Australia Tech News - Page 19 of 137 - Techbest - Top Tech Reviews In Australia

Cybercriminals Utilize F5 Devices to Compromise US Government Networks


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Cyber Threats from Nation-State Target F5 Equipment in the US

Summary

  • Unknown cyber threat actors are targeting US federal networks through vulnerabilities in F5 devices.
  • CISA issues an emergency directive to address risks and calls for immediate updates.
  • F5 verifies unauthorized access but assures no effect on operations.
  • Security experts are brought in to mitigate the threat and enhance security measures.
  • Concerns for national security hinder public notification of the breach.

Cyber Threats: A Continuous Issue

In a key update, officials from the US government have detected a persistent cyber threat aimed at federal networks. The actors behind the threat, suspected to be from a nation-state, are taking advantage of weaknesses in products from the cybersecurity firm F5. This event underscores the ongoing issue of cybersecurity threats that challenge governments and businesses globally.

Incident Details

The Cybersecurity and Infrastructure Security Agency (CISA) has launched an emergency directive following the revelation that hackers have breached F5’s systems. The threat actors have taken files, which include portions of F5’s source code and information on vulnerabilities. This information could potentially guide additional breaches of F5 devices and software, creating a serious risk for federal networks.

Cyber threats hitting government networks via F5 devices

Actions and Measures for Mitigation

Nick Andersen, the executive assistant director of cybersecurity at CISA, has instructed government agencies to recognize and update F5 devices present in their systems. He emphasized the critical nature of the situation, indicating that the risk encompasses all organizations utilizing these products. Although a breach occurred, F5 asserts that its operations are currently unimpeded, and the software development process has not been compromised.

Investigation and Security Actions

F5 identified the breach on August 9 and has since implemented extensive measures to control the threat. The company has enlisted the help of reputable cybersecurity firms such as CrowdStrike, Mandiant, NCC Group, and IOActive for their investigation. The breach affected data from a limited number of customers, who have been directly notified by F5.

National Security and Reporting

The US Department of Justice has sanctioned a delay in the public announcement of the breach until September 12 due to concerns regarding national security. This decision highlights the seriousness of the situation and the ongoing work to safeguard federal networks against such threats. At the same time, authorities in Britain have advised F5 users to promptly update their software.

Conclusion

The recent cyber threat aimed at F5 devices within US government networks is a stark reminder of the continuous cybersecurity challenges. With CISA and F5 taking firm measures to alleviate risks, it is vital for all organizations that utilize F5 products to act immediately and refresh their systems. The involvement of leading cybersecurity professionals underscores the complexity and severity of the threat.

Q: What specific vulnerabilities are targeted in the F5 devices?

A: The specific vulnerabilities have not been revealed to avoid further exploitation. However, F5 and CISA advocate for immediate updates to address these vulnerabilities.

Q: How is F5 ensuring the security of customer data after the breach?

A: F5 is enhancing its security protocols and infrastructure and has reached out directly to affected customers to manage the situation.

Q: What actions should organizations utilizing F5 products take to safeguard themselves?

A: Organizations are advised to quickly identify F5 devices in their networks and implement all critical security updates as instructed by CISA and F5.

Q: Is there any indication that the hackers have breached other sectors?

A: Currently, there is no evidence of breaches within US civilian agencies or other sectors, but the threat level remains for all organizations using F5 products.

Sigma Healthcare Employs Machine Learning in SAP to Improve Forecasting Abilities


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Concise Overview

  • Sigma Healthcare improves demand prediction via machine learning in SAP IBP.
  • Forecast precision enhanced by 5-10% initially, with an additional 10% from utilizing machine learning models.
  • SAP Joule, a generative AI assistant, anticipated to deliver more optimizations.
  • Collaboration with EY to refine the SAP IBP framework.
  • Company’s retail brands include Amcal and Chemist Warehouse.

Improving Prediction with Machine Learning

Sigma Healthcare has made considerable progress in refining its demand forecasting abilities by employing machine learning models within SAP’s Integrated Business Planning (IBP) platform. With the implementation of sophisticated technologies such as extreme gradient boosting and automated outlier correction, Sigma has effectively enhanced its inventory management and medication availability.

Sigma Healthcare employs ML in SAP for superior forecasting

Early Benefits and Additional Enhancements

Initially, Sigma Healthcare experienced a forecast precision improvement of 5-10% following the rollout of the response and supply planning module of SAP IBP. This module replaced traditional manual spreadsheet methods, allowing supply planners to dedicate more time to achieving accuracy.

