining or ransomware points to an intention beyond financial profit. The assault seems to be an intelligence-gathering initiative, potentially linked to an advanced persistent threat (APT) group.
Recap
The Axios npm library, essential for many developers, has experienced a serious supply chain breach that threatens numerous systems around the world. Maintaining vigilance and following recommended security practices are imperative to counteract this risk.
Frequently Asked Questions
Q: What is Axios?
A: Axios is a widely utilized JavaScript library that offers an HTTP client for making requests, frequently adopted in web development.
Q: How was the Axios package compromised?
A: The npm account of the maintainer for Axios was breached, enabling attackers to upload a malicious package via npm’s command-line interface.
Q: What actions should developers take to safeguard their projects?
A: Developers should promptly lock their projects to safe versions, axios@1.14.0 or axios@0.30.3, and watch for any suspicious network activity.
Q: Is there any information about who may be behind the attack?
A: At this moment, there is no definitive information regarding the attackers, but the operation implies it could be orchestrated by an advanced persistent threat (APT) group.
Q: What makes this attack noteworthy?
A: Given the extensive reliance on Axios, the attack has widespread implications, exposing vulnerabilities in software supply chains and underscoring the necessity for enhanced security measures.
We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!
Quick Overview
The Hatching-tide 2026 event in FFXIV Online is available until April 7, 12:59 AEST
Players must reach at least level 15 to initiate the event quest
A new replayable mini-game requires collecting eggs using a garden scythe
Rewards comprise housing decor, themed eyewear, and artwork
If items are missed, they may return on the Mog Station
Hatching-tide 2026: Easter Celebration in Eorzea
The eagerly awaited Hatching-tide event makes its return to Final Fantasy XIV Online (FFXIV Online) for 2026, welcoming players globally to partake in the Easter celebrations. Regardless of whether you’re enjoying the emergence of spring or the cool winds of autumn, FFXIV Online ensures a delightful celebration for all regions.
When Does Hatching-tide Occur?
The Hatching-tide event is presently active and will finish on April 7 at 12:59 AEST. Remember this important date, especially if you reside in an AEDT region, since daylight saving time will conclude shortly. If you miss this window, you may need to wait for the potential reappearance of items on the Mog Station.
How to Begin the Hatching-tide Event
To join in on the celebration, players need to be a minimum of level 15. Visit the Mih Khetto Amphitheatre in Old Gridania and converse with the Stylish Dreamer to kick off the quest called “Of Weeds and Whimsy.” This quest opens the door to exclusive event activities.
The Stylish Dreamer is located at Mih Khetto Amphitheatre in Old Gridania. (Image: FFXIV Online)
What’s New This Year?
The 2026 Hatching-tide brings a fresh mini-game that players are sure to enjoy. Armed with a garden scythe, players will clear weeds to discover hidden eggs. This challenge can be approached in two different ways: trading eggs for rewards or striving for high scores.
Use a scythe to gather eggs. (Image: FFXIV Online)
Hatching-tide 2026 Rewards
This year’s rewards take inspiration from spring themes, providing players with a selection of cosmetic and housing goodies. Look forward to egg basket decorations, egg and blossom-themed eyewear, and past event artwork. Additionally, players can now equip multiple pairs of the themed eyewear at once, allowing for inventive glamour combinations.
A variety of housing decorations are available to collect. (Image: FFXIV Online)
Remember the Deadline
As with all seasonal events in FFXIV Online, Hatching-tide is temporary. Make sure to start the quest by April 7, gather sufficient eggs, and claim your prizes before the event wraps up. After it’s finished, acquiring these items might necessitate waiting for a Mog Station release.
Summary
FFXIV Online’s Hatching-tide 2026 features an Easter celebration with a new mini-game and a range of themed rewards. Players must fulfill the level requirement and complete event tasks prior to the April 7 deadline to obtain exclusive items.
Q: What is the level requirement to participate in Hatching-tide?
A: Players need to be at least level 15 to initiate the event quest.
Q: How can players begin the Hatching-tide event?
A: Players should visit Old Gridania’s Mih Khetto Amphitheatre and talk to the Stylish Dreamer.
Q: What new features are offered in the 2026 Hatching-tide event?
A: The event includes a new mini-game where players utilize a garden scythe to find hidden eggs.
Q: What rewards can players obtain during the event?
A: Players can earn egg basket decorations, egg and blossom-themed eyewear, and artwork from earlier events.
