Blog - Page 14 of 249 - Techbest - Top Tech Reviews In Australia

Atlassian to Cut Around 1,600 Positions


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Atlassian’s Strategic Transition: AI and Enterprise Sales

Atlassian’s Strategic Transition: AI and Enterprise Sales

Quick Read

  • Atlassian plans to terminate approximately 10% of its staff, affecting 1,600 employees.
  • Emphasis shifts toward artificial intelligence and enterprise sales.
  • Layoffs anticipated to incur expenses between $315 million and $331 million.
  • Restructuring expected to be finalized by the end of the fourth quarter.
  • Executive positions will see changes with new CTO appointments.

Introduction

In a major development, Atlassian has revealed intentions to reduce its workforce by roughly 10%, impacting 1,600 employees worldwide. This choice complements the company’s strategic shift towards artificial intelligence (AI) and enterprise sales, marking a transformative period for the Australian enterprise software leader.

Atlassian to eliminate approximately 1600 jobs

Financial Impact

Atlassian foresees expenses ranging from $315 million to $331 million due to the layoffs and reduction of office spaces. These costs are expected to primarily be accounted for in the third quarter. The strategic decision to “rebalance” resources is directed toward investing in AI and enterprise sales, as articulated by CEO Mike Cannon-Brookes.

Market Reaction

In spite of the layoffs, Atlassian’s stock saw a nearly two percent increase in after-hours trading. This reaction indicates investor assurance in the company’s forthcoming path, which emphasizes the evolution of teamwork in the age of AI. However, the software sector is facing heightened scrutiny from investors wary of AI’s disruptive capabilities.

Executive Changes

As part of the reorganization, Rajeev Rajan will resign as Chief Technology Officer (CTO) by March 31. In his stead, Taroon Mandhana will assume the position of CTO of Teamwork, while Vikram Rao will take on the role of CTO of Enterprise and Chief Trust Officer, managing the AI-centered strategy.

Summary

Atlassian’s choice to lay off 1,600 employees signifies a crucial transition towards AI and enterprise sales. With significant financial repercussions and a reshuffle in executive roles, the company is set to respond to the changing technological environment. The restructuring process is anticipated to wrap up by the end of the fourth quarter.

Q: Why is Atlassian reducing its workforce?

A: The layoffs are a component of Atlassian’s initiative to concentrate on artificial intelligence and enterprise sales, necessitating resource reallocation.

Q: What financial consequences will the layoffs bring?

A: The firm expects to incur expenses ranging from $315 million to $331 million, largely within the third quarter.

Q: How did the market respond to Atlassian’s announcement?

A: Atlassian’s shares increased nearly two percent in after-hours trading, reflecting investor confidence in the company’s strategic direction.

Q: What changes are taking place within Atlassian’s executive team?

A: Rajeev Rajan will resign as CTO. Taroon Mandhana and Vikram Rao will take on new CTO positions, concentrating on teamwork and AI strategies.

Q: When will the restructuring be finalized?

A: The restructuring is expected to be largely complete by the end of the fourth quarter.

CBA Chief Impersonated in Global Investment Fraud on Facebook


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

International Investment Fraud Aims at Facebook Users with Phony CBA Ads

Quick Overview

  • An international investment fraud effort aimed at Facebook users with counterfeit Commonwealth Bank advertisements.
  • Fraudsters executed campaigns in 25 nations utilizing sophisticated evasion methods.
  • Meta introduced new features and teamed up with law enforcement to tackle fraud.
  • Users are encouraged to authenticate news via legitimate media platforms and not to invest money based on social media advertisements.

Investment Fraud Takes Advantage of Facebook Ads

A recent worldwide investment fraud effort took advantage of paid advertisements on Meta’s Facebook, presenting a fictitious scandal related to the Commonwealth Bank (CBA). Security firm Bitdefender revealed this campaign, which disseminated fabricated news across 25 nations, targeting individuals with investment fraud schemes.

CBA leader impersonated in international investment fraud on Facebook

Examination of International Campaign

From February 9 to March 5, Bitdefender examined 310 malvertising initiatives, identifying over 26,000 advertisements designed to ensnare Facebook users in investment fraud schemes. In Australia, approximately 12 campaigns impersonated CBA and journalists, employing fabricated TV interviews to lend credibility.

The initiative utilized sophisticated tactics such as previews linking to legitimate domains and counterfeit media websites. Cyrillic homoglyph substitutions assisted in circumventing content filters, while authentic-seeming ads redirected users to fraudulent sites, where personal information was collected under the pretense of investment opportunities.