Applying Machine Learning Models

Guided by Marcus Williams, Sigma’s operations planning team has employed machine learning models such as extreme gradient boosting to process extensive and intricate datasets, facilitating improved sales forecasting and inventory management. Automated outlier correction has played a key role in preventing data inaccuracies from impacting sales outcomes.

The Impact of Generative AI with SAP Joule

Sigma anticipates the integration of SAP Joule, a generative AI copilot, to further bolster its planning capabilities. The AI tool is expected to diminish problem-solving duration and enhance management of out-of-tolerance forecasts and safety stock challenges.

Maintaining Competitiveness through Technology

By staying current with quarterly upgrades of IBP and advancements in AI, Sigma strives to retain a competitive position in the pharmaceutical sector. The collaboration with EY has been crucial in optimizing the IBP realm, aiding in its achievements.

Conclusion

Sigma Healthcare’s strategic implementation of machine learning and AI within SAP’s IBP system has profoundly enhanced its demand forecasting and inventory management. The integration of advanced technologies and partnerships is likely to continue providing competitive benefits in the retail pharmacy domain.

Q: In what ways has Sigma Healthcare enhanced its forecast accuracy?

A: Sigma Healthcare has elevated its forecast accuracy by implementing machine learning models and SAP IBP, yielding an initial 5-10% enhancement with a subsequent 10% increase from advanced models.

Q: Which technologies are being utilized by Sigma Healthcare?

A: Sigma employs technologies such as extreme gradient boosting, automated outlier correction, and SAP Joule, a generative AI copilot, to heighten its forecasting efficiency.

Q: What function does SAP Joule serve in Sigma’s operations?

A: SAP Joule is anticipated to aid in reducing problem-solving timelines and improving forecasts, especially in managing out-of-tolerance instances and safety stock administration.

Q: With whom has Sigma Healthcare collaborated for optimization?

A: Sigma Healthcare has partnered with EY to refine its SAP IBP framework.

Q: What are some of Sigma Healthcare’s retail brands?

A: Sigma Healthcare’s retail brands consist of Amcal and Chemist Warehouse.

Q: What importance does extreme gradient boosting hold in Sigma’s strategy?

A: Extreme gradient boosting assists Sigma in managing vast datasets, enhancing sales forecasting and pinpointing inventory or delivery complications.

Microsoft Withdraws Certificates for Counterfeit Teams Installers Distributing Ransomware


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Microsoft Cancels Certificates for Counterfeit Teams Installers

Quick Overview

  • Microsoft cancels more than 200 certificates related to counterfeit Teams installers.
  • The cybercrime collective, Vanilla Tempest, aimed at Teams users with ransomware.
  • Certificates from Trusted Signing, SSL.co, DigiCert, and GlobalSign were utilized.
  • Microsoft’s measures seek to diminish the efficacy of these ransomware operations.
  • Microsoft made the revocations public on LinkedIn and other social media outlets.

Vanilla Tempest’s Ransomware Initiative

Microsoft has implemented crucial measures to counter a ransomware threat entity, referred to as Vanilla Tempest, by revoking over 200 certificates utilized in their attack framework. This group, also recognized by cybersecurity experts as Vice Spider and Vice Society, initiated a campaign using counterfeit Microsoft Teams installers hosted on deceptively authentic malicious websites.

Microsoft cancels certs for counterfeit Teams installers dropping ransomware

Consequences of Certificate Cancellation

By canceling these digital certificates, Microsoft has complicated the efforts of Vanilla Tempest to spread ransomware disguised as legitimate files. The certificates that were revoked originated from Trusted Signing, SSL.co, DigiCert, and GlobalSign, which were used to authenticate the counterfeit installers and related tools.

Technical Aspects of the Attack

Upon executing the counterfeit .exe installers, a downloader would trigger the Oyster backdoor, eventually resulting in the deployment of the Rhysida ransomware. Apart from Rhysida, Vanilla Tempest has previously utilized several other ransomware variants, showcasing the group’s flexibility and level of threat.

Microsoft’s Preventive Actions

Microsoft’s prompt decision to cancel these certificates is vital in alleviating the threat posed by these cybercriminals. Announcements concerning these security actions were made publicly through LinkedIn and additional social media platforms, highlighting Microsoft’s pledge to cybersecurity.