Q: When does the Hatching-tide event conclude?
A: The event wraps up on April 7, 12:59 AEST.
Q: What will happen if players miss the event deadline?
A: Players may need to wait for items to appear on the Mog Station if they miss the event deadline.
We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!
Brief Overview
Melbourne Airport is poised to inaugurate a significant new EV charging hub, bolstering eco-friendly transportation choices.
This initiative is a partnership between Melbourne Airport and bp pulse, comprising 24 charging spaces.
The hub will provide a combination of 150kW rapid chargers and 300kW ultra-rapid chargers.
Strategically positioned at the intersection of Airport Drive and Francis Briggs Road to cater to high-traffic commuter routes.
Operated using 100% renewable electricity sourced from on-site solar farms.
Constructed to accommodate various vehicle types, including larger commercial units.
The hub supports Victoria’s objectives for increasing zero-emission vehicle adoption and reducing carbon emissions.
Ideal Location for Victorian EV Users
The new hub is conveniently located at the corner of Airport Drive and Francis Briggs Road, a key junction for commute traffic. With 24 charging spaces, it features a blend of 150kW and 300kW chargers, addressing the needs for both rapid and ultra-rapid charging. This is vital for airport patrons who often have time constraints.
Enhancing National Charging Infrastructure
This venture meets the rising demand for EV facilities as a growing number of Australians shift to electric vehicles. By introducing a substantial number of charging stations in one location, it alleviates range anxiety for drivers traveling from rural regions to Melbourne’s central aviation center.
User-Focused Design and Accessibility
The hub prioritizes user convenience, featuring a spacious canopy for weather protection. It also includes accessible charging spaces and drive-through options for larger vehicles, ensuring usability for all drivers.
Collaborative Efforts Driving Change
This initiative is a partnership between Melbourne Airport and bp pulse. The hub will utilize renewable energy generated from the airport’s solar farms, employing smart grid technology to guarantee effective power management even during peak periods.
Benefits for Commercial and Ride-Share Services
<p Ride-share and taxi operators, who frequently serve the airport, will take advantage of the ultra-rapid charging facilities. The hub also supports the transition of commercial vehicle fleets to electric, aiding the Victorian Government’s zero-emission objectives.
Pricing Structure
Costs will be managed by bp pulse and are anticipated to be competitive with other ultra-rapid charging locations. The hub will be operational 24/7, allowing users to start charging via the bp pulse app or using tap-and-go credit card terminals.
Contributing to a Sustainable Aviation Environment
The hub supports Melbourne Airport’s sustainability goals, targeting net zero emissions by 2025. It also enhances local air quality by minimizing the idle time of traditional combustion engines.
Future Prospects for Australian Airports
Melbourne Airport is setting a benchmark that may inspire other airports across Australia. As airports transform into energy and transportation centers, the integration of robust EV charging infrastructure is likely to become the norm.
Conclusion
The new EV charging hub at Melbourne Airport, created in collaboration with bp pulse, marks a significant advancement for sustainable transportation infrastructure in Australia. The facility, featuring 24 high-speed charging stations, addresses the increasing number of electric vehicles and aligns with Victoria’s environmental goals.
Q: What is the primary function of the new EV charging hub at Melbourne Airport?
A: The hub is established to cater to the rising need for electric vehicle infrastructure, benefiting travelers, local community members, and commercial fleets.
Q: Where can the EV charging hub be found?
A: It is positioned at the intersection of Airport Drive and Francis Briggs Road, a strategic location for commuters and airport traffic.
Q: What kinds of chargers will the hub provide?
A: The hub will offer a mix of 150kW rapid chargers and 300kW ultra-rapid chargers.
Q: What will supply power to the hub?
A: The hub will operate on 100% renewable energy harvested from Melbourne Airport’s solar farms.
Q: How does the hub aid commercial and ride-share services?
A: It provides ultra-rapid charging solutions, minimizing downtime for ride-share operators and facilitating the shift of commercial fleets to electric.
Q: When is the hub expected to start operating?
A: The hub is anticipated to be fully operational later this year, with construction currently in progress.
We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!
Stryker’s Manufacturing Comeback Following Cyber Incident
Brief Overview
Stryker’s functions are approaching full capacity after a cyber incident.
Most production facilities and essential lines have been reinstated.
The assault was attributed to a group tied to Iran known as Handala.
Stryker’s digital ordering systems have been reactivated.
