“VoidProxy PhishKit Aims at Google and Microsoft Users”


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Enhanced Phishing Threat Aims at Google and Microsoft Users

Quick Overview

  • VoidProxy is a phishing-as-a-service (PhaaS) solution targeting accounts on Google and Microsoft.
  • This platform successfully surmounts multi-factor authentication (MFA) employing sophisticated methods.
  • It makes use of Adversary in the Middle (AitM) phishing strategies from hacked email accounts.
  • VoidProxy leverages inexpensive domains and Cloudflare to disguise its network.
  • Security analysts recommend implementing phishing-resistant authenticators and conducting user training to lessen risks.

VoidProxy PhishKit challenges Google and Microsoft users

VoidProxy: An Emerging Phishing-as-a-Service Threat

Okta’s Threat Intelligence team has discovered VoidProxy, an advanced phishing-as-a-service (PhaaS) platform that is aimed at users of Microsoft and Google. This service can circumvent multi-factor authentication (MFA) protocols, including SMS codes and one-time passwords (OTPs), posing a major threat to users.

Mechanics of VoidProxy’s Operations

Adversary in the Middle (AitM) Methods

VoidProxy utilizes Adversary in the Middle (AitM) phishing tactics, dispatching emails from legitimate providers that originate from compromised accounts. This method allows it to bypass MFA safeguards by capturing session cookies.

Domain and Infrastructure Obfuscation

The phishing websites are hosted on low-cost top-level domains like .icu and .xyz. To conceal their actual locations, these sites employ Cloudflare’s reverse proxy services, making it harder to trace and shut them down.

Sophisticated Evasion Techniques

Multiple Redirects and CAPTCHA

To evade detection, VoidProxy implements several redirects before the target reaches a clone of Google or Microsoft’s login interfaces. It also makes use of CloudFlare CAPTCHA to ensure that only human users advance, hindering automated detection technologies.

Cloudflare Workers and Traffic Monitoring

The PhaaS kit additionally hides its activities by utilizing Cloudflare’s programmable proxy endpoints, referred to as Workers, which examine incoming traffic and dynamically block suspicious behavior.

Countering the Threat

Security Guidelines

Okta advises the use of phishing-resistant authenticators, such as hardware security keys and smart cards. Training users to recognize phishing attempts and applying access controls can also help combat these threats.

Emerging Phishing Services

VoidProxy is not isolated in the PhaaS environment. Other platforms such as EvilProxy and Salty2FA have also surfaced, applying comparable MFA-bypassing techniques to infiltrate user accounts.

Conclusion

VoidProxy signifies a notable advancement in the domain of phishing assaults, with its capability to bypass multi-factor authentication and adeptly hide its infrastructure. By utilizing cutting-edge methods and budget-friendly resources, it presents a considerable risk to users of Microsoft and Google. Staying informed and investing in strong security measures are essential steps in warding off such threats.

Q & A

Q: What is VoidProxy?

A: VoidProxy is a phishing-as-a-service (PhaaS) platform aimed at users of Google and Microsoft, capable of bypassing multi-factor authentication procedures.

Q: How does VoidProxy circumvent MFA?

A: It utilizes Adversary in the Middle (AitM) phishing tactics, capturing session cookies to bypass MFA protections.

Q: What domains does VoidProxy utilize?

A: VoidProxy employs low-cost top-level domains such as .icu, .sbs, .cfd, .xyz, .top, and .home.

Q: How can users safeguard against such phishing threats?

A: Users should adopt phishing-resistant authenticators, receive training to identify phishing attempts, and enforce access limitations to protect their accounts.

Q: What is Cloudflare’s role in VoidProxy’s operations?

A: Cloudflare is utilized to obscure VoidProxy’s infrastructure via reverse proxy services and programmable proxy endpoints, complicating tracing and blocking efforts.

Q: Are there other platforms similar to VoidProxy?

A: Indeed, other services like EvilProxy and Salty2FA have also emerged, employing analogous techniques to bypass MFA and compromise accounts.

David Jones Urges Whole Organization to Leverage Data


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

David Jones Utilizes Data to Propel Retail Innovation

David Jones Utilizes Data to Propel Retail Innovation

David Jones encourages all segments of its business to adopt data

Quick Overview

  • David Jones introduces ‘Insights Avalanche’ to cultivate an internal data community.
  • New roles for data business partners bridge connections between data functions and business operations.
  • Snowflake platform utilized to enhance organizational data accessibility.
  • Investment directed towards generating measurable business value.
  • Evaluating Snowflake as a prospective customer data platform (CDP).