Conclusion

In reaction to a notable ransomware threat targeting Microsoft Teams users, Microsoft has canceled over 200 certificates linked to counterfeit installers. This tactical move hampers the ability of Vanilla Tempest to conduct their malicious operations, thereby protecting users and organizations from potential data breaches and financial damages. The announcement signifies Microsoft’s continuous commitment to bolstering global cybersecurity initiatives.

Q: What was the principal tactic employed by Vanilla Tempest in their operations?

A: Vanilla Tempest employed counterfeit Microsoft Teams installers hosted on seemingly authentic malicious domains to deploy ransomware.

Q: How did Microsoft address the threat posed by these counterfeit installers?

A: Microsoft canceled over 200 certificates associated with the counterfeit installers, making it challenging for the malware to mimic legitimate files.

Q: What are the names of a few certificate authorities referenced in the article?

A: The certificates were from Trusted Signing, SSL.co, DigiCert, and GlobalSign.

Q: Which specific ransomware was highlighted as part of the attack?

A: The Rhysida ransomware was specifically highlighted, alongside other ransomware variants utilized by Vanilla Tempest.

Q: How did Microsoft publicize their security measures?

A: Microsoft publicized the cancellation of certificates through LinkedIn and various social media updates.

Westpac Sets Ambitious Strategy for Broad AI Integration in Business Banking


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Brief Overview

  • Westpac is incorporating AI throughout its business lending framework, enhancing credit evaluation and customer engagement.
  • The bank has joined forces with RDC.ai and AWS to create AI solutions, which include explainable credit evaluations.
  • AI is projected to simplify operations, diminish fraud, and enhance clarity for customers and regulators.
  • AI functionalities will be integrated into Westpac’s BizEdge tool to minimize documentation and refine lending processes.
  • Westpac seeks to harness AI to better utilize its extensive data assets for superior customer experiences.

Westpac’s AI Integration Journey

Westpac is committed to integrating artificial intelligence (AI) at every stage of its business lending operations. This project is part of a larger initiative to boost efficiency and clarity in credit evaluations and customer relations. The bank’s advancements build upon previous achievements in AI-driven credit assessments.

Westpac looks to broad AI integration within the business bank

(L-R) RDC.ai’s Gordon Campbell and Westpac’s Dr Martin Anderson.

Collaboration with RDC.ai and AWS

Westpac’s partnership with RDC.ai, previously recognized as Rich Data Co, initiated in 2021 and has broadened to include generative and agentic AI technologies. The bank highlighted this collaboration at the AWS financial services symposium in Sydney, showcasing how AI could revolutionize business banking activities beyond credit evaluation.

AI’s Contribution to Credit Evaluation

The inclusion of AI enables Westpac to render well-informed and transparent credit evaluations. By analyzing customer data, the bank can rationalize its choices and strategies in customer management, aiding in adherence to regulatory standards.

Enhancing Business Processes with AI

Westpac envisions an overhauled business lending process, utilizing AI to improve effectiveness and decision-making. AI is set to not only streamline credit evaluations but also enhance document handling, communication with customers, and risk management.

Maximizing Data Value

With extensive datasets at its command, Westpac intends to derive insights to refine customer experiences and decision-making. The collaboration with RDC.ai and AWS propels AI trials, unlocking data potential for competitive benefits.

AI in BizEdge and More

Westpac plans to embed AI in its BizEdge tool to cut down on loan application paperwork and elevate customer service. AI will support new bankers in navigating intricate policies and processes, ensuring they achieve high service standards.

Conclusion

Westpac is actively integrating AI into its business banking functions, aiming for comprehensive process optimization and enhanced customer interaction. Through collaborations with RDC.ai and AWS, the bank is poised to transform its lending approach, utilizing AI to extract data insights and streamline operations.

Q: What is the primary goal of Westpac’s AI integration?

A: The objective of Westpac is to enhance efficiency, transparency, and decision-making within its business lending operations through AI integration.

Q: Who are Westpac’s collaborators in AI development?

A: Westpac has established partnerships with RDC.ai and AWS to design and implement AI solutions within its business banking services.

Q: In what way will AI enhance Westpac’s credit evaluation process?

A: AI will empower Westpac to make knowledgeable and transparent credit decisions, ensuring compliance and improved customer management.

