Blog - Page 45 of 180 - Techbest - Top Tech Reviews In Australia

Microsoft Issues Critical Updates for SharePoint Servers at Risk from “ToolShell”


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Quick Overview

  • Microsoft has issued critical patches for SharePoint Servers at risk from “ToolShell”.
  • The issues, CVE-2025-53370 and CVE-2025-53771, involve deserialization and spoofing vulnerabilities.
  • Patches are available for SharePoint Server Subscription Edition and SharePoint Server 2019.
  • Currently, there are no patches for SharePoint 2016 Server.
  • Administrators should implement the latest patches, activate AMSI, and change ASP.NET machine keys.
  • A scan by ShadowServer Foundation reveals 323 Internet-accessible SharePoint Servers in Australia.
  • Dutch security firm Eye has alerted about contemporary zero-day chains that do not require authentication.

Microsoft’s Crucial Security Action

In a significant effort to enhance cybersecurity, Microsoft has deployed urgent patches for two at-risk editions of its on-premises SharePoint Server, addressing severe issues that are currently being exploited by malicious actors. These vulnerabilities, referred to collectively as “ToolShell”, have generated substantial concern among IT professionals globally, especially in Australia.

Examining the ToolShell Vulnerability

The vulnerabilities, CVE-2025-53370 and CVE-2025-53771, pertain to serious deserialization and spoofing flaws that are being leveraged in remote code execution attacks. These security weaknesses enable attackers to run arbitrary code on compromised servers, representing significant risks for organizations that depend on SharePoint for collaboration.

Available Patches and Mitigation Tactics

Microsoft has made patches available for SharePoint Server Subscription Edition and SharePoint Server 2019. However, patches for SharePoint 2016 Server are presently unavailable, leaving certain organizations potentially vulnerable. Microsoft recommends that administrators utilize supported SharePoint versions and promptly apply the latest security updates.

Further mitigation steps include enabling the Anti-Malware Scan Interface (AMSI) with a suitable antivirus program and implementing endpoint protection strategies. Additionally, administrators should rotate the ASP.NET machine keys for SharePoint Server, either manually using PowerShell scripts or via Central Administration.

Widespread and Local Consequences

A scan conducted by the ShadowServer Foundation shows that the majority of SharePoint installations are located in the United States and Europe. In Australia, there are 323 Internet-visible SharePoint Servers, with 10 identified in New Zealand. While the scan does not specify the versions at risk, the information highlights the global scale of this security issue.

Professional Analysis and Comparisons

The Dutch security firm Eye has pointed out the parallels between the current vulnerabilities and those exploited in 2021. However, the latest exploits are more sophisticated, creating a modern zero-day chain that enables automatic shell installation, full persistence, and no authentication required. Eye Security warns that malicious payloads could be embedded and accepted as trusted input, completing the remote code execution loop without the need for credentials.

Conclusion

Microsoft’s urgent patches for SharePoint Servers target critical vulnerabilities that could have far-reaching effects if not addressed promptly. With the possibility of severe data breaches and operational disruptions, organizations must act quickly to implement these patches and enhance their cybersecurity stance. As the threat landscape evolves, maintaining vigilance and proactive approaches is crucial for protecting digital assets.

Questions & Answers

Q: What vulnerabilities do the patches address?

A: The patches fix CVE-2025-53370 and CVE-2025-53771, related to deserialization and spoofing vulnerabilities.

Q: Which versions of SharePoint have received patches?

A: Patches are accessible for SharePoint Server Subscription Edition and SharePoint Server 2019. There are no patches yet for SharePoint 2016 Server.

Q: What further actions should administrators take beyond applying patches?

A: Administrators should enable AMSI with an appropriate antivirus solution, implement endpoint protection, and rotate ASP.NET machine keys.

Q: How prevalent is the issue in Australia?

A: A scan has revealed 323 Internet-visible SharePoint Servers in Australia, representing a considerable presence and potential threat.

Q: Are these vulnerabilities akin to previous ones?

A: Yes, they bear similarities to exploits from 2021 but now create a more sophisticated zero-day chain without requiring authentication.

