Blog - Page 18 of 184 - Techbest - Top Tech Reviews In Australia

RondoDox IoT Botnet Grows to 56 Vulnerabilities in Intense Campaign


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Expansion of the RondoDox IoT Botnet Campaign

  • The RondoDox IoT botnet now targets 56 vulnerabilities across over 30 different vendors.
  • This botnet employs an “exploit shotgun” technique to breach targets.
  • The vulnerabilities targeted include command injection, path traversal, and memory corruption.
  • RondoDox imitates traffic from well-known gaming and VPN services to avoid detection.
  • It is distributed using a loader-as-a-service (LaaS) model.
  • Systems targeted encompass consumer gadgets and enterprise software like Oracle WebLogic.
  • The malware is compatible with multiple Linux architectures.
RondoDox IoT botnet increases to 56 exploits in shotgun campaign

Evolving Strategies and Tactics of RondoDox

Initially focused on only two vulnerabilities, RondoDox has greatly broadened its attack landscape, now compromising 56 vulnerabilities across more than 30 vendors. This expansion is defined by the “exploit shotgun” method, wherein multiple exploits are deployed simultaneously to identify successful points of compromise.

Exploitation Techniques and Vulnerabilities

The botnet’s toolkit comprises an impressive selection of exploits, featuring 50 command injection vulnerabilities, two path traversal issues, as well as examples of buffer overflow, authentication bypass, and memory corruption. Significantly, RondoDox also takes advantage of legacy vulnerabilities, including the well-known Shellshock bug from a decade ago.

Persistence and Evasion Strategies

RondoDox utilizes advanced methods to ensure persistence and evade detection. It mimics authentic traffic from gaming services and VPNs, camouflaging its actions as regular network activity. The malware alters system startup files and creates crontab entries to ensure its continued operation on compromised devices.

Loader-as-a-Service Distribution

Distributed via a loader-as-a-service (LaaS) framework, the botnet is bundled with other malicious payloads such as Mirai and Morte. This framework allows for extensive distribution, equipping attackers with a comprehensive botnet panel for managing malicious requests.

Broadened Attack Vectors

RondoDox’s attack methods encompass both consumer and enterprise devices, including Oracle WebLogic servers, WordPress, and vBulletin systems. The malware is designed to support various Linux architectures, enhancing its potential reach across multiple devices and platforms.

Conclusion

RondoDox signifies a notable advancement in IoT botnet operations, demonstrating its capacity to exploit a diverse array of vulnerabilities across many vendors. Its unique distribution strategies and advanced evasion techniques render it a significant threat to both personal and organizational networks.

Q: What is RondoDox IoT botnet?

A: RondoDox is an Internet of Things (IoT) botnet that targets various vulnerabilities to take control of devices, utilizing sophisticated evasion and persistence strategies.

Q: How many vulnerabilities are exploited by RondoDox?

A: RondoDox exploits 56 vulnerabilities across more than 30 vendors, including those related to command injection and memory corruption.

Q: What methods does RondoDox employ to stay hidden?

A: RondoDox imitates genuine network traffic from popular gaming and VPN services and uses diverse methods to maintain its presence on infected devices.

Q: What is the distribution method for RondoDox?

A: The distribution occurs via a loader-as-a-service (LaaS) setup, allowing it to be combined with other malicious payloads like Mirai and Morte.

Q: Which devices and systems does RondoDox target?

A: RondoDox targets both consumer gadgets and enterprise applications, including Oracle WebLogic servers, as well as WordPress and vBulletin systems.

Q: What does RondoDox’s expansion mean for users?

A: This expansion raises the risk of compromise for a wider array of devices, highlighting the importance of proactive cybersecurity measures and timely vulnerability patches.

HUAWEI FreeBuds Pro 4 Wireless Earbuds Review


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

HUAWEI FreeBuds Pro 4, Wireless Earbuds, Real Sound with Dual Driver, Stable and Clear Calls, Dynamic Smart ANC, Compatible with iOS&Android, Noise Cancelling, White

Tesla Set to Unveil ‘Banish’ Feature Shortly, According to Musk, as Firm Gears Up for L4 Responsibility


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Concise Overview

  • Tesla plans to launch a ‘Banish’ feature that functions as a robotic valet for autonomous parking.
  • Elon Musk has verified that this feature will be accessible ‘soon’.
  • ‘Banish’ will allow Teslas to independently locate parking spots and return when called.
  • This update is part of continuous improvements to Tesla’s Full Self-Driving (FSD) system.
  • The rollout prompts inquiries regarding Tesla’s responsibility and insurance ramifications.
  • Australia is among the international regions expected to receive this feature.