Creating a Data-Driven Culture

David Jones, a prominent retailer in Australia, is making significant efforts to weave data into its business practices. By launching an internal data community called ‘Insights Avalanche,’ the company intends to improve cooperation between technology and retail sectors. This effort is part of a larger plan to leverage the Snowflake platform for enhanced data accessibility and operational effectiveness.

The Importance of Data Business Partners

The establishment of data business partners represents a notable change in how David Jones aligns its data capabilities with business objectives. These positions are intended to merge the technical facets of data with the real-world difficulties encountered by different teams. By fluently communicating with each department, these partners foster a more unified approach to data application.

Optimizing Return on Investment

To optimize ROI, David Jones is shifting its focus from data infrastructure to intentional data application. By repurposing existing solutions for various scenarios and prioritizing governance and security, the retailer aims to shorten time-to-value while minimizing risk. Snowflake’s features support these ambitions by allowing safe testing without interfering with fundamental operations.

Investigating New Possibilities with Snowflake

In addition to functioning as a data fabric, Snowflake is under consideration for extra roles, including a customer data platform. This investigation illustrates David Jones’ strategic approach to using its current tools to address changing business demands, potentially lessening the requirement for separate solutions.

Conclusion

David Jones is dedicated to incorporating data into its retail strategy by fostering internal collaboration and aligning data efforts with business goals. Through the adoption of Snowflake, the retailer is seeking inventive methods to improve customer insights and operational effectiveness.

Q&A

Q: What is ‘Insights Avalanche’?

A:

‘Insights Avalanche’ is an internal data community initiated by David Jones to encourage collaboration between business and technology teams, ensuring improved data utilization across the organization.

Q: What are data business partners?

A:

Data business partners are newly created roles at David Jones designed to fill the gap between data functions and business activities, making sure that data initiatives align with organizational goals.

Q: How is Snowflake being applied by David Jones?

A:

Snowflake serves as a data fabric to provide better access to operational data, enhancing multiple business functions and enabling safe testing within the organization.

Q: What potential advantages come from using Snowflake as a CDP?

A:

Leveraging Snowflake as a customer data platform could empower David Jones to centralize customer insights, likely reducing the necessity for additional standalone solutions and improving customer engagement strategies.

Q: How does David Jones plan to guarantee ROI from its data investments?

A:

The company intends to ensure ROI through strategies aimed at minimizing time-to-value by reapplying existing solutions, concentrating on governance and security, and investigating new applications for current platforms.

Researchers Discover Creative Cryptomining Assault


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Darktrace Researchers Reveal Novel Cryptomining Assault

Overview

  • Darktrace detected a new cryptomining assault leveraging NBMiner malware.
  • This assault utilizes PowerShell and AutoIt for injecting processes within Windows.
  • With the flourishing cryptocurrency market, cryptojacking incidents have surged.
  • The malware connects to mining pools, targeting currencies such as Ravencoin.
  • Detection methods are hindered by advanced evasion techniques.

Unveiling a Fresh Cryptomining Method

In a pivotal finding, Darktrace researchers have recorded the initial instance of NBMiner cryptomining malware that employs a PowerShell-based tactic to infiltrate legitimate Windows processes with malicious code. This attack was identified on a retail and e-commerce network, representing a fresh advancement in the cryptojacking landscape.

Chronicle of the Attack

The incident initiated when an infected desktop device accessed a dubious IP address. A PowerShell script named infect.ps1 was retrieved, serving as the primary dropper for the malware. The script was extensively obfuscated using Base64 and XOR encoded information, highlighting the attackers’ advanced programming capabilities.

AutoIt’s Contribution to the Assault

After decryption, the script generated a valid AutoIt executable located in the application’s data directory of the system. The malware utilized sophisticated evasion strategies, specifically targeting the Windows Character Map application to attain full memory access and circumvent conventional security protocols. These techniques underscore the attackers’ comprehensive knowledge of Windows environments.

Strategies for Evasion and Persistence

In order to remain undetected, the malware employed a variety of anti-sandboxing and privilege escalation strategies. It verified the presence of antivirus software, proceeding only if Windows Defender was the exclusive protection in place. It also tried to bypass User Account Control warnings to secure enhanced privileges.