Q: What is Eye Security’s role in this context?

A: Eye Security has performed scans and provided insights regarding the current vulnerabilities, emphasizing the urgency for immediate action.

Jabra Elite 10 Wireless in-Ear Bluetooth Earbuds Review


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Jabra Elite 10 Wireless in-Ear Bluetooth Earbuds Advanced Active Noise Cancellation, 6 Built-in Microphones and Dolby Atmos Sound – Matte Black

Ticketek Collaborates with PayPal Australia to Offer Flexible and Secure Payment Options for Fans


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Fast Overview

  • Ticketek has now incorporated PayPal as a payment option for ticket sales.
  • Consumers can utilize PayPal’s Buy Now, Pay Later feature, known as Pay in 4.
  • Increased security through PayPal’s Buyer Protection and fraud prevention measures.
  • Greater ease and adaptability for Australian shoppers.
  • PayPal’s incorporation signifies changing consumer payment trends.

New Collaboration Improves Ticket Acquisition

Ticketek and PayPal Collaboration for Safe Payments

In a major advancement for Australian supporters, Ticketek now enables customers to buy tickets with PayPal. This collaboration aims to simplify the ticket buying experience by incorporating PayPal’s reliable payment methods into Ticketek’s system.

Access to Buy Now, Pay Later Offer

Through this integration, fans can also take advantage of PayPal’s Buy Now, Pay Later (BNPL) offering, known as Pay in 4. This functionality permits customers to divide the ticket cost into four payments, granting financial ease without extra charges.

Improved Security and Buyer Assurance

PayPal is well-known for its secure payment methods, featuring sophisticated encryption and immediate fraud detection. With this integration, Ticketek users can benefit from PayPal’s Buyer Protection, ensuring their transactions are protected and secure.

Adapting to Shifting Consumer Demands

Cameron Hoy, Chief Operating Officer & Head of Global Ticketing at Ticketek Entertainment Group, stated that this integration seeks to elevate the customer experience by offering a wider range of payment options in line with the evolving preferences of their clientele.

Reliable Payment Method Enhances Transactions

According to PayPal data, Australian consumers are substantially more likely to finalize a purchase when PayPal is an option at checkout. Simon Banks, Managing Director of PayPal Australia, highlighted that this partnership capitalizes on PayPal’s credibility, facilitating a quicker and more convenient ticket purchasing process for fans.

Conclusion

The alliance between Ticketek and PayPal Australia heralds a new phase of convenience and security for ticket purchasers. With the introduction of PayPal’s secure payment methodologies and versatile payment options, customers can experience a smooth ticket buying journey. This partnership demonstrates both companies’ dedication to evolving with modern consumer expectations and enhancing the overall customer experience.

Q: What is the primary advantage of Ticketek teaming up with PayPal?

A: The primary advantage is the improved security and convenience when purchasing tickets with PayPal, which includes access to the Buy Now, Pay Later feature.

Q: How does PayPal’s Buyer Protection function?

A: PayPal’s Buyer Protection safeguards users by tracking transactions for fraudulent activity and providing assistance if issues arise with purchases, ensuring secure transactions.

Q: What does PayPal Pay in 4 entail?

A: PayPal Pay in 4 is a Buy Now, Pay Later service that allows users to divide their payments into four interest-free installments.

Q: Why is PayPal regarded as a trustworthy payment option in Australia?

A: PayPal is recognized for its strong security features, buyer protection, and the convenience it provides, making it a popular choice for online payments in Australia.

Q: How does this collaboration influence Ticketek’s customers?

A: Customers now enjoy increased payment flexibility and enhanced security when buying tickets, resulting in an improved purchasing experience.

Salt Typhoon Initiates Significant Cyberattack on US National Guard Division in 2024


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Salt Typhoon Cyber Assault on US National Guard

Salt Typhoon’s Cyber Encroachment on the US National Guard

Quick Read:

  • Salt Typhoon, a Chinese cyberespionage organization, deeply compromised a US state’s Army National Guard network.
  • The breach took place between March and December 2024, impacting networks in all US states and four territories.
  • The group is believed to be preparing to disrupt US critical infrastructure amid potential escalations with China.
  • This hack could diminish local cybersecurity measures aimed at safeguarding critical infrastructure.
  • Salt Typhoon presents a significant threat for US cyber defenders.

