Australia Tech News - Page 8 of 109 - Techbest - Top Tech Reviews In Australia

Suncorp Adopts Duck Creek Platform at AAMI


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Suncorp’s Digital Evolution: Implementing Duck Creek at AAMI

Brief Overview

  • Suncorp is adopting the Duck Creek platform at its AAMI brand in Australia.
  • This platform was initially launched in a collaborative venture in New Zealand.
  • Complete roll-out across Australian brands anticipated by FY26.
  • 93% of Suncorp’s technology operations are now hosted on the cloud.
  • Suncorp is heavily investing in artificial intelligence and machine learning.
  • Suncorp experienced a 52% rise in net profit compared to the previous year.

Deployment of Duck Creek Platform

Suncorp Group is making considerable progress in enhancing its technological integration with the rollout of the Duck Creek policy administration system (PAS) at its AAMI brand in Australia. This effort follows a successful prior launch in New Zealand, which strengthens the business rationale for the platform.

Suncorp progresses with Duck Creek at AAMI

Suncorp CIO Adam Bennett.

Suncorp CEO Steve Johnston mentioned during the annual investor call that the launch in New Zealand has confirmed the expected advantages. The insurer is heavily investing in this multi-year initiative, with full deployment across Australian brands projected by mid-to-late FY26.

Infrastructure Modernisation and Cloud Migration

In addition to the PAS, Suncorp is also revamping its platform infrastructure. Johnston pointed out the successful completion of data migration to the cloud, with 93% of the company’s technology workloads now publicly hosted. This migration has paved the way for Suncorp to gradually close its older data centres over the past year.

Investments in AI and Machine Learning

Suncorp is placing considerable emphasis on artificial intelligence and machine learning as essential elements of its operational overhaul. Johnston noted that AI is fundamental to digital transformation, automation, and other strategic initiatives aimed at improving customer experiences and operational efficacy.

The firm operates over 100 AI and machine learning models, with intentions to broaden these applications in the coming year. CIO Adam Bennett remarked that Suncorp is scaling these innovations across various business sectors, focusing on customer outcomes as the primary goal.

Financial Results

In its recent financial disclosures, Suncorp revealed a full-year net profit of $1.8 billion, reflecting a 52% increase over the prior year. This growth highlights the advantageous effects of the company’s ongoing technological and operational strategies.

Conclusion

Suncorp’s deployment of the Duck Creek platform at AAMI signifies a crucial leap in its technological development. By modernising its systems and investing in AI, Suncorp aspires to boost efficiency and customer satisfaction. The firm’s strategic emphasis on digital evolution is evidenced by its substantial financial progress.

Questions & Answers

Q: What is the Duck Creek platform?

A: The Duck Creek platform serves as a policy administration system intended to simplify policy management tasks for insurance firms.

Q: Why is Suncorp rolling out this platform at AAMI?

A: Suncorp is adopting the Duck Creek platform to enhance efficiency, improve customer service, and streamline processes across its brands.

Q: When will the platform be completely implemented across Suncorp’s Australian brands?

A: The full implementation of the platform is projected to be completed by mid-to-late FY26.

Q: How is Suncorp utilizing AI and machine learning?

A: Suncorp is employing AI and machine learning to facilitate operational transformation, enhance customer satisfaction, and improve efficiency through various strategic initiatives.

Q: What effect has the cloud migration had on Suncorp?

A: The shift to cloud hosting has permitted Suncorp to phase out its outdated data centres, enhancing agility, scalability, and lowering operating expenses.

Q: How have these initiatives impacted Suncorp’s financial results?

A: Suncorp’s focus on technological advancement and operational efficiency has resulted in a 52% rise in its annual net profit.

Insta360’s Revolutionary Antigravity Drone Flies High with 8K 360 Camera, Surpassing DJI


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Brief Overview

  • The Antigravity A1 is Insta360’s debut drone, featuring an 8K 360-degree camera.
  • It provides distinct functionalities such as the invisible drone effect and user-friendly one-handed operation.
  • Equipped with FlowState Stabilization and 360° Horizon Lock for seamless video capture.
  • Open for pre-order in Australia at A$2,499, with deliveries commencing January 2026.