Deployment of the Cryptominer

Within the authentic process, the payload for cryptomining was allocated in memory, decrypted, and executed, simulating legitimate operations. This tactic complicates detection for security tools reliant on process observation. The cryptominer linked to the asia.ravenminer.com pool, mining Ravencoin while concealing its activities.

Conclusion

This newly identified cryptomining assault exemplifies the escalating sophistication of cyber threats in the cryptocurrency domain. By employing advanced methodologies in PowerShell and AutoIt for process injection, attackers can effectively mask malevolent activities as legitimate, presenting substantial difficulties for detection and counteraction.

Frequently Asked Questions

Q: What distinguishes this cryptomining attack?

A: This attack is remarkable for its implementation of a PowerShell-oriented strategy paired with AutoIt to inject harmful code into lawful Windows processes, making detection more difficult.

Q: What is causing the rise in cryptojacking?

A: The increase in cryptojacking corresponds with the rapid expansion of the cryptocurrency market, offering lucrative prospects for attackers seeking to exploit illicit mining.

Q: In what ways does the malware avoid detection?

A: The malware employs tactics such as anti-sandboxing, targeting legitimate processes for memory access, and checking for antivirus systems to evade detection.

Q: What measures can organizations take to safeguard against these attacks?

A: Organizations should implement advanced threat detection technologies, frequently update security measures, and train staff to recognize suspicious behaviors.

Fetch TV Concludes Four-Year Price Halt with Music-Centric Channel Growth


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Fetch TV Music Channel Expansion

Brief Overview

  • Fetch TV launches six new channels, which include Moonbug Kids and Declassified Military History.
  • Four additional Stingray music channels cater to a variety of musical preferences.
  • The Crunchyroll anime streaming service is now available, though it requires a dedicated subscription.
  • Subscription rates are rising for the first time since 2021, with most plans now priced at $7.99 monthly.
  • Customer feedback on the new channels and price increases has been mixed.
  • Fetch TV retains competitive pricing when compared to other services like Netflix and Disney+.

New Channel Line-Up at Fetch TV

Fetch TV has broadened its channel selection by adding six new channels and integrating Crunchyroll, the well-known anime streaming service. This is a notable change as the Australian pay-TV provider implements its first subscription price raise since 2021, starting from 1 September.

Moonbug Kids Channel

The Moonbug Kids Channel features well-liked children’s shows such as CoComelon, Blippi, and Little Angel, all ad-free. This introduction marks the first dedicated channel for Moonbug on Australian television.

Declassified Military History

Declassified Military History debuts as a distinct offering, featuring documentaries focused on warfare, military strategies, and intelligence operations, exclusively available in Australia through Fetch TV.

Stingray Music Channels

Fetch TV rolls out four genre-specific Stingray music channels: Stingray Loud (rock), Stingray Retro (classic hits), Stingray Country, and Stingray Hits. These channels offer round-the-clock music programming to satisfy a range of musical tastes.

Crunchyroll Streaming Integration

Anime fans can now enjoy access to over 39,000 episodes from more than 1,600 titles, including One Piece and My Hero Academia, through the new Crunchyroll app. A separate subscription is required, pricing between A$10.99 and A$13.99 monthly.

Subscription Price Changes and Customer Feedback

The price modification sees the Vibe, Knowledge, Variety, and Kids packs increasing to $7.99 per month, the Ultimate Pack to $24.99 per month, and the Entertainment Pack to $17.99 monthly. The Movie Box package remains at $2.99 monthly.

Fetch TV CEO Dominic Arena remarked, “This commitment to premium content illustrates our dedication to providing excellent value and a wide entertainment range for Australian families.” Nonetheless, customer reactions have varied, with some expressing frustration over the price increases coupled with channel additions viewed as lacking.

Competitive Pricing Context

Fetch TV’s pricing tweaks follow a four-year period without change, contrasting with several hikes from competitors like Netflix, Stan, and Disney+. Industry analysts point out Fetch’s pricing stability amidst escalating content licensing and inflation challenges.

Collaborations and Community Involvement

Nicolas Eglau, Managing Director EMEA, APAC & Global Distribution at Moonbug Entertainment, shared his excitement regarding the launch of the Moonbug Channel in Australia, highlighting the chance to share beloved children’s content with more families.

Terry Li, EVP Emerging Businesses at Crunchyroll, recognized Australia’s enthusiastic anime community and praised the integration with Fetch TV as a means to deliver top-notch Japanese content directly into Australian homes.