Q: What advantages does Westpac anticipate from AI in BizEdge?

A: AI in BizEdge is expected to decrease paperwork, streamline operations, and assist new bankers in navigating policies, thereby improving overall service delivery.

Q: What significance does data hold in Westpac’s AI strategy?

A: Westpac intends to utilize its large datasets to gain insights, enhance customer experiences, and inform strategic decisions with AI assistance.

Are You Prepared for AI? Comprehending What It Signifies to Be ‘AI Ready’


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Are You Prepared for AI? – TechBest

Brief Overview

  • 92% of CIOs anticipate AI implementation by 2025, yet data preparedness is essential.
  • AI preparedness encompasses strategic, cultural, and technical changes.
  • Cloud infrastructure must adapt to effectively manage AI workloads.
  • Organisational culture and AI education are crucial for successful AI integration.
  • Data sovereignty and trust are vital in the AI arena.
  • AI has the potential to enhance operations, acting as a collaborator in development activities.

Cloud Reflections: Bridging the Past with the Future

AI Preparedness in Cloud Evolution

The path to AI preparedness mirrors historical cloud evolutions. Organisations need to update cloud infrastructure to proficiently handle AI workloads. The Azure Well-Architected Framework and Microsoft Cloud Adoption Framework provide strategies to integrate reliability, security, and performance into cloud designs.

Culture as a Driver for AI Integration

Organisational culture plays a crucial role in AI transformation. Currently, the availability of AI training is restricted, which may impede adoption. Equipping staff with AI tools and nurturing a climate of trust and shared narratives can facilitate effective AI integration.

Data Sovereignty and Trust

Data integrity and sovereignty are paramount in the AI environment. Organisations must guarantee that data is safeguarded and utilized responsibly. A hybrid strategy that balances sovereignty with global scalability can promote compliance and innovation.

Transforming Organisations with AI

AI is transitioning from a mere tool to a partner in operations. Organisations ought to view AI agents as collaborators, incorporating them into development processes. This necessitates new operational frameworks and governance models.

From Preparedness to Implementation

Being AI prepared entails more than just acquiring new tools. It requires deliberate modernisation, cultural involvement, and scalable architectures. Success is found in leveraging AI in practical, accountable manners.

Conclusion

AI preparedness is a strategic necessity for contemporary organisations. It includes cloud optimization, cultural transformations, data governance, and operational changes. By integrating AI into every aspect of business, organisations can realize its full potential.

Q: What does it mean to be AI prepared?

A:

AI preparedness consists of strategic, cultural, and technical modifications to effectively assimilate AI into an organisation, ensuring that tools and data align with business objectives.

Q: Why is the cloud architecture significant for AI?

A:

Cloud architecture needs to accommodate intensive AI workloads, necessitating updates and frameworks like Azure Well-Architected Framework to guarantee reliability and productivity.

Q: How can organisations cultivate a culture conducive to AI adoption?

A:

By offering AI training, empowering staff, and fostering trust through storytelling and effective communication, organisations can promote AI assimilation.

Q: What is the significance of data sovereignty in AI?

A:

Data sovereignty guarantees that data is handled responsibly, adhering to regulations, and establishing trust with users. It reconciles local control with global cloud capabilities.

Q: How does AI reshape organisational operations?

A:

AI can function as a co-equal in development, creating code and evaluating architectures. This evolution necessitates new governance models that treat AI as a collaborative ally.

Q: What are the risks of not being AI prepared?

A:

Organisations unprepared for AI risk operational inefficiencies and escalating costs, failing to leverage AI’s potential advantages, which could lead to competitive disadvantages.

Austrade Prepared to Revamp Essential Network Infrastructure at Data Centre


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Austrade’s Comprehensive Network Infrastructure Revamp

Quick Overview

  • Austrade intends to replace its Cisco-centric core network infrastructure at two data centres starting late 2026.
  • Nexus 7000-series switches and Cisco ASA 5525 firewalls will be exchanged for Fortinet’s FortiGate firewalls.
  • The initiative involves upgrading Smartoptics DWDM passive multiplexers and utilizing ICON dark fibre.
  • Austrade plans to acquire new equipment by March 2026 and implement it in the latter part of the year.

Austrade’s Strategy for Network Infrastructure Revamp

Austrade, Australia’s leading trade and investment development agency, is set to launch a substantial upgrade of its network infrastructure. This project, scheduled for late 2026, will involve the replacement of the current Cisco-based systems in two physical data centres.