The firm is collaborating with cybersecurity professionals and government bodies to combat the hackers.
Cyber Incident Disrupts Stryker’s Functions
Medical device firm Stryker has reported a notable recovery in its operations after a cyber incident on March 11 brought about extensive interruptions. The incident impacted order processing, manufacturing, and shipments, hindering the company’s capacity to serve its clientele effectively.
Restoration Initiatives In Progress
Stryker disclosed that its production capacity is swiftly improving, with the majority of its sites and crucial lines back to operation. The company’s digital ordering systems have been restored, enabling customers to place orders again. Stryker is concentrating on reconciling orders, manufacturing goods, and ensuring prompt deliveries.
A Detailed Look at the Cyber Incident
The cyber incident was claimed by a hacking group dubbed Handala, purportedly linked to Iran. The group asserted that the attack was a response to an assault on a girls’ school in Minab, southern Iran. The incident impacted devices operating on Microsoft’s Windows OS that could connect to Stryker’s computer networks.
Joint Initiatives to Address Cyber Threats
With a workforce of 56,000 and operations across 61 countries, Stryker is partnering with external cybersecurity experts and authorities. These initiatives are aimed at seizing domains associated with the hackers, reducing further threats and fortifying the company’s digital framework.
Conclusion
Stryker’s manufacturing operations are gradually recovering following a cyber incident that hindered their workflow. The company has reinstated most of its essential facilities and is working closely with cybersecurity authorities to thwart future incidents.
Q: What was the effect of the cyber incident on Stryker?
A: The cyber incident caused considerable disruptions in Stryker’s operations, affecting order processing, manufacturing, and shipments.
Q: Who took responsibility for the cyber incident on Stryker?
A: An Iran-linked hacking group known as Handala took responsibility for the incident.
Q: How is Stryker addressing the cyber incident?
A: Stryker is striving to restore operations, reconcile orders, and deliver products. They are also working with cybersecurity experts to tackle the problem.
Q: Are Stryker’s digital ordering systems functional after the incident?
A: Yes, Stryker’s digital ordering systems have been restored and are functioning.
Q: How many employees does Stryker have worldwide?
A: Stryker employs 56,000 individuals and operates in 61 countries.
Q: What steps are being taken to prevent future cyber incidents at Stryker?
A: Stryker is collaborating with external cybersecurity experts and authorities to secure their systems and mitigate future threats.
We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!
Quick Overview
Google unveils Search Live in Australia, offering real-time, interactive search through voice and camera functionalities.
Supported by the innovative Gemini 3.1 Flash Live voice model, facilitating multilingual and intuitive dialogues.
AI-powered shopping features incorporated into Google Search and the Gemini application.
A visual and conversational shopping journey featuring real-time local inventory insights and pricing.
These updates are designed to simplify daily activities and enhance user engagement with technology.
Transforming Search with Google Live
Google has transformed the searching experience for Australians with the introduction of Search Live. This recent enhancement enables users to engage with the internet in a more natural and intuitive way, surpassing conventional text-based interactions. By facilitating real-time conversations, individuals can utilize their voice and camera to add context to their queries, creating a more seamless and dynamic search experience.
Improving Real-Time Assistance
The Search Live functionality is especially useful for those on-the-spot moments when immediate assistance is required. Whether fixing a device or identifying plants, users can now engage in interactive conversations with follow-up inquiries, enriching the information obtained. Additionally, the system allows users to activate their camera during interactions, providing visual context to inquiries for more relevant and helpful recommendations.
Gemini 3.1 Flash Live Voice Model
This launch is driven by the Gemini 3.1 Flash Live voice model, which is inherently multilingual and user-friendly. The model offers a more organic conversational experience, reminiscent of chatting with a person rather than a computer system. This innovation reduces communication barriers, making technology more accessible to a varied user base.
Visual representation of Google’s AI-augmented shopping features for Australians.
AI-Driven Shopping Experience
Google is also reshaping the online shopping landscape in Australia with innovative AI functionalities embedded in Search and the Gemini app. Users can now articulate their desired items in simple English, eliminating the need for precise keywords. This method yields intelligently structured responses featuring rich visuals, local pricing, customer feedback, and real-time inventory information, enhancing the efficiency and personalization of shopping.
Google Shopping Graph
The Google Shopping Graph, an extensive repository of more than 50 billion product listings, fuels this upgraded shopping experience. With approximately 2 billion listings refreshed every hour, users receive precise and timely information regarding product availability and pricing, specifically tailored for the Australian market. This guarantees that users can rapidly make well-informed purchasing choices.