Managing Subscriptions

Current subscribers will see price adjustments reflected in their initial billing cycle beginning 1 September, potentially incurring pro-rata charges based on billing timing. Subscription management is available through the Fetch device menu, allowing users to cancel services while maintaining access until the end of their billing period.

The channel additions are designed to enhance Fetch’s role as a versatile entertainment option, combining traditional cable-style content with on-demand and streaming services like Netflix.

Overview

Fetch TV’s expansion featuring new channels and Crunchyroll integration comes alongside subscription price increases, ending a four-year price freeze. While some customers appreciate the varied content, others criticize the price hikes. Fetch TV continues to assert itself as a competitive alternative to streaming giants, emphasizing stable pricing and unique content collaborations.

Q: What new channels has Fetch TV introduced?

A: Fetch TV has added six channels: Moonbug Kids, Declassified Military History, and four Stingray music channels.

Q: What changes have been made to subscription prices?

A: Most channel packages will rise to $7.99 monthly, with the Ultimate Pack at $24.99 and the Entertainment Pack at $17.99. The Movie Box remains at $2.99 monthly.

Q: How does the Crunchyroll integration work?

A: Crunchyroll provides access to over 39,000 anime episodes through a dedicated app on Fetch TV, requiring a separate subscription between A$10.99 and A$13.99 per month.

Q: How have customers reacted to the changes?

A: Customer responses are varied, with some unhappy about the price increases and others welcoming the new content.

Q: How does Fetch TV’s pricing compare to competitors?

A: Fetch TV has kept pricing stable over the past four years, unlike rivals such as Netflix and Disney+, which have experienced multiple price hikes.

Q: What are the benefits of the new Moonbug Kids Channel?

A: The Moonbug Kids Channel offers ad-free access to popular children’s programs like CoComelon and Blippi, representing its first dedicated channel in Australia.

Q: Can customers manage or cancel their subscriptions?

A: Yes, subscribers can manage or cancel their subscriptions through their Fetch device menu, retaining access until the billing period concludes.

Tesla’s FSD Addresses Unsecured Right Turns in Australia


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Fast Overview

  • Tesla’s FSD (Supervised) is currently undergoing tests on Australian roads, concentrating on unprotected right turns.
  • The testing took place in Wodonga, encountering intricate traffic situations.
  • FSD demonstrated noteworthy performance but needed occasional human assistance.
  • Obstacles include fast-moving traffic, poor visibility, and tricky bends.
  • Input and testing are vital for software enhancements.

FSD’s Distinctive Challenges on Aussie Highways

Tesla’s Full Self-Driving (FSD) (Supervised) system is under strict evaluation in Australia, where right-hand drive and local driving conditions introduce distinct hurdles. While many are aware of its features in the US, Australian roads necessitate tailored adjustments, especially for managing unprotected right turns.

Tesla's FSD Navigating Complex Turns Down Under

Testing Location: Wodonga

During a recent assessment in Wodonga, FSD was tested to its extremes. The selected intersection demanded the vehicle traverse four lanes of traffic, prompting swift decision-making. This test reflected the work of US FSD tester Chuck Cook, who has thoroughly documented FSD’s performance with unprotected left turns in the US.

Intricate Traffic Conditions

The Wodonga evaluation posed various challenges, such as traffic traveling at 60 km/h and diminished visibility due to the setting sun. One intersection involved traffic approaching from a blind turn, complicating the scenario and necessitating precise timing from the FSD system.

Varied Outcomes Emphasize Need for Progress

The outcomes revealed a mix of successful autonomous navigation and instances requiring human intervention. While FSD displayed impressive capacity in assessing traffic speed and identifying safe openings, the necessity for occasional manual oversight pointed out areas needing enhancement.

Ongoing Feedback and Enhancement

Continual testing and feedback are vital for honing Tesla’s FSD technology. The knowledge gained from real-world experiences on Australian roads is crucial for upcoming software updates, ultimately striving for safer and more dependable self-driving capabilities.

See the Test in Motion

To gain a closer perspective on the test, encompassing both its successes and difficulties, watch the complete video below:

Conclusion

Tesla’s FSD (Supervised) is progressing on Australian roads, effectively navigating intricate intersections under tough conditions. While the technology shows potential, further advancement is essential to minimize human involvement and enhance safety.

Q: What distinguishes FSD testing in Australia?

A: Australia’s right-hand drive and particular road conditions, like unprotected right turns, create unique challenges not often faced in the US.

Q: Why was Wodonga selected for the evaluation?