Context of the Cyberattack

In a notable cybersecurity breach, a state’s Army National Guard network in the United States was penetrated by Salt Typhoon, a Chinese cyberespionage organization. As noted in a document from the Department of Homeland Security, this breach occurred from March to December 2024, leading to the extraction of sensitive maps and “data traffic” from networks in every US state and at least four US territories.

Cyber intrusion on US National Guard by Salt Typhoon in 2024

Consequences for Cybersecurity

The breach highlights the increasing danger posed by Salt Typhoon, which has emerged as a central focus for US cyber defense initiatives. The group is not just collecting intelligence but is also reportedly positioning itself to disrupt US infrastructure if tensions with China rise. This potential to incapacitate critical infrastructure has rendered Salt Typhoon a top concern for national security entities.

Effects on Critical Infrastructure

The memo indicates that Salt Typhoon’s success in breaching state Army National Guard networks could compromise local initiatives to protect critical infrastructure. These units, often connected with state fusion centers, play a vital role in disseminating cyber threat intelligence. The breach of these networks may introduce vulnerabilities in the defense of essential infrastructure elements.

Conclusion

Salt Typhoon’s extensive infiltration of a US state’s Army National Guard reveals serious cybersecurity challenges. By compromising networks nationwide, the group may be gearing up for possible disruptions to essential US infrastructure. This incident serves as a clear reminder of the necessity for strong cybersecurity practices and international collaboration in addressing cyber threats.

Q: What is Salt Typhoon?

A: Salt Typhoon is a Chinese cyberespionage group recognized for infiltrating US networks and threatening critical infrastructure.

Q: How did Salt Typhoon infiltrate the US National Guard network?

A: The group thoroughly compromised the network by extracting maps and data traffic from March to December 2024.

Q: Why is Salt Typhoon regarded as a significant threat?

A: Salt Typhoon not only collects intelligence but is also positioning itself to potentially disrupt US critical infrastructure, escalating tensions with China.

Q: What are the implications of this hack for US cybersecurity?

A: The hack could undermine local cybersecurity initiatives, particularly for state fusion centers tasked with sharing cyber threat intelligence.

Q: How has the US reacted to the Salt Typhoon threat?

A: The US is focusing on bolstering cyber defenses and enhancing international collaboration to address the risks posed by Salt Typhoon.

Q: What measures can be taken to avert similar cyberattacks?

A: Strengthening cybersecurity protocols, investing in advanced technologies, and promoting international cyber defense cooperation are essential strategies.

Crucial Perspectives: Safeguarding AI at the Edge Before Time Expires


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Brief Overview

  • AI-enabled PCs are transforming productivity, even without internet access.
  • Shadow AI poses notable cybersecurity threats.
  • Businesses need to prioritize detection as AI-driven dangers increase.
  • Intel’s ‘security in silicon’ improves device safety and battery longevity.
  • Datacom facilitates the upgrade to Windows 11, highlighting the advantages of AI.

AI-Integrated PCs: A Work Revolution

PCs equipped with AI capabilities within their silicon circuits are changing the way we engage in work, enabling us to perform more securely and intelligently, both online and offline. However, this advancement brings new hurdles, such as ‘Shadow AI’ and increased cybersecurity threats.

Enabling secure AI at the forefront: Essential information before it becomes urgent

The Dangers of Shadow AI

Shadow AI, occurring when employees employ AI on public platforms absent of company supervision, represents a critical risk. David Stafford-Gaffney from Datacom points out that early adopters frequently mishandle sensitive information, reminiscent of problems encountered during the initial phases of cloud adoption.

Addressing AI-Driven Threats

Firms are encouraged to focus on detection rather than prevention alone, as AI-driven cyber threats grow increasingly complex. An effective strategy requires combining user awareness with robust technical protections to reduce risks.