Practical AI Integration in Everyday Life
The merger of camera functionality with AI blurs the boundaries between the digital and physical realms, providing practical solutions to everyday challenges. While some may find the concept of conversing with their device peculiar, the advantage of having hands-free support is undeniable. Australia’s participation in this global launch emphasizes the nation’s forward-thinking tech approach, with users already capable of accessing these features today.
Conclusion
The introduction of Google Search Live and AI-empowered shopping capabilities signifies a major leap in how Australians connect with technology. By merging voice and visual components into search and shopping, Google delivers a more intuitive and effective user experience. These enhancements are poised to reshape daily activities, making technology an even more integral aspect of our lives.
Q: What is Google Search Live?
A: Google Search Live is an innovative feature that enables users to perform real-time, interactive searches using voice and camera within the Google app.
Q: How does the Gemini 3.1 Flash Live voice model enhance user experience?
A: The Gemini 3.1 Flash Live voice model offers multilingual functionality and natural, intuitive conversations, making interactions feel more human-like.
Q: What AI features have been integrated into Google’s shopping experience?
A: Google has included AI functionalities that allow users to describe products in straightforward English, obtaining structured responses with visuals, local pricing, reviews, and live inventory information.
Q: How does the Google Shopping Graph benefit Australian users specifically?
A: The Google Shopping Graph ensures Australian users have access to accurate and updated information regarding pricing and availability of products, with frequent listing updates.
Q: Are there any costs associated with using these new features?
A: No, these features are available at no cost as part of the standard Google experience.
Q: How can users access these updates?
A: Users can access these functionalities by updating their Google app to the latest version available in the App Store or Google Play Store.
We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!
Delving into the Future of Cloud at the Benchmark Awards Roundtable
Quick Overview
Cloud modernization is a primary emphasis for tech leaders in Australia.
Cloud sovereignty and secure infrastructure are vital for business coherence.
Forecastable expenses and resilience are essential in cloud strategy formulation.
Complex settings necessitate customized strategies to guarantee security.
Investigating Cloud Modernization in Australia
The Benchmark Awards Roundtable, hosted by Interactive, gathered leading technology executives to explore the shifting dynamics of cloud technology. As organizations increasingly depend on cloud solutions, modernization becomes imperative. Executives are charged with crafting strategies that cater to current requirements while also preparing for upcoming obstacles.
Significance of Cloud Sovereignty
Cloud sovereignty remains a pivotal element for Australian firms. With data regulations tightening, businesses must guarantee that their cloud strategies adhere to local laws and global standards. The roundtable reinforced the significance of selecting cloud solutions that provide both adaptability and governance over data storage and processing.
Establishing a Secure Infrastructure
Security is paramount in cloud implementation. The discussions at the roundtable emphasized the necessity for comprehensive security protocols that safeguard sensitive information and uphold the integrity of business operations. As cyber threats progress, the strategies to defend against them must evolve as well. This necessitates ongoing investment in security technologies and methodologies.
Ensuring Predictable Expenses and Resilience
One of the hurdles in cloud integration is expense management. Predictability in cloud-related costs enables organizations to plan judiciously and allocate resources adeptly. Moreover, resilience in cloud services guarantees that businesses can sustain operations without interruptions, even amid unforeseen circumstances.
Conclusion
The Benchmark Awards Roundtable offered valuable perspectives on the future of cloud technology, focusing on modernization, sovereignty, and security. As Australian enterprises tackle these intricate matters, the necessity for strategic foresight and dependable solutions becomes increasingly apparent.
Q&A Segment
Q: What does cloud modernization entail?
A: Cloud modernization refers to the process of updating and refining cloud infrastructure to satisfy current business requirements and prepare for future needs. This may involve adopting new technologies, enhancing processes, and ensuring that systems are scalable.
Q: What is the significance of cloud sovereignty?
A: Cloud sovereignty guarantees that businesses maintain governance over their data and comply with local as well as international regulations. This is essential for protecting sensitive data and sustaining customer trust.
Q: How can businesses secure their cloud infrastructure?
A: Businesses can secure their cloud infrastructure by implementing robust security measures, including encryption, access controls, and routine security audits, along with investing in security technologies and training for staff.
Q: What challenges are linked to cloud expenses?