A: Wodonga provided complex intersections with multiple traffic lanes and challenging visibility, making it an excellent testing site for FSD’s functions.

Q: How did FSD perform during the evaluation?

A: The FSD exhibited commendable results in various scenarios but needed human assistance in other cases, indicating areas for growth.

Q: What are the future steps for FSD development in Australia?

A: Ongoing testing and feedback from real-world experiences are crucial for refining FSD software, decreasing human intervention, and improving overall safety.

Western Sydney University Takes Action Against File-Sharing Websites Distributing Illegally Obtained Data


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Western Sydney University Tackles File-Sharing Platforms with Stolen Information

Overview

  • Western Sydney University sent takedown requests to file-sharing platforms harboring stolen information from a SSO breach.
  • The information was accessible online for as long as 16 days prior to removal.
  • The information comprised personal data, identification documents, and study identifiers.
  • Dark web information continues to be available due to its characteristic.
  • A former student has been charged concerning the cyber crimes.

Rapid Action by the University Following Data Breach

Western Sydney University has undertaken immediate measures after a breach of its single sign-on (SSO) system. This incident resulted in sensitive information being accessible on multiple file-sharing platforms, leading the university to issue three takedown requests. The information was live for 16 days before it was successfully eliminated from the sites.

WSU acts against file-sharing platforms containing stolen information

Insights into the Data Breach

The university revealed that the data breach took place between June 4 and 8, 2025, with information appearing in two open web postings and one dark web posting. The datasets included personal data, document identification numbers, and government identifiers. Although the university succeeded in removing information from open web sites by June 8, data on the dark web remains available.

Effect on the Community and Police Involvement

Vice-Chancellor and President George Williams expressed profound regret regarding the incidents and recognized the pressure it has placed on the university community. He commended the NSW Police for their work, which resulted in the arrest of a former student charged with the cyber crimes.

Conclusion

Western Sydney University has promptly addressed a crucial data breach involving its SSO system. Despite the ongoing presence of data on the dark web, the university’s cooperation with law enforcement has led to the capture of a suspect, highlighting their commitment to protecting their community’s information.

Questions & Answers

Q: What was the essence of the data breach at Western Sydney University?

A: The breach concerned the university’s single sign-on system, revealing personal data, identity documents, and study identifiers.

Q: For how long was the data online?

A: The data was available on file-sharing platforms for a maximum of 16 days before it was removed.

Q: Why is dark web data still up?

A: Due to the characteristics of the dark web, information posted there cannot be readily eliminated.

Q: Has anyone been charged related to the data breach?

A: Indeed, a former student has been charged concerning the cyber crimes.

Q: What steps has the university taken in reaction to the breach?

A: The university issued takedown requests, eliminated information from public platforms, and collaborated with law enforcement to apprehend a suspect.

Q: What impact has the breach had on the university community?

A: The breach has imposed a significant burden on the university community, evoking an apology from the vice-chancellor.

Government Surveillance Software Dispatched through Zero-Click Apple and WhatsApp Flaw Combination


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

  • Recent vulnerabilities in WhatsApp and Apple’s software were exploited to implement government spyware.
  • The exploits were associated with a zero-click attack requiring no user involvement.
  • Patches have been issued by Apple and WhatsApp to address the vulnerabilities.
  • Amnesty International is probing the ramifications for journalists and human rights advocates.
  • Due to security worries, the US House of Representatives has prohibited the use of WhatsApp on staff devices.
  • The NSO Group had previously been held accountable for comparable vulnerabilities linked to WhatsApp.

Zero-Click Exploit: A Rising Trend in Government Spyware

Recent information from Meta’s secure messaging app, WhatsApp, indicates vulnerabilities that might have been leveraged by an unidentified government to install spyware without user interaction. This troubling situation underscores the persistent risk of advanced cyberattacks targeting mobile devices.

Government spyware via zero-click Apple and WhatsApp vulnerabilities

Flaws in Apple and WhatsApp

WhatsApp has issued a security advisory regarding a vulnerability, designated CVE-2025-55177, which was exploited along with a defect in Apple’s image handling framework. This issue detected within iOS permitted attackers to target particular users. Apple quickly addressed the memory corruption issue by releasing a patch in iOS and iPadOS 18.6.2.

WhatsApp’s Security Vulnerability

The security issue in WhatsApp originated from insufficient authorization of messages for synchronizing linked devices. This vulnerability impacted iOS application versions before 2.25.21.73 as well as other platforms, allowing unauthorized processing of content from random URLs on targeted devices.