Intel’s Security Developments

Intel’s ‘security in silicon’ strategy, particularly via its vPro platform, boosts security by delegating duties to the Neural Processing Unit (NPU). This not only enhances security but also boosts battery life and overall performance.

Shifting to Windows 11 with Datacom

As Windows 10 support nears its end, Datacom provides a gradual methodology for moving to Windows 11. This approach includes leveraging AI advantages through Edge AI, enhancing productivity without the need for constant Internet connection.

Conclusion

The incorporation of AI into PCs is redefining the workplace, offering greater efficiency and security. Simultaneously, it introduces new challenges, especially with Shadow AI. Businesses must concentrate on detection and user education to counter these threats. Intel’s security advancements and Datacom’s Windows 11 transition plans present a pathway to responsibly and effectively utilize AI.

Q: What is Shadow AI?

A:

Shadow AI denotes the unauthorized usage of AI technologies by employees, typically on public platforms, without their organisation’s supervision, thereby creating security vulnerabilities.

Q: How does Intel’s ‘security in silicon’ enhance device security?

A:

Intel’s ‘security in silicon’ reinforces security by employing the Neural Processing Unit (NPU) to handle security-related tasks, thereby boosting battery life and device performance while facilitating better threat detection.

Q: What advantages does transitioning to Windows 11 offer?

A:

Moving to Windows 11 introduces enhanced AI capabilities, improved productivity functionalities, and stronger security measures, which are crucial as Windows 10 support concludes.

Q: In what way does Datacom support the transition to Windows 11?

A:

Datacom delivers a methodical and phased strategy to assist organisations in transitioning seamlessly to Windows 11, concentrating on device compatibility and employing AI to boost productivity.

“Raycon E25 Wireless Earbuds Review”


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Raycon Wireless Bluetooth Earbuds – Wireless In-Ear Bluetooth Earphones with 32 Hours Extreme Comfort Playback and Active Noise Cancelling (Royal Blue)

Tesla’s Diner Launches: An Avant-Garde Dining Adventure is Here


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Quick Overview

  • Tesla’s Diner fuses 1950s drive-in charm with contemporary technology.
  • Located in West Hollywood, the diner boasts a retro-futuristic aesthetic.
  • Features V4 Supercharger stalls and large screens for a drive-in cinema vibe.
  • Optimus robot displayed serving and engaging with patrons.
  • Offers exclusive merchandise and roller-skating food delivery for a one-of-a-kind experience.
  • Public debut set for July 21st.

A Retro-Futuristic Dining Adventure

Tesla has entered the dining sector with the launch of its inaugural diner in West Hollywood. The Tesla Diner, an appealing mix of 1950s drive-in nostalgia and state-of-the-art technology, provides a remarkable culinary experience for Tesla owners and fans alike.

Tesla's Diner Launch: A Futuristic Dining Experience Awaits

Location and Aesthetic

Positioned at 7001 West Santa Monica Boulevard, the diner showcases a sleek, circular structure that channels a sense of retro-futurism. The venue hosted a soft opening with first responders and special guests from Los Angeles, demonstrating its unique offerings.

Culinary Treats with a Tesla Flair

Attendees at the soft launch enjoyed classic American dishes such as burgers and shakes, served in Cybertruck-themed containers. The parking lot buzzed with Tesla vehicles, including the unreleased Cybercab and the Tesla Optimus.

Advanced Technology in Dining

Optimus Robot

A notable highlight was Tesla’s Optimus robot, which delivered popcorn and engaged with guests, demonstrating its fluid movements and conversational skills. This showcase hints at the future potential for robots in service roles.

Supercharger Setup

The diner features V4 Supercharger stalls, enabling guests to charge their cars while watching movies on two large screens, with audio transmitted directly to their Tesla vehicles.

Distinctive Features and Merchandise

Exclusive Merchandise

Guests can buy limited-edition items like all-black Tesla Bot toys and branded drinkware, making for coveted collectibles.

Roller-Skating Food Delivery

Enhancing the retro ambiance, food is brought to tables or vehicles by staff on roller skates, enriching the unique dining experience.