Fraudulent Brokerage Strategies

Victims frequently encountered fake brokers who urged them to make initial deposits into bogus investments. Scammers employed false dashboards to showcase imaginary early gains, pressuring victims to augment their deposits, which ultimately became difficult to withdraw.

Bitdefender suspects that Russian-speaking associates, including individuals from Ukraine, are behind these schemes, indicated by the use of Cyrillic text.

Meta’s Initiative Against Scams

Facebook’s parent organization, Meta, has reacted by implementing tools to safeguard users from fraud. These include notifications for dubious friend requests, warnings regarding WhatsApp device linking, and improved scam detection in Messenger.

Meta has worked with law enforcement in a Joint Disruption Week operation, resulting in 21 arrests and disabling over 150,000 accounts linked to scams. Last year, Meta removed over 159 million scam advertisements, with 92% eliminated prior to reporting.

Meta’s Advertising Income

Documents reviewed by Reuters indicated that Meta could derive up to 10% of its 2026 income from advertising scams, amounting to nearly $25 billion. This raises significant concerns about the platform’s involvement in sustaining scams.

Conclusion

The investment scam aimed at Facebook users with fraudulent CBA advertisements underscores the dangers of social media advertising. Although Meta is taking measures to address fraud, users must remain alert, verify information from credible sources, and avoid financial decisions based on social media advertising.

Common Questions

Q: How were Facebook users ensnared in this scam?

A: Users were lured through deceptive ads featuring a fabricated CBA scandal, enticing them into investment fraud traps.

Q: What advanced methods did scammers employ?

A: Scammers utilized authentic-seeming previews, fake media domains, and Cyrillic homoglyphs to bypass content filters.

Q: How is Meta addressing these scams?

A: Meta has rolled out anti-fraud tools and collaborated with law enforcement to deactivate scam networks and accounts.

Q: What actions should users take to safeguard themselves?

A: Users should verify news on credible media platforms and refrain from making financial investments based on social media ads.

JLab Go Air Sport Wireless Workout Earbuds Review


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

JLab Go Air Sport, Wireless Workout Earbuds Featuring C3 Clear Calling, Secure Earhook Sport Design, 32+ Hour Bluetooth Playtime, and 3 EQ Sound Settings (Graphite)

Apple Releases Essential Update for ‘Coruna’ Vulnerability


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Apple Issues Essential Security Update for Coruna Exploit

Summary Overview

  • Apple launches iOS 15.8.7 and iOS 16.7.15 to resolve Coruna vulnerabilities.
  • The Coruna exploit encompasses 23 vulnerabilities across iOS versions 13 through 17.2.1.
  • Detected by Google’s Threat Intelligence Group in early 2026.
  • Coruna is exploited by both state-sponsored and financially motivated actors.

Update Rollout for iOS and iPadOS

Apple has introduced crucial updates, iOS 15.8.7 and iOS 16.7.15, to tackle vulnerabilities linked to the Coruna exploit. These enhancements are vital for devices that cannot upgrade to the latest iOS iteration, helping to keep older devices secure. Corresponding versions of iPadOS have been provided with these updates as well.

Apple addresses Coruna vulnerabilities

Understanding the Coruna Exploit

The Coruna exploit toolkit, noted by Google’s Threat Intelligence Group (GTIG) in early 2026, comprises 23 exploits across five comprehensive iOS exploit chains. This toolkit specifically targets devices operating on iOS versions from 13 to 17.2.1, utilizing sophisticated techniques alongside non-public exploitation methods and evasion strategies.

Chronology and Identification of Coruna

First detected by GTIG in February 2026, Coruna was associated with a client of a commercial surveillance vendor. It was subsequently traced back to watering hole attacks orchestrated by UNC6353, a group believed to be state-sponsored from Russia, which aimed at Ukrainian websites. GTIG further linked Coruna to a financially driven Chinese criminal organization that propagated the exploit through counterfeit cryptocurrency exchanges and gambling platforms.

Detailed analysis of Coruna exploit

Source: GTIG

Investigating Coruna’s Architecture

Researchers obtained significant insights into the exploit’s framework after a threat actor inadvertently deployed a debug version. This mistake revealed internal code designations and documentation, illuminating the exploit’s complex architecture.

Conclusion

In light of the Coruna exploit, Apple has proactively rolled out updates for legacy iOS and iPadOS versions, protecting users from potential dangers. The partnership between industry figures like Google and security firms highlights the necessity for diligence and prompt responses to emerging cyber threats.