Effects on Journalists and Human Rights Advocates

Amnesty International’s Security Labs are examining the effect of this campaign on various individuals, especially journalists and human rights advocates. Donncha Ó Cearbhaill from Amnesty highlighted that government spyware presents significant dangers and recommended that users keep their devices updated and utilize security features such as Apple’s iOS Lockdown Mode or Android’s Advanced Protection Mode.

WhatsApp Ban by the US House of Representatives

In a related action, the US House of Representatives has prohibited WhatsApp for staff devices due to its classification as a high-risk application stemming from its insufficient transparency in data handling and possible security issues. This further illustrates mounting concerns regarding the platform’s vulnerabilities.

Previous Exploits by NSO Group

Additionally, the Israeli spyware firm NSO Group was found responsible for hacking WhatsApp to target over 1400 users through the Pegasus malware. The corporation was ordered to pay US$167 million in damages to WhatsApp, representing a notable legal victory against the misuse of spyware.

Conclusion

The recent security flaws in WhatsApp and Apple’s systems emphasize the shifting dynamics of threats within cybersecurity. With attackers utilizing zero-click exploits, the critical need for strong security protocols and regular updates is clear. These events also highlight the necessity for transparency and accountability among app developers and tech companies.

Q: What does a zero-click exploit entail?

A: A zero-click exploit is a vulnerability that allows attackers to breach a device without requiring any action from the user, rendering it highly perilous and hard to identify.

Q: How can users defend themselves against such exploits?

A: Users should ensure their devices are updated with the latest security updates and activate protective features like Apple’s iOS Lockdown Mode or Android’s Advanced Protection Mode.

Q: Why was WhatsApp banned by the US House of Representatives?

A: The US House of Representatives prohibited WhatsApp due to apprehensions regarding its transparency in data protection and associated security threats.

Q: What is the NSO Group, and what role did they play?

A: The NSO Group is an Israeli spyware company held liable for hacking WhatsApp and targeting users with Pegasus malware, leading to significant legal and financial consequences.

Woolworths Detaches Big W from Common Technology Framework


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Woolworths Revamps Big W’s Technological Framework

Quick Read

  • Woolworths Group is isolating Big W from its collective tech framework.
  • This decision responds to Big W’s $35 million loss in 2025.
  • Big W will shift to an independent, purpose-built platform.
  • Growth in online visits despite financial downturn signifies potential expansion areas.
  • Woolworths intends to develop a new automated fulfilment center in Melbourne.

Big W’s Digital Shift

Woolworths Group has revealed intentions to detach Big W from its collective technology framework, moving the department store to a “standalone, purpose-built” platform. This strategic initiative aims to boost Big W’s operational effectiveness following a considerable financial decline.

Economic Hurdles and Possibilities

The move comes after Big W’s reported $35 million loss for the 2025 financial year. In spite of the loss, online engagement saw a significant rise, with traffic to Big W’s website and app increasing by over 20%. This upswing was fueled by the expansion of its product selection via MyDeal and new seller collaborations.

Executive Perspectives

Amanda Bardwell, CEO and Managing Director of Woolworths Group, recognized the obstacles while also emphasizing growth potential in areas like pet care and health and beauty. “Our aim is to provide Big W with the proper foundations for success,” Bardwell remarked during the group’s earnings announcement.

Technological Advancements

Previously, Big W was integrated into Woolworths Group’s transition of its SAP applications to Microsoft Azure in 2022. The group is also progressing in its shift from the 20-year-old SAP ECC5 system to S4/HANA, anticipated to complete by 2026.

Growth Initiatives

To further enhance its operational capabilities, Woolworths Group announced plans for a new automated customer fulfilment center in northern Melbourne. This facility aims to increase order capacity and improve delivery times utilizing Knapp automation technology.

Woolworths’ Overall Financial Status

Overall, Woolworths Group concluded the year with a strong financial performance, recording a net profit after tax of $1.4 billion, supported by $69 billion in revenue.

Woolworths detaches Big W from shared technology infrastructure

Summary

Woolworths Group’s tactical decision to separate Big W from its shared technology framework is designed to tackle financial challenges and enhance the performance of the department store. By shifting to an independent platform, Big W is ready to seize growth opportunities across various sectors, backed by cutting-edge technology and improved operational capacity.

Q&A

Q: Why is Woolworths detaching Big W from its shared tech framework?