The Antigravity A1 Breakthrough

Insta360 has entered the drone sector with the Antigravity A1, an innovative product that unites the capabilities of 8K 360-degree video recording with a simple flying interface. This launch signifies a major advancement in aerial photography, enabling pilots to concentrate on flying without the stress of getting the frame right.

Insta360's Antigravity Drone with 8K 360 Camera

8K 360-Degree Recording

The Antigravity A1’s 8K 360-degree video function permits users to document their surroundings in high resolution. This attribute removes the necessity for intricate in-air camera adjustments, since users can adjust their shots during post-editing, creating engaging and interactive visuals.

Invisible Drone Feature

One of the A1’s most revolutionary elements is its capability to erase the drone from the final footage. Cameras mounted on both the upper and lower parts of the drone’s frame facilitate seamless stitching, crafting the illusion of a suspended camera in the air.

User-Friendly Flying Experience

The Antigravity A1 departs from conventional drone controls through its one-handed Grip controller and Vision goggles, which deliver an immersive first-person perspective. This setup streamlines the flying process, making it suitable for both amateurs and seasoned professionals.

FlowState Stabilization

Insta360’s acclaimed FlowState Stabilization technology, combined with 360° Horizon Lock, guarantees smooth and level footage regardless of the drone’s movements, offering a professional-quality filming experience.

Specifications

  • Weight: 249g
  • Maximum Flight Duration: 30 minutes
  • Video Quality: 8K@30fps (360°)
  • Image Quality: 72MP (12K) PureShot 360° Photos
  • Maximum Transmission Range: 10km
  • Stabilization System: FlowState Stabilization & 360° Horizon Lock
  • Controller Type: One-handed Grip Controller with Vision Goggles

Cost and Release Date

The Antigravity A1 is presently available for pre-order in Australia at a cost of A$2,499. The package comprises the drone, an Intelligent Flight Battery, the Grip Controller, Vision Goggles, propellers, and essential cables. Shipping is anticipated to start in January 2026.

Conclusion

The Insta360 Antigravity A1 drone represents a groundbreaking tool that merges advanced 360-degree camera technology with seamless drone operation. With features such as the invisible drone effect and FlowState Stabilization, it provides a distinctive and innovative resource for aerial content creators in Australia.

FAQ

Q: What sets the Antigravity A1’s camera technology apart?

A: The Antigravity A1 boasts an 8K 360-degree camera that captures the entire environment surrounding the drone, enabling users to reframe video footage during editing without concerns about in-flight framing.

Q: How does the invisible drone feature function?

A: The positioning of the drone’s cameras allows for seamless stitching of footage, effectively removing the drone from the finished video and creating the effect of a floating camera.

Q: What is FlowState Stabilization?

A: FlowState Stabilization is Insta360’s technology that guarantees smooth, gimbal-like footage by stabilizing the video and keeping the horizon level, enhancing the quality of aerial visuals.

Q: When will the Antigravity A1 be released in Australia?

A: The Antigravity A1 is now available for pre-order, with shipping expected to begin in January 2026.

ATO Investigates AI-Driven Coding Assistance for 800 Key Developers


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

AI-Driven Coding Support for ATO Developers

The Australian Taxation Office (ATO) is investigating the application of artificial intelligence to boost the efficiency of its 800 principal developers by tackling prevalent programming obstacles.

ATO investigates AI coding support for 800 core developers

Quick Overview

  • ATO is testing AI tools to assist 800 developers.
  • Features consist of code suggestions, bug resolution, and automated test creation.
  • Supports functionality with Visual Studio and Azure DevOps.
  • Guarantees security by not retaining or utilizing code for training purposes.
  • Part of ATO’s larger strategy to integrate AI throughout its operations.

AI Integration in Software Engineering

The ATO is looking for a software-as-a-service solution to collaborate with Microsoft’s development platforms, which include Visual Studio 2019, 2022, and Visual Studio Code. This initiative aims to enable developers to concentrate on high-priority tasks like test case planning, application security, and technology upkeep.