Existing Infrastructure and the Need for Transformation

The present configuration features Nexus 7000-series switches and Cisco ASA 5525 firewalls within the internal data centre. These will be replaced with FortiGate firewalls from Fortinet. This upgrade is part of Austrade’s plan to boost connectivity and security, capitalizing on FortiGate’s advanced functionalities.

Austrade to overhaul its data centre core network

Integration with Current Systems

Austrade currently utilizes FortiGate firewalls within its software-defined wide area network (SD-WAN) to ensure stable connections to Azure environments and branch locations. This experience with Fortinet products is anticipated to facilitate a smoother transition.

Enhancing DWDM Systems

Besides the firewall replacements, Austrade is assessing potential enhancements to its Smartoptics Dense Wavelength Division Multiplexing (DWDM) systems. These multiplexers, together with dark fibre from the Intra-government Communications Network (ICON), are vital for site-to-site connectivity.

Project Schedule and Vendor Selection

The project is in its initial phases, concentrating on evaluating available infrastructure solutions for informed resource planning. At this stage, no vendor has been chosen for the core network switches, but Austrade intends to obtain equipment by March 2026, with implementation aimed for the second half of the year.

Conclusion

Austrade is initiating a thorough revamp of its network infrastructure, replacing long-standing Cisco components with Fortinet solutions and upgrading connectivity systems. This transition is designed to improve efficiency and security in alignment with Austrade’s strategic goals.

Q: Why is Austrade changing its current network infrastructure?

A: Austrade seeks to modernize its infrastructure to enhance connectivity, security, and efficiency by moving away from outdated Cisco components.

Q: What components are being updated?

A: Nexus 7000-series switches and Cisco ASA 5525 firewalls are being replaced with Fortinet’s FortiGate firewalls, along with upgrades to Smartoptics DWDM systems.

Q: What is the projected timeline for the infrastructure upgrade?

A: Austrade aims to purchase new equipment by March 2026 and implement it during the third or fourth quarter of the year.

Q: How will this upgrade benefit Austrade?

A: The upgrade is expected to improve data centre connectivity and security, streamline operations, and support Austrade’s wider strategic objectives.

Macquarie Bank’s Digital Head Poised to Transition to Westpac


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Brief Overview

  • Luis Uguina, the digital head at Macquarie Bank, will transition to Westpac in January as the general manager overseeing digital, data, and AI for consumer banking.
  • This transition occurs as Macquarie allocates digital tasks to Ashwin Sinha, who is now the chief officer for data, digital, and AI.
  • Westpac is working to strengthen its digital-first approach, concentrating on client expectations and interactions driven by data.
  • Until Uguina arrives, Emma Prentice will manage Westpac’s digital, data, and AI operations.

Uguina’s Move to Westpac

Starting in January, Luis Uguina, who has held the position of chief digital officer at Macquarie Bank for almost ten years, will become the general manager of digital, data, and AI for consumer banking at Westpac. In his new role, he will report to Andrew McMullan, Westpac’s chief digital and AI officer.

Macquarie Bank's digital leader relocating to Westpac

Macquarie’s Strategic Transition

In light of Uguina’s exit, Macquarie has broadened Ashwin Sinha’s responsibilities, now in charge as the chief data, digital, and AI officer. This new designation is intended to further intertwine data and AI within the bank’s digital services, boosting personalisation and responsiveness to customer needs.

According to Greg Ward, the head of banking and financial services at Macquarie Group, fusing data and AI is evolving previously static digital interfaces into dynamic, intelligent services that adapt to client requirements.

Westpac’s Digital-First Agenda

Carolyn McCann, Westpac’s consumer CEO, highlighted the necessity of embedding a digital-first strategy to surpass customer expectations. The aim is to transition basic sales and service interactions online, allowing bankers to engage in more significant, data-oriented discussions.

Until Uguina takes on his new role, Emma Prentice will lend support to Westpac’s digital, data, and AI initiatives.

Conclusion

The shift of Luis Uguina from Macquarie Bank to Westpac signifies an important change in leadership within the digital banking sphere. Both banks are strategically aligning to harness data and AI to enrich customer experiences and improve operational efficiency. Uguina’s knowledge is expected to aid Westpac’s digital transformation ambitions, aligning with its aim to promote a digital-first strategy.