A: The primary challenges include unpredictable costs and resource distribution. Organizations must devise strategies that enable predictable budgeting and efficient resource utilization to manage expenses effectively.
Q: What advantages does cloud resilience provide to businesses?
A: Cloud resilience ensures that organizations can maintain operations without disruption, facing challenges such as cyberattacks, system breakdowns, or natural disasters, thereby preserving service continuity and customer satisfaction.
We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!
Security Regulations for Critical Infrastructure in Australia
Summary Overview
An independent assessment has deemed Australia’s critical infrastructure security regulations as “ineffective”.
The assessment advocates a transition from mere compliance to active enforcement with substantial penalties.
Recommendations include broadening the scope to incorporate AI, content delivery networks (CDNs), cloud service providers, and space technologies.
The existing regulations are regarded as perplexing and inadequate for meaningful security improvements.
Independent Assessment Reveals Deficiencies
An independent assessment has determined that Australia’s Security of Critical Infrastructure (SoCI) Act is deficient in its efficiency, branding it as “ineffective”. The associated penalties are viewed as merely a standard business expense rather than an incentive for enhancing security.
Recommended Revisions and Expansion
The assessment recommends a reformation of the SoCI Act to eliminate duplication and synchronize with other existing responsibilities. It advocates for the legislation to be designed to adapt to technological and geopolitical changes. A key suggestion is to transition from a compliance-focused approach to one centered on enforcement with concrete penalties.
Industry Viewpoint and Endorsement
Consultations with industry representatives indicated that the current SoCI Act is perceived as convoluted and intricate. The assessment recommends broadening the Act’s scope to encompass emerging areas like AI services, content delivery networks (CDNs), large-scale cloud service providers, and technologies related to space and drones.
Emotional Disconnection in Compliance
Assessment leader Jill Slay pointed out a lack of personal investment in the significance of safeguarding Australia’s critical infrastructure among compliance personnel. It was noted that individuals with backgrounds in Defence and intelligence were exceptions, showing a greater awareness of the consequences.
Conclusion
The review of Australia’s SoCI Act underscores notable deficiencies in its present form. The push for a comprehensive overhaul aims to ensure that the Act can effectively tackle modern threats and challenges by transitioning to a more stringent enforcement framework.
Questions & Answers
Q: What is the primary critique of the existing SoCI Act?
A: It is regarded as “ineffective”, with penalties insufficient to motivate security enhancements.
Q: What modifications are being suggested for the SoCI Act?
A: A shift from compliance to enforcement, incorporating real penalties and broadening the scope to new technological sectors.
Q: How is the current SoCI Act viewed within the industry?
A: It is seen as confusing, complex, and lacking efficacy in promoting real security enhancements.
Q: What is the proposed strategy for restructuring the SoCI Act?
A: To eliminate redundancies, align with pre-existing obligations, and ensure it can adapt to technological and geopolitical transformations.
We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!
ACMA Adopts CTO-as-a-Service for Transformation
Quick Overview
The Australian Communication and Media Authority (ACMA) is implementing a CTO-as-a-Service framework.
This initiative is part of a comprehensive core modernisation strategy.
ACMA aims to strengthen its technology leadership and strategic coherence.
The on-demand CTO will report to ACMA’s Chief Information and Digital Officer.
Key areas of focus will include digital investment strategies and architectural governance.
ACMA’s Strategic Shift to CTO-as-a-Service
The Australian Communication and Media Authority (ACMA) is taking a proactive stance by appointing a chief technology officer on an as-needed basis. This move is designed to infuse strategic insights into a significant core modernisation initiative. By opting for a CTO-as-a-Service model, ACMA aims to incorporate expert knowledge that resonates with current technology developments and government digital initiatives.
Addressing Leadership Needs
In the wake of Lyall Reid’s exit as the previous full-time CTO, ACMA has been actively searching for a suitable successor to manage its technological agenda. At present, Chris Dale serves as Chief Information and Digital Officer (CIDO) and will supervise the on-demand CTO. This strategic choice underscores ACMA’s dedication to enhancing its technological framework and decision-making processes.
Emphasis on Modernisation and Strategic Integration
ACMA’s choice to implement this adaptable CTO model highlights the necessity for strategic technology leadership. The agency’s current systems and infrastructures are becoming obsolete and disjointed, requiring a coherent strategy to modernise and align with wider government digital initiatives. The new CTO will be vital in steering this transformation, ensuring that ICT investments deliver meaningful business and regulatory results.