Security and Compliance Issues

Security is a major consideration in the adoption of AI. The ATO has stressed that any code analyzed by the AI will not be stored nor used for model training, thereby addressing issues of privacy and compliance.

Wider AI Integration at ATO

This initiative is part of a broader plan to introduce artificial intelligence across various ATO functions. The agency has identified five enterprise-level AI applications, including fraud detection and document comprehension.

Insights from the AI Innovation Showcase

During the recent AI Innovation Showcase in Canberra, Assistant Commissioner Ying Yang provided insights on the ATO’s internal AI structure, categorizing AI capabilities into scaled machine learning, augmentation, and intelligent automation.

Conclusion

The ATO’s investigation into AI-powered tools for its developers signifies a crucial advancement towards integrating sophisticated technologies to optimize operations and improve productivity. By prioritizing secure and compliant solutions, the ATO intends to harness AI while upholding privacy and data protection standards.

Q: What capabilities will the AI coding assistant offer?

A: The assistant will provide code suggestions, bug fixes, automated test case and script generation, and code refactoring across diverse technologies.

Q: In what manner will the AI tool connect with existing ATO systems?

A: It will integrate with Microsoft’s Visual Studio platforms, Visual Studio Code, Azure DevOps, and Git repositories.

Q: What security protocols are in place for this AI deployment?

A: The ATO guarantees that no code processed by the AI will be saved or utilized for model training, addressing privacy considerations.

Q: How does this project align with ATO’s wider AI strategy?

A: It aligns with the ATO’s ambition to integrate AI within operations, with applications in fraud detection, risk assessment, and document comprehension.

Q: What were the key points discussed at the AI Innovation Showcase regarding ATO’s AI capabilities?

A: Ying Yang detailed the ATO’s AI framework, explaining levels from scaled machine learning to intelligent automation.

UnitedHealth Technology Division Cyberattack Impacts 192.7 Million Individuals


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Impact of UnitedHealth Cyberattack

Overview

  • The cyberattack on UnitedHealth Group’s technology division impacted 192.7 million individuals.
  • This incident is recorded as the largest healthcare data breach in the U.S. thus far.
  • The attack has been attributed to the cybercriminal group known as “Blackcat” ransomware.
  • Claims processing and healthcare services faced disruptions due to the attack.
  • The compromised information encompasses health insurance identification numbers, health conditions, and social security numbers.

Extent and Consequences of the Cyberattack

Cyberattack on UnitedHealth's technology division affected 192.7 million individuals

The cyberattack that targeted UnitedHealth Group’s technology division last year has affected 192.7 million individuals, as indicated by the website of the U.S. health department. This breach has been identified as the largest healthcare data breach in the U.S. to date.

Who Perpetrated the Attack?

The hackers, who label themselves as the “Blackcat” ransomware group, penetrated the technology division. This breach led to extensive disruptions in claims processing, significantly impacting patients and healthcare providers across the nation.

Information Exposed

The breach unveiled sensitive data, including health insurance member identification numbers, patient diagnoses, treatment records, and social security numbers. Additionally, billing codes utilized by providers were also compromised, raising concerns about the potential misuse of this information.

Reaction and Accountability

A spokesperson for UnitedHealth verified that the number of affected individuals is around 192.7 million. The information regarding the breach is documented in a list maintained by the U.S. Department of Health and Human Services’ office for civil rights, underscoring the importance and transparency of this revelation.

Conclusion

The cyberattack on UnitedHealth’s technology division has set a record for the largest healthcare data breach in the U.S., impacting 192.7 million individuals. Attributed to the “Blackcat” group, the attack disrupted healthcare services and revealed sensitive patient data, highlighting the urgent necessity for strong cybersecurity practices within the healthcare industry.

Q: What makes this cyberattack significant?

A: This cyberattack is significant as it marks the largest healthcare data breach in U.S. history, affecting numerous individuals and emphasizing weaknesses in healthcare data security.

Q: Who constitutes the “Blackcat” ransomware group?

A: The “Blackcat” ransomware group is a collective of hackers recognized for targeting large organizations, aiming for financial profit through data ransom demands.

Q: What kinds of data were exposed during the breach?