Q&A

Q: What position will Luis Uguina occupy at Westpac?

A: Uguina will take on the role of general manager for digital, data, and AI in consumer banking at Westpac.

Q: What adjustments has Macquarie Bank made in light of Uguina’s resignation?

A: Macquarie has broadened Ashwin Sinha’s role to encompass digital duties, now acting as the chief data, digital, and AI officer.

Q: What does Westpac’s digital-first strategy entail?

A: Westpac’s strategy seeks to exceed customer expectations by evolving digital channels, shifting interactions online, and facilitating discussions in data-driven banking.

Q: Who will assist Westpac’s digital operations until Uguina starts?

A: Emma Prentice will provide support for Westpac’s digital, data, and AI initiatives until Uguina’s start date.

Q: How does Macquarie perceive the integration of data and AI?

A: Macquarie aims to combine data and AI to redefine digital experiences into intelligent, personalised services that respond to customer demands.

China-linked Flax Typhoon alters ArcGIS plugin into hidden backdoor


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Flax Typhoon’s Discreet Backdoor in ArcGIS Plugin

Brief Overview

  • State-affiliated espionage organization Flax Typhoon discreetly altered an ArcGIS plugin into a remote shell.
  • The breach sustained access for more than a year, even affecting system backups.
  • Flax Typhoon mainly targets government entities and vital infrastructure.
  • The organization employs legitimate system utilities to avoid being detected.
  • Esri acknowledged the first recorded instance of a harmful SOE being weaponized.
  • Behavioral monitoring and cryptographic integrity validations are crucial for detection.

Overview of Flax Typhoon’s Espionage

Flax Typhoon's ArcGIS plugin backdoor

Security analysts have revealed how the state-affiliated espionage organization Flax Typhoon has cleverly transformed a reliable ArcGIS plugin into a remote shell. This surreptitious initiative enabled them to retain access to targeted systems for over a year, even affecting system backups.

Altering ArcGIS for Espionage

Flax Typhoon initially compromised an ArcGIS portal administrator account, executing harmful code on an internal server. They altered a legitimate ArcGIS server object extension (SOE), modifying the Java code to create a concealed command interface. This interface accepted base64-encoded commands and executed them on the host machine, facilitating undetected activities.

Enduring Persistence and Network Exploration

Once the compromised SOE became active, Flax Typhoon mapped the network and set up long-term persistence. They barred competing intruders with a hard-coded access key and deployed a renamed SoftEther VPN binary into the Windows System32 directory. This configuration maintained control via an encrypted channel, blending seamlessly with regular traffic.

Consequences for Critical Infrastructure

ArcGIS, developed by Environmental Systems Research Institute (Esri), is instrumental in managing spatial data vital for disaster recovery and urban planning. A single compromise can unveil sensitive infrastructure information, rendering the platform advantageous for espionage initiatives aimed at infrastructure weaknesses. Esri confirmed this innovative method as the first documented case of a malicious SOE being weaponized in such a fashion.

Identifying and Preventing Future Breaches

ReliaQuest recommends that behavioral monitoring could have potentially identified the attack earlier. Monitoring unusual network activity from server components and confirming the cryptographic integrity of trusted components is essential for protection. Solely depending on file names or digital signatures is inadequate.

A Quiet, Patient Threat Actor

Active since at least mid-2021, Flax Typhoon predominantly targets government offices, educational institutions, and essential manufacturing companies. The group also focuses on organizations in Southeast Asia, North America, and Africa. They utilize living-off-the-land strategies, applying legitimate system utilities to maintain a low profile and taking advantage of known vulnerabilities in public-facing servers.

Conclusion

The discovery of Flax Typhoon’s covert backdoor within an ArcGIS plugin underscores the advanced tactics of state-affiliated espionage operations. By modifying authentic software, the group successfully evaded detection while undermining critical infrastructure. Enhanced behavioral monitoring and cryptographic integrity checks are vital in safeguarding against such threats.

Q: What is Flax Typhoon?

A: Flax Typhoon is a state-affiliated espionage organization recognized for altering legitimate software to carry out covert activities and escape detection.

Q: How did Flax Typhoon compromise ArcGIS?

A: They modified a legitimate ArcGIS server object extension, creating a hidden command interface to run instructions on the host machine.

Q: Why is ArcGIS a target for espionage?