Overview

As Tesla advances towards completely self-driving vehicles, Elon Musk recently used X to reveal the upcoming launch of a feature named ‘Banish’. This function aims to enhance the ease of Tesla ownership by enabling the vehicle to serve as its own robotic valet, autonomously seeking parking and returning to the driver on request.

What Does The ‘Banish’ Feature Entail?

While Tesla’s website has not yet highlighted the ‘Banish’ feature, Elon Musk has elaborated on its capabilities. The feature enables a Tesla car to independently park itself once the driver has exited, essentially transforming the vehicle into a robotic valet. This process requires navigating intricate parking situations and avoiding obstacles, all without needing driver input.

Tesla to Introduce 'Banish' Feature Soon, Says Musk, as Company Prepares for L4 Liability

The Evolution Of Tesla’s Self-Parking Features

The journey to the launch of ‘Banish’ has been extended. It was first presented as part of ‘Actually Smart Summon’, with its development occurring over time. Although an April 2024 launch was originally expected, the focus shifted towards overseas markets such as Australia and New Zealand, aligning with Tesla’s expansive robotaxi goals.

The Outlook for Autonomous Parking

For Tesla’s vision of robotaxis to materialize, cars must be able to locate parking or charging stations without human help. This makes the ‘Banish’ feature vital, especially as Tesla aims to introduce models devoid of steering wheels or pedals, such as the Cybercab by 2026.

Conclusion

Tesla’s forthcoming ‘Banish’ feature is poised to transform our approach to parking by enabling vehicles to independently secure and locate parking spaces. Although the feature raises issues regarding liability and insurance, its successful rollout could signify a major advancement in the path to fully autonomous driving.

Q: What is the ‘Banish’ feature?

A: ‘Banish’ is a capability that permits Tesla vehicles to independently find and park in vacant spaces after the driver has exited the vehicle.

Q: When will the ‘Banish’ feature be released?

A: Elon Musk has indicated that the feature will be available ‘soon’, although Tesla’s timelines may extend months.

Q: How does ‘Banish’ function?

A: When activated, ‘Banish’ allows the Tesla to navigate parking areas autonomously, avoiding obstacles and securing a parking spot until the driver calls for it.

Q: Will ‘Banish’ be available in Australia?

A: Indeed, Australia is one of the international locations anticipated to receive the ‘Banish’ feature.

Q: What are the liability implications for Tesla with ‘Banish’?

A: As cars operate autonomously, Tesla might bear responsibility for any incidents that occur while ‘Banish’ is in operation, leading to questions about insurance coverage.

Queensland Lifts 12-Year Prohibition on IBM After $1.25 Billion Payroll Disaster


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Queensland Reintroduces IBM for Government Contracts

Quick Overview

  • Queensland removes 12-year ban on IBM regarding government contracts.
  • IBM remains ineligible for payroll projects for an additional three years.
  • If chosen for key projects, IBM will be required to finance independent program assurance for two years.
  • This decision seeks to revive competitive dynamics in procurement.
  • This action aligns Queensland with other states across Australia.
  • Queensland commits $1 billion towards a digital transformation initiative.

Queensland Reintroduces IBM for Government Contracts

Queensland removes IBM ban after payroll issues

Parliament House in Brisbane

iStock

New Opportunities for Contracting with IBM

The Queensland government has officially annulled its 12-year prohibition on IBM, granting the tech firm the ability to bid for government contracts once more. This choice follows a long-standing restriction enacted due to a costly payroll system failure.

Ongoing Limitations

Even though IBM can now engage in a majority of governmental contracts, the firm is still barred from anything related to payroll projects for another three years. Additionally, if IBM is selected as the leading contractor for significant government ventures, it must fund independent program assurance over the subsequent two years.

Harmonizing with Other States

The choice to lift the ban is part of efforts to align Queensland’s contracting regulations with those of other Australian states. According to Queensland’s Minister for Customer Services and Open Data, Steve Minnikin, the objective is to restore “competitive tension” within procurement processes.

Investment in Digital Innovation

Beyond lifting the IBM restriction, Queensland has declared a $1 billion investment in a digital transformation program. This initiative aims to consolidate IT expenditures and systems across 19 departments, enhancing options and effectiveness for government entities in need of technology solutions.