A: Exposed data includes health insurance member identification numbers, patient diagnoses, treatment details, social security numbers, and billing codes.

Q: What measures has UnitedHealth taken in response to the breach?

A: UnitedHealth has shared details of the breach and collaborated with authorities to document the incident, while likely implementing actions to bolster their cybersecurity protocols.

Q: What are the possible dangers following such a data breach?

A: Potential risks encompass identity theft, financial fraud, and improper use of sensitive health information, which could have serious ramifications for those affected.

Q: How can individuals safeguard themselves from data breaches?

A: Individuals can protect themselves by consistently monitoring their financial transactions, employing strong and distinct passwords, and being cautious when sharing personal information online.

Orro: Astute Shoppers Drive Intelligent Network Funding


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Fast Overview

  • Hyper connected consumers are redefining Australia’s retail scene.
  • Orro’s Intelligent Network solutions facilitate smooth data exchanges within retail ecosystems.
  • Real-time data and security are essential for building consumer trust and satisfaction.
  • Australia Post leverages Orro’s fully-managed SD-WAN solution for improved performance.
  • Digital twin technologies are setting the foundation for robust retail infrastructures.

Comprehending the Hyper Connected Consumer

The retail sector in Australia is experiencing a major evolution fueled by the growing presence of the hyper connected consumer. Modern consumers are in constant interaction across various channels, whether it’s shopping in physical stores, utilizing mobile applications, or engaging with smart home devices. This change has urged retailers to implement secure and agile network solutions to guarantee flawless integration of retail outlets, warehouses, logistics, and digital platforms.

Orro: Hyper connected consumers drive intelligent network investments

Orro’s Intelligent Network Solutions

Orro’s Intelligent Network solutions act as the digital foundation of this emerging retail ecosystem. These solutions facilitate real-time data exchanges among individuals, devices, and systems, enabling retailers to deliver tailored experiences based on consumer habits and preferences. Stuart Long, CTO of Orro, highlights the necessity of dependable, secure, and smart networks in fulfilling these consumer needs.

Optimizing Retail Networks for Seamless Functioning

Beyond the retail front, contemporary retail networks delve deep into supply chains and logistics. They support groundbreaking models such as click and collect, store-to-door, and dropshipping, transforming retailers into small distribution hubs. Orro’s cybersecurity offerings guarantee that these extended networks uphold high data protection standards among third-party partners and delivery services.

Case Study: Australia Post

The influence of Orro in the retail domain is showcased through its SD-WAN solution for Australia Post. This solution supports a wide network of post offices, agencies, and partner locations, enabling adaptive data routing, consistent performance, and reinforced cybersecurity. As Australia Post ventures into digital identity and financial services, Orro’s framework ensures smooth digital interactions and effective network management.

Future-Proofing with Digital Twin Technologies

To ensure retail infrastructures are future-ready, Orro is utilizing AI-driven design tools and digital twin technologies. These virtual representations of retail settings allow retailers to model and enhance network performance, store designs, and logistical operations. By identifying digital entry points and potential vulnerabilities, retailers can fortify their security protocols and boost operational efficiency.

Conclusion

Orro’s strategic efforts in intelligent network solutions are transforming Australia’s retail landscape. By catering to the demands of hyper connected consumers, improving supply chain effectiveness, and employing cutting-edge technologies, Orro is laying the groundwork for a more agile and secure retail future.

Q: Who are hyper connected consumers?

A: Hyper connected consumers interact across various digital and physical channels, anticipating seamless and customized experiences from retailers.

Q: In what ways does Orro aid retail networks?

A: Orro offers intelligent network solutions that facilitate real-time data exchanges, bolster security, and support innovative retail approaches such as click and collect.

Q: What significance do digital twin technologies hold in retail?

A: Digital twin technologies create virtual models of retail environments, enabling retailers to simulate and fine-tune operations before making real-world changes.

Q: How does Orro strengthen cybersecurity in retail networks?

A: Orro’s cybersecurity solutions guarantee that every aspect of a retail network, including third-party participants, meets high data protection benchmarks.

Q: What advantages does Australia Post obtain from Orro’s SD-WAN solution?