A: ArcGIS is utilized for managing spatial data essential for infrastructure, making it significant for state-sponsored espionage aimed at vulnerabilities.

Q: What measures can detect similar attacks?

A: Behavioral monitoring, observing unusual network activity, and confirming the cryptographic integrity of trusted components can assist in identifying such breaches.

Q: What are living-off-the-land techniques?

A: These strategies involve utilizing legitimate system utilities to execute malicious actions, complicating detection efforts.

Q: How does Flax Typhoon maintain access?

A: They employ long-term persistence strategies like installing VPN binaries and modifying Windows Registry entries to retain control over compromised systems.

McPherson’s Creates AI Assistant to Enhance Key Account Teams


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

  • McPherson’s creates an AI agent in collaboration with Salesforce to improve trade promotions.
  • This AI instrument simplifies mundane tasks, enabling strategic retail dialogues.
  • McPherson’s offerings are accessible in more than 15,000 retail locations across Australia.
  • The initiative is part of a long-term project aimed at enhancing retail execution.

McPherson’s AI Breakthrough in Trade Promotions

McPherson's develops AI agent for key account teams

McPherson’s CIO Nathan Alexander presents at Dreamforce.

AI Agent as a Catalyst for Productivity

McPherson’s Consumer Products has collaborated with Salesforce to introduce an AI agent aimed at boosting the productivity of its key account teams. This groundbreaking tool, characterized by CIO Nathan Alexander as similar to an autopilot, aids in the development of trade promotions and promotes improved dialogue with retailers. By handling repetitive chores, the AI agent frees team members to concentrate on more strategic goals.

Boosting Trade Promotions

Trade promotions play a crucial role in enhancing brand visibility in retail outlets, providing retailers with discounts and special displays. McPherson’s AI agent enhances these promotions by delivering insights into optimal tactics, facilitating superior planning and execution. This results in better shelf-space management and heightened sales.

Fostering Strategic Retail Dialogues

By utilizing data-driven insights, McPherson’s seeks to encourage more strategic conversations with retail partners. The objective goes beyond merely reducing promotional spending; it aims to ensure mutual advantages through informed trade spending decisions.

Broadening McPherson’s Presence

With its products available in over 15,000 pharmacies and grocery stores throughout Australia, McPherson’s is dedicated to refining its retail execution. The AI agent forms part of a larger framework focused on enhancing these operations through Salesforce’s consumer goods cloud.

Optimizing Operations with Salesforce

Prior to the deployment of the AI agent, McPherson’s field teams dedicated considerable time to administrative duties. The integration of Salesforce’s consumer goods cloud has allowed for a more cohesive understanding of customers and improved management of trade promotions, ensuring that teams concentrate on the right products at the appropriate times.

Deployment and Achievement

The installation of the AI agent was a seamless process, finalized in a single day. This swift implementation highlights the tool’s user-friendly nature and the effective synergy between McPherson’s and Salesforce.

Recap

McPherson’s Consumer Products has effectively incorporated an AI agent with Salesforce to revolutionize its trade promotion tactics. By automating routine activities and delivering critical insights, the AI tool empowers key account teams to participate in more strategic retail discussions, ultimately enhancing product demand across Australia.

Q&A Section

Q: What is the main goal of McPherson’s AI agent?

A: The AI agent is designed to enhance trade promotions and improve dialogue with retailers by automating repetitive tasks and offering valuable insights.

Q: In what way does the AI agent enhance trade promotions?

A: It provides insights into effective promotion strategies, enabling teams to plan and execute more impactful promotions, thereby boosting product demand and sales.

Q: How prevalent is McPherson’s product distribution in Australia?

A: McPherson’s products are distributed in more than 15,000 pharmacies and grocery stores throughout Australia.

Q: What is the role of Salesforce in McPherson’s approach?

A: Salesforce’s consumer goods cloud aids McPherson’s efforts to enhance retail execution and manage trade promotions by offering a cohesive view of customers and improving operational efficiency.

Q: How quickly was the AI agent implemented?

A: The AI agent was set up and launched in just one day, demonstrating its simplicity of implementation and efficiency.