IBM’s Challenging History with Queensland

IBM’s past with the Queensland government is tainted by the notorious 2007 payroll system project for Queensland Health. Originally projected to cost $6.2 million, the expenses ballooned to $1.25 billion due to failures in governance and oversight.

Legal Disputes and Resolutions

Following a 2013 Commission of Inquiry that deemed the project “catastrophic,” the government pursued legal action against IBM. However, the Queensland Supreme Court dismissed the lawsuit, referencing a 2010 settlement that absolved IBM of further liabilities.

Conclusion

The lifting of IBM’s ban signifies a major change in Queensland’s strategy regarding government contracting. While restrictions on payroll projects persist, this decision is anticipated to boost competition and align policies with other states. IBM’s re-entry into the market coincides with a substantial digital transformation initiative, promising wider options in technology solutions for government organizations.

Questions & Answers

Q: What was the reason behind IBM’s initial ban by Queensland?

A: IBM was banned due to a payroll system project failure for Queensland Health that led to significant budget overruns and governance problems.

Q: What are the stipulations for IBM’s return to Queensland contracts?

A: IBM can pursue government contracts but is still barred from payroll projects for an additional three years and must fund independent program assurances if selected for significant initiatives.

Q: How does this decision influence Queensland’s procurement practices?

A: The decision aligns Queensland’s procurement practices with other Australian states and aims to reestablish competitive dynamics in the bidding process.

Q: What encompasses Queensland’s digital transformation program?

A: Queensland is committing $1 billion to unify IT spending and systems across 19 departments, improving technology solutions for government agencies.

Skullcandy Indy Evo Wireless Earphones Review


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Skullcandy Indy Evo Wireless Earphones, Black

ANZ Banking Group Introduces New Group CIO


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

ANZ Banking Group Names Donald Patra as New Group CIO

Brief Overview

  • Donald Patra has been named as ANZ’s new Group CIO, starting from November 24.
  • Patra brings more than 20 years of IT leadership from his tenure at HSBC.
  • Michael Bullock will remain as acting group executive until Patra arrives.
  • Patra will work from Melbourne, succeeding Gerard Florian.
  • The leadership change at ANZ comes alongside a major restructuring of the technology division.

Donald Patra: ANZ’s Incoming Group CIO

ANZ Banking Group names Donald Patra as new CIO

ANZ Banking Group has declared the selection of Donald Patra as its new Group Chief Information Officer, effective from November 24. Patra is transitioning from HSBC, where he played a key role in various IT leadership positions across the UK and Europe over the last twenty years.

Background and Accomplishments

Throughout his time at HSBC, Patra adeptly managed crucial transformation initiatives, concentrating on digital advancements, updating core banking infrastructures, enhancing data and AI functionalities, and strengthening operational resilience in heavily regulated environments. His appointment arrives at a crucial moment as ANZ is undergoing both leadership and technological restructuring.

Leadership Transition

Michael Bullock will continue to serve as acting group executive for technology and group services until Patra’s official start date. Patra will be headquartered in Melbourne, succeeding Gerard Florian, who retired halfway through the year after serving since 2017.

ANZ’s Wider Leadership Adjustments

Patra’s appointment is part of broader leadership updates at ANZ, highlighted by the recent selection of Nuno Matos as CEO. This leadership transition is integral to ANZ’s strategy to adapt to a swiftly changing banking environment and to foster innovation within the institution.

Restructuring of the Technology Division

Currently, ANZ’s technology division is going through a major restructuring. These modifications are intended to streamline operations and enhance technological capabilities, ensuring that ANZ stays competitive in a digitally driven financial landscape.

Conclusion

ANZ Banking Group has strategically appointed Donald Patra as its new Group CIO. With a solid foundation in IT leadership from HSBC, Patra is well-equipped to guide ANZ through its ongoing technological transformation and reorganization. As the bank enters a new leadership phase under CEO Nuno Matos, Patra’s expertise is anticipated to play a vital role in modernizing ANZ’s technology operations.

Q: What position will Donald Patra take on at ANZ?

A: Donald Patra will serve as the Group Chief Information Officer at ANZ, beginning November 24.

Q: Where was Donald Patra employed prior to joining ANZ?

A: Prior to joining ANZ, Donald Patra held the position of CIO at HSBC, overseeing the UK and Europe.

Q: Who will oversee the role until Patra commences?

A: Michael Bullock will persist as the acting group executive for technology and group services until Patra’s arrival.

Q: What modifications are occurring in ANZ’s technology division?