A: The SD-WAN solution facilitates dynamic data routing, steady performance, network visibility, and enhanced cybersecurity throughout Australia Post’s extensive network.

Coles Group Tests Advanced AI for Enhanced Employee Leave Reservation


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Coles Group’s AI Advancement for Employee Leave Administration

Quick Overview

  • Coles Group is investigating agentic AI for streamlining leave booking for its 120,000 staff members.
  • The existing AI assistant on the mycoles staff portal has decreased HR inquiries by 85%.
  • Upcoming enhancements are set to allow the AI to undertake actions, such as verifying leave balances.
  • Collaboration between Microsoft and SAP is vital for the AI’s advancement.
  • Coles is also looking into additional AI applications to enhance employee productivity.

Coles Group Adopts AI for Employee Leave Booking

Coles Group is at the forefront of developing an agentic AI system aimed at transforming the leave booking process for its 120,000 staff members. This groundbreaking strategy is anticipated to simplify administrative functions and boost efficiency within the retailer’s operations.

Coles Group's AI to transform leave booking

Caroline O’Brien, Coles Group, left, presents at a Microsoft-led session during the SAP NOW AI Tour in Melbourne.

Success of AI Assistant and Future Initiatives

Recently, Coles launched a “generative AI-driven knowledge assistant” on its mycoles staff portal, designed to respond to frequent inquiries pertaining to employee policies. Caroline O’Brien, general manager of data and intelligence at Coles, stated that the assistant has effectively cut down HR queries by 85%, achieving high satisfaction ratings from users.

The AI assistant currently aids employees by connecting them to essential forms and instructions for submitting leave applications, removing the necessity to consult managers directly. The next phase of its development involves allowing the AI to undertake functions, such as checking leave balances, thus delivering more personalized feedback.

Technological Innovations and Partnerships

To reach this next stage, Coles is partnering with technology leaders Microsoft and SAP to fuse their systems. This partnership intends to evolve the AI from a knowledge source into a proactive agent, fundamentally altering how leave requests are handled.

In addition to leave management, Coles is investigating further agentic AI applications to enhance workplace productivity. The retailer envisions AI solutions that empower employees to execute their tasks more effectively and efficiently.

Conclusion

Coles Group is leading the integration of agentic AI in its operations, with a focus on automating employee leave booking. This initiative not only promises to enhance HR functions but also has the potential to reshape workplace productivity. Through successful partnerships and ongoing innovation, Coles is setting the foundation for AI-driven efficiency in the retail industry.

Q&A

Q: What is agentic AI and how is it distinct from standard AI?

A: Agentic AI is intended to autonomously perform tasks, making decisions based on its surroundings and data inputs. Unlike conventional AI, which mainly processes and supplies information, agentic AI can carry out decisions and actions.

Q: How has the current AI assistant affected Coles’ operations?

A: The AI assistant has drastically decreased HR-related inquiries by 85%, optimizing communication and enhancing employee satisfaction with quicker replies to common inquiries.

Q: What technology partnerships are involved in this AI development?

A: Coles is collaborating with Microsoft and SAP to integrate their systems, allowing the AI to progress from a knowledge-based assistant to a proactive agent capable of autonomously handling leave requests.

Q: What potential advantages could employees gain from AI productivity tools?

A: AI productivity tools could enable employees to carry out tasks more efficiently, potentially transforming their approach to their roles and improving overall job performance.

Q: Are there additional areas where Coles plans to utilize AI solutions?

A: Yes, Coles is examining various uses of agentic AI beyond leave management, with the goal of enhancing multiple aspects of workplace productivity and operational efficiency.

Microsoft Addresses Serious “BadSuccessor” Zero-Day Authentication Vulnerability


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Microsoft’s August Patch Update: Resolving the ‘BadSuccessor’ Zero-Day Issue

Quick Overview

  • Microsoft tackles ‘BadSuccessor’, a zero-day vulnerability, in its August 2025 Patch Wednesday rollout.
  • This issue impacts Windows Server 2025’s use of the Kerberos protocol.
  • Security expert Yuval Gordon recorded the vulnerability, recognized as CVE-2025-53779.
  • Despite its possible seriousness, Microsoft initially classified it as moderate.
  • The August update resolves 107 vulnerabilities, encompassing critical remote code execution defects.

