Macquarie Cloud Services named Australia’ s top cybersecurity graduate employer
New GodRAT trojan targets financial sector via Skype
CISO news
Macquarie Cloud Services named Australia’ s top cybersecurity graduate employer
M acquarie Cloud Services, part of Macquarie Technology Group, has ranked number one overall in workplace for graduates on Prosple’ s careers and education platform.
“ This achievement is testament to the incredible experience we offer early-career talent,” said Naveen Gera, Head of Service Assurance, Macquarie Cloud Services.
The ranking appears in Prosple AU Top 100 Guide, which lists Australia’ s Top 100 Graduate Employers on the platform.
From more than 700 employers that advertise on Prosple, Macquarie Cloud Services took out the top spot as Australia’ s number one cybersecurity workplace for graduates and best workplace for graduates. It also stood out as number one for career progression, training and development, meaningful work and culture.
The four-year programme was launched as an opportunity for Macquarie Cloud Services to develop graduates in processes aligned with the company’ s evolving needs and unique environment.
In recognising the hunger of young workers to learn, grow and avoid being stuck in a role without career progression, the company created its employee value proposition( EVP).
The EVP is focused across five dimensions: culture, work life, organisation, opportunity and reward. It ensures graduates receive career advancement, flexibility, support and compensation among many other benefits.
“ Each graduate is provided with six-monthly certifications training, on-the-job learning, time off to study and incremental salary increases. We know everyone’ s path is not the same, so we tailor the various pathways and opportunities to the individual and ensure the next 10 years of their career at Macquarie Technology Group is mapped out,” said Gera.
New GodRAT trojan targets financial sector via Skype
new remote access Trojan( RAT) called GodRAT has been found
A targeting financial institutions, with its initial distribution channel being malicious screensaver files sent via Skype messenger, cybersecurity firm Kaspersky has revealed.
The Kaspersky Global Research and Analysis Team( GReAT) discovered the malware after it was uploaded to an online scanner in July 2024. The threat actors behind the campaign targeted small and medium-sized businesses( SMBs) in the United Arab Emirates, Hong Kong, Jordan and Lebanon.
AsyncRAT as a secondary implant to ensure continued access to compromised systems.
Saurabh Sharma, a security researcher for Kaspersky’ s GReAT, said,“ GodRAT appears to be an evolution of AwesomePuppet, which was reported by Kaspersky in 2023 and is likely linked to the Winnti APT.” Sharma noted that the malware’ s code has similarities to the two-decade-old Gh0st RAT, highlighting how threat actors continue to adapt legacy codebases for new campaigns.
The GodRAT builder allows attackers to disguise the payload by using legitimate process names and saving the file in various formats, including. exe,. com and. bat.
GodRAT is highly evasive, using steganography – the practice of concealing a file within another – to hide malicious code within image files to avoid detection. The RAT then steals system information and can use additional plugins to explore victims’ systems and deploy password stealers to extract credentials from browsers like Chrome and Microsoft Edge. The attackers also used
WWW. INTELLIGENTCISO. COM 9