A: ANZ’s technology division is currently undergoing a significant restructuring aimed at enhancing its technological effectiveness and optimizing operations.

Q: How long did Gerard Florian serve as Group CIO for ANZ?

A: Gerard Florian was the Group CIO for ANZ from 2017 until his retirement earlier this year.

Q: What notable achievements does Patra hold?

A: Patra has been acknowledged for spearheading global digital transformation, updating banking frameworks, and pushing forward AI capabilities at HSBC.

Xiaomi Redmi Buds 6 Pro Active Noise Cancelling Review


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Xiaomi Redmi Buds 6 Pro Active Noise Cancelling up to 55dB Advanced Triple Driver LDAC Compatible High Resolution Audio Wireless Up to 36 Hours Music Playback Google Fast Pair Space Black

Critical “RediShell” Flaw Endangers Thousands of Servers


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

  • Wiz, a security company, emphasizes the need for immediate patching of a serious Redis vulnerability.
  • The flaw grants attackers comprehensive access to host systems.
  • A memory corruption issue in Redis has existed for over 13 years.
  • This affects every release of Redis software.
  • About 330,000 Redis instances are accessible from the internet.
  • A patch for CVE-2025-49844 has been released, and administrators must respond.
  • Wiz is set to be acquired by Alphabet for US$32 billion.

Wiz Calls for Prompt Response to Redis Vulnerability

The security research organization Wiz has strongly advised organizations to address a serious vulnerability in the Redis database known as “RediShell”. If misused, this vulnerability may permit attackers to gain complete access to host systems.

Aged, serious "RediShell" flaw threatens numerous servers

Memory Corruption Issue at the Heart

This vulnerability arises from a memory corruption flaw that has been part of the Redis source code for nearly 13 years. This allows an authenticated attacker to run a Lua script to execute arbitrary native code on the targeted host. The age of this flaw means that every Redis software release is vulnerable.

Extensive Effect Across Cloud Platforms

Given that Redis is utilized in roughly 75 percent of cloud environments, the potential consequences of this vulnerability are significant. Wiz estimates that about 330,000 Redis instances are internet-facing, with 60,000 lacking proper authentication measures. Additionally, 57 percent of cloud environments deploy Redis as container images, frequently without sufficient security hardening.

Patch and Preventive Measures

A fix for this vulnerability, labeled CVE-2025-49844, has been provided by Redis. Administrators are advised to restrict network access to Redis databases via firewalls and policies, implement strong authentication, and limit permissions to reduce risk.

About Redis

Redis, which stands for Remote Dictionary Server, is an open-source NoSQL database celebrated for its rapid read and write capabilities. It keeps data in system memory instead of on disk, making it well-suited for cloud applications that demand performance and low-latency response, such as caching, session management, and real-time data analysis.

Wiz’s Acquisition by Alphabet

In related developments, Wiz is in the process of being acquired by Alphabet, Google’s parent company, in a notable all-cash deal valued at US$32 billion, emphasizing the strategic need for cloud security.

Conclusion

The Redis “RediShell” flaw poses a critical threat to cloud environments worldwide. With a patch now available, organizations are urged to act promptly to safeguard their systems from potential exploitation. The strategic acquisition of Wiz by Alphabet highlights the increasing focus on strong cloud security practices.

Q: What does the “RediShell” vulnerability entail?

A: The “RediShell” vulnerability represents a major security flaw in the Redis database that enables attackers to achieve complete access to host systems.

Q: How long has this bug existed within Redis?

A: The memory corruption issue that leads to the vulnerability has been included in the Redis source code for approximately 13 years.

Q: How commonly is Redis used?

A: Redis is utilized in about 75 percent of cloud environments, signifying the extensive potential impact of the vulnerability.

Q: What preventive measures should administrators implement?

A: Administrators ought to apply the patch for CVE-2025-49844, limit network accessibility, ensure robust authentication, and curtail permissions.

Q: What makes Redis a favored option for cloud applications?

A: Redis is favored for its high read and write speeds by keeping data in system memory, making it ideal for applications that require low-latency responses.

Q: What importance does Wiz’s acquisition by Alphabet hold?

A: Wiz’s acquisition by Alphabet for US$32 billion highlights the escalating importance and strategic emphasis on cloud security.

HUAWEI FreeClip Wireless Bluetooth Headphones Review


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

HUAWEI FreeClip, Rose Gold, Wireless Bluetooth Headphones, Innovative Aesthetic Design, Featherlight Use