
Three Australians face possible death penalty over Bali villa shooting of Melbourne father Zivan Radmanovic
A third Australian man has been arrested over the Bali villa shooting that left one man dead and another seriously injured.
Melbourne father Zivan 'Stipe' Radmanovic, 32, was fatally shot, while 34-year-old Sanar Ghanim was injured when the pair were ambushed during their stay at Villa Casa Santisya in Munggu, in Bali's Badung Regency, in the early hours of Saturday.
Two gunmen fled the scene on motorbikes after bashing and shooting both men.
On Tuesday, police said one suspect had been arrested while attempting to board a flight at Jakarta International Airport, and another was taken into custody in Singapore.
By Wednesday, police confirmed that a third Australian man had been arrested overseas.
All three men, identified by police only as 'D', 'C' and 'T', could face the death penalty if convicted, authorities said.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


West Australian
16 minutes ago
- West Australian
JB Hi-Fi pays $13.5m to settle The Good Guys promotions lawsuit
Retail giant JB Hi-Fi has agreed to pay a $13.5 million fine to settle allegations that certain store promotions at The Good Guys were misleading and deceptive. The company, which owns the discount white goods and electronics warehouses, has also agreed to a remediation program for some customers. The Australian Competition and Consumer Commission started legal action against JB Hi-Fi in Federal Court in July last year over certain store credit and StoreCash promotions, alleging they violated consumer law. The Good Guys promised to provide customers with store credit for buying goods — such as $50 in StoreCash for a $500 purchase — but the retailer didn't disclose they also had to opt-in to receive marketing communications, the ACCC said at the time. The retailer also didn't adequately mention the credits expired quickly, mostly within seven and 10 days, the ACCC said. 'We are concerned that as a result of the alleged conduct, consumers may have purchased products from The Good Guys which they might not have done otherwise,' ACCC chair Gina Cass-Gottlieb said when it launched court proceedings. 'Businesses should be on notice that promotional conditions must be prominently disclosed to consumers, rather than buried in hard-to-find locations, or they risk enforcement action under the Australian consumer law.' The ACCC said 116 promotion ran from July 2019 to August 2023. 'The Good Guys takes its compliance with the law very seriously and has worked co-operatively with the ACCC to resolve the matter,' JB Hi-Fi said in a statement on Monday. 'The Good Guys has always sought to provide value and benefits to its customers and has always prided itself on its high levels of trust with consumers.' JB Hi-Fi has also agreed to contribute $200,000 to the ACCC's court costs. The ACCC said the agreement was subject to Federal Court approval and full details of the outcome would be made public when the court announced its judgment.


Perth Now
33 minutes ago
- Perth Now
Update after man ‘grabs' 14yo on cruise ship
A major cruise line has responded after a 71-year-old man was charged with assaulting a teenage girl aboard one of its ships off the Australian coast. Police allege the man approached the 14-year-old girl near a lift on the Carnival Encounter cruise ship and grabbed her shortly before 11pm on Thursday. The man was not known to the teenager, police say. Police allege the 14-year-old was grabbed by the man while on the cruise ship off the coast of Queensland. supplied Credit: Supplied She quickly alerted nearby staff, who intervened. She was not physically harmed. In a statement released on Monday, a Carnival Cruise Lines spokesperson said the company was co-operating with police. 'Carnival Cruise Line is co-operating with police after an (alleged) incident involving one of our guests,' the spokesperson said. 'The alleged victim was offered support and counselling. 'Our commitment to the safety and security of all our guests and team members is demonstrated through the implementation of various measures to assure that our ships are a welcoming, family-friendly place.' The ship was off the coast of Queensland at the time of the alleged assault. Detectives from the Gateway Child Protection and Investigation Unit arrested the man at the Port of Brisbane on Saturday morning. He has been charged with deprivation of liberty and two counts of common assault. Police objected to the man's bail. He was due to appear in Brisbane Magistrates Court on Monday.