FAQs

Q: Which devices are impacted by the Coruna exploit?

A: Devices running on iOS versions 13 to 17.2.1 are impacted by the Coruna exploit.

Q: How did analysts unearth the specifics of the Coruna exploit?

A: Analysts uncovered the specifics after a threat actor accidentally released a debug version of the exploit, disclosing internal code names and documentation.

Q: Who is behind the Coruna attacks?

A: The attacks have been associated with a suspected Russian state-sponsored group and a financially motivated Chinese criminal organization.

Q: What steps has Apple taken regarding the Coruna vulnerabilities?

A: Apple has launched iOS 15.8.7 and iOS 16.7.15 updates to rectify the vulnerabilities related to Coruna for earlier devices.

XIAOMI REDMI Buds 8 Pro Review


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

XIAOMI REDMI Buds 8 Pro, True Wireless Bluetooth Earbuds in-Ear, 55dB Active Noise Cancelling, Triple Driver, Hi-Res HiFi Sound, Dolby Audio, 33h+ Battery Life, Bluetooth 5.4, IP54, Obsidian Black

UAE Flags Escalating Risk of Wiper Malware in Cybersecurity Advisory


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Increasing Danger of Wiper Malware

Snapshot

  • Wiper malware is making a comeback as a notable cyber threat, with the goal of irrevocably eliminating data.
  • In contrast to ransomware, wipers provide no recovery alternatives, resulting in total data eradication.
  • The UAE Cyber Security Council has raised an alert on wiper malware targeting key sectors.
  • Australian enterprises face risks owing to the globally interconnected digital framework.
  • Strong backup strategies and zero-trust frameworks are key defensive approaches.

Technical Features and Delivery Channels

Wiper malware focuses on crucial computer storage locations, such as the Master Boot Record (MBR) or NTFS Master File Table, causing systems to become unbootable. Recent forms utilize multi-threading to swiftly erase files across networks, outpacing security measures.

Attacks frequently exploit weaknesses in software or employ phishing strategies, capitalizing on geopolitical instability to maximize chaos.

The Advisory from the UAE Cyber Security Council

The UAE Cyber Security Council has released a caution regarding heightened wiper malware activity, particularly targeting financial and energy sectors. These assaults often resemble ransomware, hindering timely reactions.

UAE Cyber Security Council warns of wiper malware threat.
The UAE Cyber Security Council alerts about the wiper malware threat. Image: Twitter/@cscgovae

Importance to the Australian Business Sector

The UAE’s alert is relevant for Australia due to worldwide digital interlinks. Malware can swiftly propagate through systems, endangering vital infrastructure such as power grids and healthcare services. Wiper assaults incur hefty IT reconstruction expenses, leading to significant downtime and financial repercussions.

Geopolitical Landscape and the Evolution of Cyber Warfare

The uptick in wiper malware correlates with contemporary warfare, where digital sabotage enhances physical confrontations. Tools originally intended for military functions can leak to the general population or be utilized by criminals, impacting even smaller businesses.

This transition from data theft to annihilation necessitates new defensive tactics focusing on system operationality, not just data preservation.

Strategic Protection Recommendations

Australian organizations should adopt resilient offline or immutable backup solutions, ensuring that backups are secure from network threats. Zero-trust architectures and network segmentation can help constrain the spread of malware. Regular testing of incident response plans for total data loss scenarios is vital.

Staying Alert in a High-Risk Environment

Destructive cyber incidents are expected to escalate amid ongoing geopolitical strife. The UAE advisory highlights the worldwide threat posed by data destruction. Remaining aware of global threats assists Australian businesses in strengthening defenses against emerging challenges.

Wiper malware heightens cyber risks beyond financial offenses, making preparedness and swift detection crucial for maintaining business continuity.

Conclusion

Wiper malware represents a growing danger, seeking total data elimination and operational disruption. With alerts from the UAE Cyber Security Council, Australian businesses must bolster their cyber defenses. Strategic actions like robust backup systems and zero-trust frameworks are vital in addressing these threats.

Q&A

Q: How does wiper malware differ from ransomware?

A: Unlike ransomware, which encrypts data and demands payment for decryption, wiper malware aims to utterly erase data without any recovery options.

Q: Why is the warning from the UAE significant for Australia?

A: Due to interconnected global supply chains and digital frameworks, malware can rapidly proliferate from one area to another, posing threats to crucial Australian sectors.

Q: How can businesses safeguard against wiper malware?

A: Implement strong offline or immutable backup systems, employ zero-trust architecture, and create network segmentation to mitigate malware proliferation and ensure data recoverability.