Microsoft Tackles ‘BadSuccessor’ Vulnerability

Microsoft addresses "BadSuccessor" zero-day authentication flaw

In the most recent Patch Wednesday update for August 2025, Microsoft has introduced a vital correction for a zero-day vulnerability known as “BadSuccessor.” This flaw, which became public prior to having a patch available, affects the implementation of the Kerberos network authentication protocol in Windows Server 2025.

Detection and Documentation

The flaw was initially documented in May 2025 by Akamai security professional Yuval Gordon. Listed as CVE-2025-53779, this privilege escalation vulnerability permits attackers to compromise any user within Active Directory. Gordon’s findings suggested that taking advantage of this vulnerability is quite simple, raising alarms about its possible consequences.

Microsoft’s Reaction

After receiving a notification from Gordon, Microsoft’s Security Response Centre (MSRC) validated the flaw. Nevertheless, early evaluations categorized the vulnerability as moderate, which postponed immediate action. Despite this, security companies, such as Rapid7 and Qualys, have emphasized the flaw’s capacity to promote attackers to domain administrator capabilities.

Patch Wednesday: Tackling Major Vulnerabilities

In addition to addressing BadSuccessor, Microsoft’s August patch bundle resolves a total of 107 vulnerabilities. These encompass significant remote code execution flaws in Windows, Microsoft Office, the Hyper-V hypervisor, and the Message Queuing component. Although there is no proof of active exploitation of the BadSuccessor vulnerability, the extensive nature of the update highlights the vital need for strong cybersecurity practices.

Conclusion

Microsoft’s August 2025 Patch Wednesday is a pivotal update in confronting the ‘BadSuccessor’ zero-day vulnerability. Initially deemed moderate, this flaw was subsequently acknowledged for its significant severity, especially regarding the risk to Active Directory environments. The update not only mitigates this particular vulnerability but also enhances defenses against a variety of other critical security threats.

Q: What is the ‘BadSuccessor’ vulnerability?

A: ‘BadSuccessor’ is a zero-day privilege escalation vulnerability in the Kerberos authentication protocol of Windows Server 2025, enabling attackers to compromise Active Directory users.

Q: How was the vulnerability identified?

A: The vulnerability was identified by Akamai security researcher Yuval Gordon in May 2025 and subsequently reported to Microsoft’s Security Response Centre.

Q: What is the importance of the August Patch Wednesday update?

A: The update addresses 107 vulnerabilities, including critical issues, thereby ensuring enhanced security across numerous Microsoft products.

Q: Was the ‘BadSuccessor’ vulnerability being actively exploited?

A: There is no evidence indicating active exploitation of the ‘BadSuccessor’ vulnerability at this moment.

Q: Why did Microsoft initially classify the vulnerability as moderate?

A: Microsoft’s initial evaluation did not regard the vulnerability as severe enough for swift action, although subsequent assessments by security firms highlighted its possible ramifications.

Q: What other vulnerabilities were resolved in the August update?

A: Along with ‘BadSuccessor’, the update rectified critical remote code execution bugs in Windows, Microsoft Office, Hyper-V, and the Message Queuing component.

Q: How can users protect themselves from such vulnerabilities?

A: Users should consistently update their software, promptly apply security patches, and adopt effective cybersecurity strategies to mitigate potential risks.

AI Revolutionizes Government Networking: Transitioning from Infrastructure Cost to Strategic Resource


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

  • AI converts government networking from an expense to a vital strategic resource.
  • State governments encounter issues related to staffing deficits and outdated infrastructure.
  • Networking driven by AI provides enhanced security and service efficiency.
  • HPE Aruba Networking acknowledged as a frontrunner in AI-enhanced networking solutions.
  • Government entities gain from insights based on data and adaptable cloud alternatives.