Improving Governance and Oversight
As ACMA advances its modernisation strategies, there is a clear focus on enhancing architectural governance and general technology oversight. The CTO-as-a-Service will be instrumental in this process, providing expert advice to consolidate ICT decision-making and bolster strategic alignment throughout the organization.
Conclusion
ACMA is making a significant advancement by adopting a CTO-as-a-Service framework, concentrating on modernising its core systems and reinforcing strategic technology leadership. This initiative is expected to facilitate considerable improvements in technology governance, investment strategies, and alignment with government digital objectives.
Q: What is CTO-as-a-Service?
A: CTO-as-a-Service is a flexible arrangement where a chief technology officer offers strategic and technological guidance as needed, rather than serving as a permanent staff member.
Q: Why is ACMA implementing this model?
A: ACMA intends to utilize contemporary technological insights and expertise to support its core modernisation efforts and strategic alignment with government digital initiatives.
Q: To whom will the on-demand CTO report?
A: The on-demand CTO will report to ACMA’s Chief Information and Digital Officer, Chris Dale.
Q: What are the primary focus areas of ACMA’s modernisation initiative?
A: Primary focus areas encompass digital investment strategies, architectural governance, and general technology oversight.
Q: How does this initiative serve ACMA?
A: The initiative enables ACMA to tap into expert technology leadership and insights, promoting enhanced strategic alignment and effective ICT decision-making.
Q: What challenges is ACMA working to resolve with this initiative?
A: ACMA is tackling the issues of outdated and fragmented systems that are not aligned with strategic objectives, requiring a unified modernisation effort.
We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!
Wally Liaw, co-founder of Super Micro, has been arrested for purportedly smuggling AI GPUs into China.
He faces allegations of breaching US export control regulations and trafficking goods.
The involvement of Taiwanese nationals Ruei-Tsang Chang and Ting-Wei Sun is also alleged.
The scheme reportedly included the use of fraudulent documentation and manipulation of logistics.
Super Micro asserts compliance with US regulations and denies any wrongdoing.
Accusations of GPU Trafficking to China
Authorities in the US have taken into custody Yih-Shyan “Wally” Liaw, one of the co-founders of Super Micro, on allegations concerning the unlawful export of high-performance graphics processing units (GPUs) to China. These GPUs play an essential role in enhancing artificial intelligence (AI) in data centers.
Key Participants and Charges
Along with Liaw, Ruei-Tsang “Steven” Chang, and Ting-Wei “Willy” Sun are charged with violating US export control laws. Sun, described as a “fixer” and “broker,” has been arrested while Chang remains unidentified.
The Alleged Operation
The indictment states that Liaw and Chang led a scheme utilizing third-party brokers to arrange orders with Super Micro, purportedly routing servers to Chinese enterprises through an intermediary in Southeast Asia. These activities involved document forgery and the creation of fake servers to deceive US inspectors.
Findings from the US Inquiry
An investigation by the FBI disclosed that around US$2.5 billion in servers were implicated, with US$510 million worth of AI technology reaching China within a brief timeframe. The operation is said to have involved repackaging servers in Taiwan before their final transit to China.
Super Micro’s Position
Super Micro declared its intention to assist US authorities and distanced itself from the actions of those accused, stressing its commitment to compliance with regulations.
Overview
The detention of Wally Liaw and his associates from Super Micro brings to light serious accusations of unlawful technology exports to China. This case emphasizes the necessity for strict adherence to export control regulations, particularly regarding advanced AI technologies.
Q: What charges are brought against Wally Liaw?
A: Liaw is charged with violating US export control laws, smuggling goods, and deceiving the government.
Q: Who are the other individuals involved in the alleged operation?
A: Ruei-Tsang “Steven” Chang and Ting-Wei “Willy” Sun are also involved, with Chang currently at large.
Q: In what manner did the alleged operation function?
A: The operation allegedly operated through the use of fabricated documentation and manipulation of logistics to redirect servers to China.
Q: What is Super Micro’s reaction to these accusations?
A: Super Micro asserts that it is fully cooperating with US authorities and that the actions of the accused are contrary to company policies.
Q: What could be the possible punishment for these allegations?
A: The charges might result in a maximum prison term of 20 years as per the US Export Control Reform Act.
Q: What quantity of technology was allegedly redirected to China?
A: It is estimated that US$510 million worth of AI technology was allegedly funneled to China in a brief period.