Q: What impact does geopolitical conflict have on the rise of wiper malware?

A: Geopolitical strife often involves digital sabotage tools, which can infiltrate the public sphere or be exploited by criminals, escalating global cyber vulnerabilities.

Q: How should businesses ready themselves for possible wiper malware attacks?

A: Companies should consistently evaluate incident response protocols for total data loss, ensuring they are equipped to quickly reconstruct IT infrastructures if necessary.

Razer Hammerhead True Wireless (2nd Gen) Review


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Razer Hammerhead True Wireless (2nd Gen) – True Wireless Low Latency Earbuds with Razer Chroma (Active Noice Cancelation, 60ms Low Latency Gaming Mode, In-Ear Design, RGB Chroma) Black

Coles Group Chief Technology Officer Exits After Only One Year


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Departure of CTO at Coles Group

Brief Overview

  • Coles Group CTO Mike Sackman departs after just one year.
  • COO Matt Swindells is stepping in as interim replacement.
  • Sackman advanced Coles’ tech strategy and cyber security measures.
  • Implemented tools such as ChatGPT Enterprise and Copilot.
  • His departure comes after a reshuffle in leadership following John Cox’s exit.

Another Leadership Shift in Coles Group’s Tech Division

Coles Group is undergoing yet another change in leadership as Chief Technology Officer Mike Sackman exits after a brief tenure of merely one year. His departure signifies a significant transition for the Australian grocery leader as it works through its ambitious plans for technological transformation.

Coles Group CTO departing after a year

Insights into Sackman’s Role and Contributions

Sackman, who assumed the position in March 2026, brought an extensive background from his previous CIO positions at UK retail leaders such as John Lewis Partnership, Waitrose, and Argos. Throughout his year at Coles, he played a crucial role in pushing the company’s tech agenda forward, particularly through the execution of their 3D strategy.

Enhancements Through the 3D Strategy

The 3D strategy remained at the forefront during Sackman’s time, aiming to position Coles as a leading destination for food and drink, while fast-tracking digital advancements and ensuring reliable service delivery. Under his guidance, Coles adopted advanced tools like ChatGPT Enterprise and Copilot, which optimized routine operations and elevated work quality throughout the organization.

Reinforced Cyber Security Protocols

Sackman placed significant importance on cyber security, enhancing the safeguarding of customer and employee information. His initiatives ensured that Coles’ physical and online platforms operated efficiently, strengthening trust among consumers and stakeholders alike.

Leadership Transition and Future Outlook

As Sackman heads back to the UK, Coles’ COO Matt Swindells will act as interim CTO. This shift follows the exit of previous CTO John Cox, who departed after a restructuring of the tech leadership towards the end of 2026. Coles is now charged with the task of identifying a fitting successor to continue pushing its technological evolution.

Conclusion

The exit of Mike Sackman from Coles Group after just one year as CTO signifies a critical juncture for the organization. His contributions towards advancing technology programs and enhancing cyber security have laid a strong groundwork for future progression. As Coles deals with this leadership alteration, the company remains committed to its strategic techno-objectives and further growing its digital footprint.

Q: What led to Mike Sackman’s departure from Coles Group?

A: Sackman is returning to the UK, although Coles has not specified the exact timeline of his departure.

Q: Who will serve as the interim CTO at Coles?

A: Matt Swindells, who is the Chief Operating Officer of Coles, will take over as the interim CTO.

Q: Which technology initiatives did Sackman spearhead at Coles?

A: Sackman played a key role in executing Coles’ 3D strategy, rolling out tools like ChatGPT Enterprise and Copilot, and enhancing cyber security practices.

Q: What does Coles’ 3D strategy entail?

A: The 3D strategy is designed to establish Coles as a key destination for food and beverages, accelerate digital initiatives, and guarantee dependable service delivery.

Q: In what ways did Sackman bolster cyber security at Coles?

A: Sackman improved Coles’ cyber security measures to ensure the protection of customer and team member data, facilitating seamless operations both in physical stores and online.

Q: What were Sackman’s prior positions before joining Coles?

A: Prior to joining Coles, Sackman held CIO positions at UK retailers such as John Lewis Partnership, Waitrose, and Argos.

Wireless Bluetooth 5.4 in-Ear Headphones Review


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Bluetooth Headphones, Wireless Bluetooth 5.4 in-Ear Headphones Bluetooth with 4 Mics, 50H Wireless Headphones ENC Noise Cancelling, Deep Bass Earbuds, IP7 Waterproof Earphones, LED Display