A: Woolworths is taking this step to improve Big W’s operational efficiency and tackle its financial obstacles by transitioning to a standalone, purpose-built platform.

Q: What led to Big W’s $35 million loss in 2025?

A: Even with increased online traffic, Big W encountered financial difficulties due to various operational issues, leading Woolworths to revamp its systems.

Q: How is Woolworths planning to enhance Big W’s performance?

A: Woolworths is set to implement an independent technology platform for Big W, concentrating on growth sectors such as pet care and health and beauty, as well as constructing a new automated fulfilment center.

Q: What technological improvements is Big W undergoing?

A: Big W is in the process of transitioning its SAP applications to Microsoft Azure and is projected to complete the migration to S4/HANA by 2026.

Q: How did Woolworths perform financially overall?

A: Woolworths Group reported a net profit after tax of $1.4 billion, with total revenue reaching $69 billion.

Discover the Golden Age of Gaming with LASER’s Latest All-in-One Retro Projector


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Quick Read

  • LASER unveils a Retro Gaming Projector equipped with over 80 vintage games.
  • Offers ROM emulation support for NES, SNES, Mega Drive, and N64.
  • Includes a pair of wireless controllers and a 120-inch display.
  • Operates on Android OS with HDMI and USB ports.
  • Priced at A$299 at major retailers across Australia.

A Trip Down Memory Lane

The Australian electronics brand LASER is bringing the charm of arcade gaming into residences with its latest Retro Gaming Projector. This all-in-one entertainment device comes pre-loaded with over 80 officially licensed classic games, ready to provide big-screen retro excitement anyplace.

ROM Emulator Compatibility

In addition to the built-in game library, the projector features ROM emulator compatibility for legendary consoles like the NES, SNES, Mega Drive, and N64. This functionality allows gamers to experience the joy of classic gaming on any wall space available.

Specifications

The LASER Retro Gaming Projector is crafted for immediate enjoyment. It comes with two wireless controllers, a remote, and a large 120-inch fabric screen. Equipped with built-in speakers, simply power it on to convert your area into a gaming haven.

Connectivity options include HDMI and USB inputs, allowing you to link external devices such as a Nintendo Switch, laptop, or DVD player. You can enhance your sound experience by connecting external speakers. With an Android OS, the projector also functions as a complete entertainment system, granting access to the Google Play Store for additional games and streaming services.

Highlighted Features

  • 80 retro games included: Immerse yourself in a chosen selection of arcade classics, platformers, and fighting games.
  • Built-in emulators + ROM compatibility: Enjoy gaming across different eras with support for numerous consoles.
  • Two wireless controllers: Experience hassle-free gaming for solo or multiplayer gameplay.
  • 120” projection: Engage in an immersive, large-screen experience with automatic keystone adjustment.
  • Android OS: Access streaming platforms and mobile games for a full entertainment experience.
  • HDMI & USB ports: Easily connect to external content or sound systems.
  • Portable design: Take it along for an impromptu retro game evening.

The Game Library Offered

The projector provides a broad library ready for play, covering various genres. Racing enthusiasts can enjoy classics such as Street Racer, World Rally, and the Top Racer series. The collection also features sports, action platformers, shooters, and puzzle games, catering to every gaming taste.

Cost and Availability

The LASER Retro Gaming Projector retails in Australia for A$299. It can be acquired from retailers like Harvey Norman, JB Hi-Fi Marketplace, The Good Guys, Bing Lee, and Retravision.

Conclusion

LASER has assembled an appealing offering for fans of retro gaming. With included controllers, a sizable screen, and a rich game library, it serves as a full arcade experience in one package. Its functionality as an Android-powered projector significantly enhances its value. Although ROM support is a significant advantage, compatibility may vary; nonetheless, the pre-loaded 80 games promise ample entertainment right from the start.

Overview

The LASER Retro Gaming Projector provides a nostalgic gaming adventure with contemporary ease. Its pre-installed games, emulator options, and Android features make it a flexible entertainment choice for any home. Offered at a reasonable price, it’s a fantastic option for retro gaming aficionados throughout Australia.

Q&A

Q: What games are provided with the projector?

A: The LASER Retro Gaming Projector comes with more than 80 classic games from various genres, including racing, sports, action platformers, shooters, and puzzles.

Q: Can I connect additional devices to the projector?

A: Absolutely, the projector has HDMI and USB ports that enable connections with devices like a Nintendo Switch, laptop, or DVD player.