ESO’s Legendary Twisting Wall Face-off: An Unrivaled Community Challenge


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

The Elder Scrolls Online: The Writhing Wall Showdown

Quick Overview

  • Exciting community-driven event in The Elder Scrolls Online: The Writhing Wall Showdown.
  • Unlock the Eastern Solstice area by joining forces with your server.
  • Event consists of three stages: Supply and Defense, The Assault Begins, and Fall of the Writhing Wall.
  • Earn exclusive rewards such as the Wormwrithe outfit and Wall Breaker title.
  • Progress is unique to each server, encouraging rivalry between NA and EU servers.

The Fight for the Writhing Wall

There’s something significant happening throughout Tamriel, and this time it’s not merely another world event. The Fight for the Writhing Wall signals a new chapter for The Elder Scrolls Online (ESO), where complete server communities come together to unlock the next part of the narrative.

An Inclusive Battle

Launched this week and now active, this lengthy event directly relates to Update 48 and the Seasons of the Worm Cult storyline. These events culminate in opening the Eastern Solstice: a fresh area accessible only after your server engages, crafts, and collaborates to overcome the challenge.

In contrast to conventional ESO updates that simply show up after patch day, the Writhing Wall necessitates teamwork. Each server’s community must accomplish quests, gather materials, and repel Daedric invasions to progress through three specific phases:

  • Phase 1: Supply and Defense. Collect resources, protect siege camps, and thwart Coldharbour Daedra invading delves and public dungeons throughout Tamriel.
  • Phase 2: The Assault Begins. Take the battle to the Worm Cult. Anticipate stronger sieges, more frequent incursions, and the emergence of Ghishzor, a new Maldrith world boss.
  • Phase 3: Fall of the Writhing Wall. Collaborate to breach the Writhing Fortress public instance. Once any group achieves this, the Eastern Solstice is unlocked for the whole server.
ESO's Writhing Wall Showdown: Community Challenge
Explore a new zone, complete challenges, and unlock an entirely new area in the ESO Writhing Wall event.

Cultivating a Genuine Community Effort

When talking about this innovative approach, Mike Finnigan, Associate Design Director at ZeniMax, stressed the importance of encouraging server community collaboration. This event allows players to engage in their preferred playstyle, whether it’s crafting, PvE, or PvP, all contributing to the overall goal of the server. Each server’s progress is monitored independently, igniting friendly competition between NA and EU servers.

Incentives to Fight For

ESO players can acquire exclusive items like Wormwrithe outfit styles, the Fellowship of Stirk motif, and the Bone Caltrops skill style. Completing the final Writhing Fortress grants the sought-after ‘Wall Breaker’ title. Additional collectibles include the Wormwrithe Bear-Lizard mount and Haj-Mota pet fragments. Engaging in quests and daily rewards can further enhance players’ collections.

How Writhing Wall is Transforming ESO’s Future

Aside from the loot and battles, the Writhing Wall event signifies a change in ESO’s update rollout, granting players greater control over the introduction of new content. This aligns with the developers’ goal of integrating player feedback and presenting more dynamic, community-focused events in the future.

Will You Conquer the Wall?

The struggle for Solstice is more than just another in-game occurrence. It serves as a rallying point for players to unite, engage in their preferred styles of play, and drive their server towards triumph. Whether you’re vanquishing Daedra, crafting supplies, or defending siege camps, every action matters. Learn more about Battle for the Writhing Wall on the ESO blog.

Synopsis

The Writhing Wall Showdown in ESO represents a revolutionary community-driven event that invites players to join forces and unlock new content. With exclusive rewards and a new region at stake, server communities must work together to navigate several stages, marking a fresh chapter for the game.

Q: What is the Writhing Wall Showdown in ESO?

A: It is a multi-week, community-oriented event in The Elder Scrolls Online that challenges players to collaborate and unlock a new area, Eastern Solstice.

Q: How does the event develop?

A: Players are required to complete quests, gather materials, and fend off invasions across three distinct phases: Supply and Defense, The Assault Begins, and Fall of the Writhing Wall.

Q: What rewards are available for participants?

A: Rewards feature Wormwrithe outfit styles, the Fellowship of Stirk motif, Bone Caltrops skill style, and the exclusive ‘Wall Breaker’ title, among other prizes.

Q: Are players able to participate solo?

A: Yes, individual players can join in crafting, gathering, and hunting quests to contribute to the event.

Q: How is progress monitored?

A: Progress for each server is tracked independently, fostering competition between NA and EU servers to unlock the update first.

Q: What does this event mean for the future of ESO?

A: The event represents a shift towards more engaging, player-led content updates, allowing the community to influence the speed of new material.