The AI Transformation in Government Networking

The AI Transformation in Government Networking: From Infrastructure Expense to Vital Resource

Revamping Government Infrastructure

Historically, network infrastructure has been viewed merely as a basic connectivity tool by state agencies, but that view is shifting. AI-driven networking solutions present a valuable opportunity for state governments to allocate scarce resources towards a significant return on investment, boosting security and service provision.

AI in Networking: A Necessary Advancement

Given the ongoing staffing deficits and aging infrastructure, AI in networking offers a strategic option for governmental agencies. “Previously, the network was merely seen as an expense. This is no longer true,” remarks Elissa McCormick, Senior Manager at HPE Aruba Networking.

Managing Varied Devices and Security Regulations

As various devices inundate government networks, conventional networking strategies become strained. AI’s capabilities prove essential by utilizing behavioral analysis to identify device trends and automatically implement suitable security measures.

Transformational Operations through AI

AI tackles governmental obstacles by reducing time dedicated to regular operational tasks. Rather than IT teams resolving network problems manually, AI solutions identify issues and offer resolutions, enhancing operational productivity.

Scalable Data-Driven Excellence

HPE’s AI networking harnesses data from millions of devices, facilitating precise anomaly identification and bolstering security and compliance. This intelligence is vital for overseeing IoT devices and avoiding unanticipated data leaks.

Acknowledgment and Adaptability in AI-Driven Solutions

HPE Aruba Networking is recognised by Gartner as a leader in AI-driven solutions. The adaptability provided by HPE allows government agencies to determine how they utilize networking solutions, aligning with varying data sovereignty needs.

Conclusion

Networking powered by AI is revolutionizing government infrastructure from an expenditure to a strategic resource. With improved security, efficiency, and flexibility, state governments can more effectively satisfy the rising expectations of citizens while addressing infrastructure challenges.

Q&A Session

Q: What obstacles do state governments encounter with traditional networking?

A: They face issues like staffing shortages, aging systems, and management of varied devices.

Q: In what way does AI enhance government networking?

A: AI provides superior security, operational effectiveness, and insights based on data, evolving networks into strategic resources.

Q: What recognition has HPE Aruba Networking attained?

A: It has been recognised as a leader by Gartner in the Magic Quadrant for Enterprise Wired and Wireless LAN Infrastructure.

Q: How does AI assist in managing diverse devices on government networks?

A: AI employs behavioral analysis to discern device trends and automatically implements relevant security policies.

Q: What flexibility do AI-powered solutions provide to government agencies?

A: They allow for flexibility in data management, enabling agencies to select cloud or local data centers depending on their requirements.

Researchers Discover Fresh Weaknesses in TETRA Secured Wireless Communications


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

vulnerabilities in TETRA Encrypted Wireless Communications

Quick Overview

  • Recent vulnerabilities in TETRA networks influence encryption robustness.
  • Serious weaknesses could enable attackers to insert harmful data.
  • Australian mining firms heavily rely on TETRA for their communication needs.
  • Experts urge for independent evaluations of TETRA networks.

Revealing New Weaknesses in TETRA Networks

Security researchers from Midnight Blue in the Netherlands have disclosed a series of critical vulnerabilities within TETRA (Terrestrial Trunked Radio) communication networks. These issues, unveiled via reverse-engineering and termed 2TETRA:2BURST, compromise the end-to-end encryption (E2EE) utilized by security agencies and elite forces.

Researchers detect vulnerabilities in TETRA wireless encryption

Insights into the Vulnerabilities

The investigation reveals six new security weaknesses, supplementing five that were previously recognized in 2023. The most critical, CVE-2025-52941, involves a compromised AES-128 encryption algorithm, diminishing its strength to a concerning 56 bits. Another weakness, CVE-2025-52943, targets networks employing multiple encryption methods, permitting attackers to take advantage of less secure keys to decrypt communications believed to be protected.

Consequences for the Industry

These vulnerabilities could allow intruders to interfere with industrial control systems within TETRA networks, leading to threats in sectors such as mining operations. This situation could result in unauthorized control over vital equipment such as SCADA systems.

Difficulties in Addressing the Issues

In contrast to conventional software vulnerabilities, these issues originate from essential design flaws in TETRA, which lack message authentication and replay resistance. The particular weaknesses affect the Sepura Embedded E2EE solution, yet other versions may also be vulnerable.