Conclusion

The Tesla Diner presents a unique mix of nostalgia and modern technology, crafting an immersive experience for visitors. While the soft opening was by invitation only, the public will have the chance to explore this innovative dining spot starting July 21st.

FAQ

Q: What sets Tesla’s Diner apart?

A: The diner melds 1950s drive-in nostalgia with modern technology, featuring Supercharger stalls and large screens for a cinematic drive-in experience.

Q: Where is Tesla’s Diner situated?

A: It can be found at 7001 West Santa Monica Boulevard, West Hollywood, CA.

Q: What does the Optimus robot do at the diner?

A: The Optimus robot serves meals and interacts with guests, showcasing its future potential roles in the service sector.

Q: When will the diner open to the public?

A: The diner opens to the public on July 21st.

Q: Are there any exclusive products for sale at the diner?

A: Yes, visitors can purchase limited-edition Tesla Bot action figures and branded drinkware.

Q: How is food served in the diner?

A: Food is delivered by staff on roller skates, contributing to the nostalgic atmosphere of the dining experience.

ABC Unveils Data Repository as Element of Governance Revamp


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Quick Read

  • ABC integrates data via Snowflake’s data warehouse.
  • A project in three phases aims to improve data governance.
  • The initiative emphasizes accountability and defined responsibilities.
  • ABC’s data governance scheme includes foundation, enablement, and embedment stages.
  • More than 4000 employees have been educated on data governance.
  • Future objectives entail “data governance by design” and automation.

ABC’s Data Transformation Journey

The ABC implements data warehouse amid governance restructure

Alison Burgis with Guillaume Jaudouin, Altis Consulting, at Gartner Data & Analytics Summit

Altis Consulting

Embracing a Cloud-Based Platform

The Australian Broadcasting Corporation (ABC) has made a crucial advancement in its data management plan by adopting Snowflake’s cloud-based data warehouse. This decision is part of a three-phase project intended to operationalise ABC’s data governance and offer a comprehensive view of its essential data assets.

Tackling Data Governance Issues

Although ABC had a data governance framework established, it faced significant challenges concerning data discoverability, quality, and accountability. Data was kept across numerous isolated platforms, complicating management processes. Furthermore, unclear accountability and differing levels of data governance maturity were recognized as major obstacles.

Organized Method for Data Governance

ABC’s governance effort is organized into three phases: foundation, enablement, and embedment. The foundation phase laid the groundwork for essential frameworks and accountability models, including a data governance council and a hub-and-spoke data operating model. This model encompasses 18 data owners tasked with lifecycle management within their areas and 15 stewards who serve as data custodians.

Advancements and Looking Ahead

After 18 months, the program has achieved all goals, promoting a cultural transformation within ABC. With 4000 employees trained in data governance, the broadcaster is now prioritizing the integration of governance practices by design and investigating automation possibilities in data quality monitoring.

Summary

ABC’s integration of data into Snowflake’s cloud-based data warehouse is a crucial aspect of its data governance reform. This initiative seeks to address current data governance challenges by creating a structured framework and accountability models. As the program evolves, ABC continues to weave governance practices into its daily functions, with future plans focused on proactive quality management and automation.

Q&A Session

Q: What was the primary objective of ABC’s data governance initiative?

A: The main objective was to operationalise data governance by establishing a centralized view of ABC’s data assets and confirming accountability and clear responsibilities throughout the organization.

Q: What were the primary challenges encountered by ABC in data governance?

A: ABC faced challenges including data discoverability issues, extended time-to-insight, lack of accountability, and varying degrees of data governance maturity.

Q: How is ABC organized to manage data governance?

A: ABC utilizes a hub-and-spoke data operating model, featuring a central governance council and distributed accountability among 18 data owners and 15 stewards.

Q: What future strategies does ABC intend for its data governance?

A: ABC aims to incorporate “data governance by design” within its operations and seek automation opportunities in data quality monitoring and metadata management.

Q: How many staff members have been acquainted with data governance at ABC?

A: More than 4000 employees have completed tailored introductions to data governance.