Q: Does the projector support modern gaming systems?

A: While it is mainly focused on retro gaming, the HDMI connectivity permits usage with modern gaming systems and other devices.

Q: Is the projector designed for portability?

A: Yes, its portable plug-and-play design allows for straightforward setup anywhere, making it ideal for game nights with friends.

Q: How does the ROM emulator functionality operate?

A: The projector supports ROM emulation for consoles like NES, SNES, Mega Drive, and N64, enabling you to play downloaded games from these platforms.

Q: Where can I buy the LASER Retro Gaming Projector?

A: It is available for purchase in Australia at Harvey Norman, JB Hi-Fi Marketplace, The Good Guys, Bing Lee, and Retravision.

Westpac Adopts AIOps and Event-Driven Automation Technologies


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Rapid Overview

  • Westpac implements event-driven automation and AIOps within a broad infrastructure automation initiative.
  • The financial institution is moving from AWX to Red Hat Ansible Automation Platform (AAP) for enterprise-level assistance.
  • Partnership with Red Hat bolsters training, engineering solutions, and shapes product trajectories.
  • Event-driven automation enhances IT resource oversight and elevates customer satisfaction.
  • AIOps harnesses AI to streamline processes, mitigating outages and improving services.

Automation Progress

Westpac is advancing its infrastructure automation efforts by embracing event-driven automation and AIOps. This shift, featured during a Red Hat Ansible event in Sydney by Sean Dudding, illustrates a deliberate move to transform and improve the customer experience through automation.

Dudding stressed that the bank’s main objective is to provide automation that aids internal teams in effectively managing IT resources, which in turn benefits millions of Australian customers.

Transitioning from AWX to Ansible Automation Platform

At first, Westpac relied on AWX, a complimentary, open-source controller for Ansible automation tasks. Nonetheless, the bank has now shifted to the enterprise-supported Red Hat Ansible Automation Platform (AAP). This shift was motivated by the necessity for around-the-clock support and further advantages such as improved training options and direct engineering partnership with Red Hat.

Dudding pointed out that collaborating with Red Hat allows Westpac to impact product roadmaps, guaranteeing that the bank’s requirements are satisfied while also influencing the future progress of Red Hat products.

Primary Advantages of AAP

The choice to embrace AAP extends beyond support to include the intangible benefits of collective knowledge and engineering collaboration. The bank has asked for improvements to the event-driven automation engine, facilitating modifications to event streams for a robust automated infrastructure.

This strategic alliance with Red Hat has also nurtured deeper connections between the organizations, enabling a smoother integration of automation solutions.

Enhancements in Event-Driven Automation and AIOps

By hosting AAP on Red Hat OpenShift with cross-site load balancing, Westpac emphasises event-driven automation and AIOps. Dudding noted the potential of event-driven automation to oversee trusted event sources, initiating automation as specific events unfold. This strategy leverages existing engineering advancements to maximise return on investment.

Furthermore, AIOps is advancing to activate automated processes via AI, which significantly lowers the likelihood of outages and enhances customer services. This progression highlights Westpac’s dedication to utilising technology to boost operational efficiency and the customer experience.

Conclusion

Westpac’s integration of event-driven automation and AIOps signifies a crucial achievement in its infrastructure automation strategy. By adopting the Red Hat Ansible Automation Platform, the bank secures enterprise support and improved collaboration prospects, propelling a revolutionary approach to IT resource management and customer service enhancement.

Q: What is the principal objective of Westpac’s automation program?

A: The main objective is to transform the infrastructure landscape and enhance the customer journey through automation.

Q: What prompted Westpac to shift from AWX to AAP?

A: Westpac transitioned to AAP for enterprise-level support and additional advantages such as improved training and collaboration with Red Hat.

Q: In what way does event-driven automation benefit Westpac?

A: It enables Westpac to monitor event sources and initiate automation, thus optimising IT resource management and improving the customer experience.

Q: What is AIOps’ role in Westpac’s strategy?

A: AIOps employs AI to automate tasks, reducing outages and enhancing service quality.

Q: How has the collaboration with Red Hat aided Westpac?

A: The collaboration offers training, engineering joint efforts, and influence over Red Hat’s product direction, benefiting Westpac’s automation efforts.

Q: What infrastructure backs Westpac’s automation platform?

A: The Ansible Automation Platform is hosted on Red Hat OpenShift with cross-site load balancing for enhanced reliability.