A Call for Openness

The cryptographic principles of TETRA have remained undisclosed for many years, impeding independent security assessments. Announcements to publish these principles were made in 2023, signaling a departure from the “security by obscurity” tactic adopted earlier by ETSI, which standardized TETRA back in 1995.

Effects on Australian Industries

TETRA networks function in more than 100 nations, constituting the foundation for emergency communications. In Australia, mining firms have widely incorporated TETRA for remote operations over the last decade, emphasizing the urgency for swift security evaluations.

Conclusion

The recent identification of vulnerabilities in TETRA networks by Midnight Blue underscores significant security issues for encrypted communications internationally. The flaws, which involve compromised encryption algorithms, threaten essential infrastructures and necessitate immediate independent assessments.

Q&A Section

Q: What is TETRA?

A: TETRA (Terrestrial Trunked Radio) is a communication standard commonly employed by emergency services and various industry sectors for secure radio communications.

Q: What new vulnerabilities have been discovered in TETRA networks?

A: The vulnerabilities encompass weakened encryption algorithms and flaws that could permit attackers to inject harmful data, jeopardizing communication security.

Q: What is the significance of publishing TETRA algorithms?

A: Publishing the algorithms concludes a long-standing “security by obscurity” approach, allowing independent security researchers to assess and find potential weaknesses.

Q: How do these vulnerabilities impact Australian industries?

A: Mining companies in Australia, reliant on TETRA for remote operations, may face the threat of unauthorized control over crucial systems, making comprehensive security evaluations essential.

University of Western Australia Requires All Staff and Students to Change Their Passwords


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Brief Overview

  • The University of Western Australia has initiated a password reset for all employees and students due to a security incident.
  • There was a detection of unauthorized access to password data.
  • All employees and students are temporarily restricted from access until their passwords are reset.
  • Ongoing investigations indicate that no other systems are thought to have been breached.
  • IT and security personnel responded rapidly to control and recover from the situation.
  • Relevant authorities have been alerted.

University Security Incident Triggers Measures

The University of Western Australia (UWA) has mandated a password reset for every one of its employees and students following the detection of unauthorized access to a database containing password information. This measure is a direct response to a suspected security breach aimed at ensuring the security of UWA’s digital ecosystem.

University of Western Australia resets all staff and student passwords

Prompt Action and Control

Upon discovering the breach, UWA promptly locked all employees and students out of its systems, instructing them to reset their passwords for access restoration. Throughout the weekend, dedicated IT and security teams labored diligently to manage the incident. The university’s prompt action highlights its dedication to safeguarding personal and institutional information.

Continuing Investigation and Updates

As investigations are in progress, the university has indicated that it believes no other systems or sensitive data were at risk. Communication with impacted individuals has been consistent, ensuring transparency and offering guidance on necessary security actions.

System Security and Preventative Strategies

UWA employs a centralized access management system for its community members. Although it remains unconfirmed if this system was specifically targeted, the university is undertaking all required measures. They have notified the pertinent authorities and are enhancing their cyber security measures to avert future incidents.

Recap

The University of Western Australia has proactively responded to a potential security breach involving password data. By resetting passwords and effectively communicating with its community, UWA is placing a high priority on security and transparency. Ongoing investigations are aimed at ensuring the protection of its digital assets.

Q&A Session

Q: Why was a password reset implemented at UWA?

A: UWA observed unauthorized access to password data and took precautionary action by resetting passwords.

Q: Are other systems at UWA impacted by this incident?

A: Current investigations indicate that no other systems or data have been breached.

Q: How is UWA informing staff and students about the incident?

A: UWA is utilizing official communication channels to update its community and provide instructions for password resets.

Q: What measures is UWA implementing to avoid future breaches?

A: UWA is enhancing its security procedures and working with authorities to fortify its cyber defenses.

Q: Do staff and students need to reset their passwords right away?

A: Yes, staff and students need to reset their passwords as directed to regain access to UWA systems.

Q: Which parties have been informed about the incident?

A: UWA has notified the relevant authorities and continues to keep its employees and students updated.