The Advertiser
2 hours ago
- The Advertiser
Derailing ransomware - today's great train robbery
It wasn't too long ago that the criminal enterprise of choice would see thieves jump aboard a moving train, navigate the carriages, neutralise the guards, get through locked doors, and ransack the locomotive of its valuable jewels and gold. In 2025, there is a similar motive at play, but the heists have shifted from the Wild West to the World Wide Web. Cyberattacks are today's great train robberies and they're increasingly common. Recent research from Rubrik Zero Labs found 92 per cent of Australian organisations experienced a cyberattack last year, and the attackers are only growing more sophisticated. Ransomware is one of the most common types of cyberattacks, comprising 20 per cent of all attacks, and those behind them do not discriminate. According to the same Rubrik Zero Labs' research, attackers have evolved, with 78 per cent of Australian victims reporting the threat actors were able to at least partially harm backup and recovery options. In more than a third (35 per cent) of cases, the attackers were completely successful. Why are attackers targeting backups? If they can successfully compromise these critical data copies, the victim's ability to recover data under their own steam will be severely impacted. The thinking is, if they can take these down, then the victim will be forced to pay the ransom. And it's working. Rubrik Labs Research also found that of the Australian firms hit with a ransomware attack last year, more than 90 per cent paid the ransom to recover their data. While paying an attacker may allow a business to recover its data or stop a threat, it also supports the cybercrime business model. If a ransomware attack works once, what's going to stop it working again, and again, and again. Paying a ransom just fuels the fire. These payments may have previously gone unreported, however late last month the federal government introduced mandatory ransomware payment reporting requirements. This could change the calculus for local organisations as they seek to avoid the reputational risk of payments going public. Unfortunately, despite best efforts, there is no silver bullet to protect against every single cyberattack. You can't prevent the unpreventable. So the only thing that matters is how quickly you can recover. There are many reasons why the frequency of cyberattacks, like ransomware, are increasing. These include the rising use of AI by cybercriminals, more sophistication of attacks, significant financial incentives, uneasy geopolitical climates, digitisation of organisations, and the shortage of cybersecurity professionals. With this in mind, adopting a preemptive recovery posture - one that recognises a motivated attack will eventually be successful - organisations can take the initiative and recover faster than attackers can adapt. So, it is imperative to be prepared with a recovery plan. To prepare for the worst. To adopt an "assumed breach" mindset. In short, cyber resilience strategies reduce the severity of ransomware threats. Even if an organisation's systems are breached and held to ransom, secure backups ensure the business can quickly assess the scale of the breach, understand the scope of the compromise, and rapidly recover operations - all without paying a ransom. This will lead to a decline in Australian businesses paying out ransoms and perpetuating the cybercrime business model. If the nation is no longer seen as a soft target, if robbers never come away with any loot, they'll shift their attention elsewhere - or better yet, leave the looting life behind. Just like trains in the Wild West, businesses need multiple defences. Even if the thieves make it onto the train, past the guard and get through the locked door, it's not like valuables are out in the open waiting to be taken. They're in safes, requiring different keys and combinations to open. Cyber resilience strategies are an organisation's impenetrable safe - ensuring the crown jewels and critical backups needed to keep the train in motion are out of an attacker's reach. It wasn't too long ago that the criminal enterprise of choice would see thieves jump aboard a moving train, navigate the carriages, neutralise the guards, get through locked doors, and ransack the locomotive of its valuable jewels and gold. In 2025, there is a similar motive at play, but the heists have shifted from the Wild West to the World Wide Web. Cyberattacks are today's great train robberies and they're increasingly common. Recent research from Rubrik Zero Labs found 92 per cent of Australian organisations experienced a cyberattack last year, and the attackers are only growing more sophisticated. Ransomware is one of the most common types of cyberattacks, comprising 20 per cent of all attacks, and those behind them do not discriminate. According to the same Rubrik Zero Labs' research, attackers have evolved, with 78 per cent of Australian victims reporting the threat actors were able to at least partially harm backup and recovery options. In more than a third (35 per cent) of cases, the attackers were completely successful. Why are attackers targeting backups? If they can successfully compromise these critical data copies, the victim's ability to recover data under their own steam will be severely impacted. The thinking is, if they can take these down, then the victim will be forced to pay the ransom. And it's working. Rubrik Labs Research also found that of the Australian firms hit with a ransomware attack last year, more than 90 per cent paid the ransom to recover their data. While paying an attacker may allow a business to recover its data or stop a threat, it also supports the cybercrime business model. If a ransomware attack works once, what's going to stop it working again, and again, and again. Paying a ransom just fuels the fire. These payments may have previously gone unreported, however late last month the federal government introduced mandatory ransomware payment reporting requirements. This could change the calculus for local organisations as they seek to avoid the reputational risk of payments going public. Unfortunately, despite best efforts, there is no silver bullet to protect against every single cyberattack. You can't prevent the unpreventable. So the only thing that matters is how quickly you can recover. There are many reasons why the frequency of cyberattacks, like ransomware, are increasing. These include the rising use of AI by cybercriminals, more sophistication of attacks, significant financial incentives, uneasy geopolitical climates, digitisation of organisations, and the shortage of cybersecurity professionals. With this in mind, adopting a preemptive recovery posture - one that recognises a motivated attack will eventually be successful - organisations can take the initiative and recover faster than attackers can adapt. So, it is imperative to be prepared with a recovery plan. To prepare for the worst. To adopt an "assumed breach" mindset. In short, cyber resilience strategies reduce the severity of ransomware threats. Even if an organisation's systems are breached and held to ransom, secure backups ensure the business can quickly assess the scale of the breach, understand the scope of the compromise, and rapidly recover operations - all without paying a ransom. This will lead to a decline in Australian businesses paying out ransoms and perpetuating the cybercrime business model. If the nation is no longer seen as a soft target, if robbers never come away with any loot, they'll shift their attention elsewhere - or better yet, leave the looting life behind. Just like trains in the Wild West, businesses need multiple defences. Even if the thieves make it onto the train, past the guard and get through the locked door, it's not like valuables are out in the open waiting to be taken. They're in safes, requiring different keys and combinations to open. Cyber resilience strategies are an organisation's impenetrable safe - ensuring the crown jewels and critical backups needed to keep the train in motion are out of an attacker's reach. It wasn't too long ago that the criminal enterprise of choice would see thieves jump aboard a moving train, navigate the carriages, neutralise the guards, get through locked doors, and ransack the locomotive of its valuable jewels and gold. In 2025, there is a similar motive at play, but the heists have shifted from the Wild West to the World Wide Web. Cyberattacks are today's great train robberies and they're increasingly common. Recent research from Rubrik Zero Labs found 92 per cent of Australian organisations experienced a cyberattack last year, and the attackers are only growing more sophisticated. Ransomware is one of the most common types of cyberattacks, comprising 20 per cent of all attacks, and those behind them do not discriminate. According to the same Rubrik Zero Labs' research, attackers have evolved, with 78 per cent of Australian victims reporting the threat actors were able to at least partially harm backup and recovery options. In more than a third (35 per cent) of cases, the attackers were completely successful. Why are attackers targeting backups? If they can successfully compromise these critical data copies, the victim's ability to recover data under their own steam will be severely impacted. The thinking is, if they can take these down, then the victim will be forced to pay the ransom. And it's working. Rubrik Labs Research also found that of the Australian firms hit with a ransomware attack last year, more than 90 per cent paid the ransom to recover their data. While paying an attacker may allow a business to recover its data or stop a threat, it also supports the cybercrime business model. If a ransomware attack works once, what's going to stop it working again, and again, and again. Paying a ransom just fuels the fire. These payments may have previously gone unreported, however late last month the federal government introduced mandatory ransomware payment reporting requirements. This could change the calculus for local organisations as they seek to avoid the reputational risk of payments going public. Unfortunately, despite best efforts, there is no silver bullet to protect against every single cyberattack. You can't prevent the unpreventable. So the only thing that matters is how quickly you can recover. There are many reasons why the frequency of cyberattacks, like ransomware, are increasing. These include the rising use of AI by cybercriminals, more sophistication of attacks, significant financial incentives, uneasy geopolitical climates, digitisation of organisations, and the shortage of cybersecurity professionals. With this in mind, adopting a preemptive recovery posture - one that recognises a motivated attack will eventually be successful - organisations can take the initiative and recover faster than attackers can adapt. So, it is imperative to be prepared with a recovery plan. To prepare for the worst. To adopt an "assumed breach" mindset. In short, cyber resilience strategies reduce the severity of ransomware threats. Even if an organisation's systems are breached and held to ransom, secure backups ensure the business can quickly assess the scale of the breach, understand the scope of the compromise, and rapidly recover operations - all without paying a ransom. This will lead to a decline in Australian businesses paying out ransoms and perpetuating the cybercrime business model. If the nation is no longer seen as a soft target, if robbers never come away with any loot, they'll shift their attention elsewhere - or better yet, leave the looting life behind. Just like trains in the Wild West, businesses need multiple defences. Even if the thieves make it onto the train, past the guard and get through the locked door, it's not like valuables are out in the open waiting to be taken. They're in safes, requiring different keys and combinations to open. Cyber resilience strategies are an organisation's impenetrable safe - ensuring the crown jewels and critical backups needed to keep the train in motion are out of an attacker's reach. It wasn't too long ago that the criminal enterprise of choice would see thieves jump aboard a moving train, navigate the carriages, neutralise the guards, get through locked doors, and ransack the locomotive of its valuable jewels and gold. In 2025, there is a similar motive at play, but the heists have shifted from the Wild West to the World Wide Web. Cyberattacks are today's great train robberies and they're increasingly common. Recent research from Rubrik Zero Labs found 92 per cent of Australian organisations experienced a cyberattack last year, and the attackers are only growing more sophisticated. Ransomware is one of the most common types of cyberattacks, comprising 20 per cent of all attacks, and those behind them do not discriminate. According to the same Rubrik Zero Labs' research, attackers have evolved, with 78 per cent of Australian victims reporting the threat actors were able to at least partially harm backup and recovery options. In more than a third (35 per cent) of cases, the attackers were completely successful. Why are attackers targeting backups? If they can successfully compromise these critical data copies, the victim's ability to recover data under their own steam will be severely impacted. The thinking is, if they can take these down, then the victim will be forced to pay the ransom. And it's working. Rubrik Labs Research also found that of the Australian firms hit with a ransomware attack last year, more than 90 per cent paid the ransom to recover their data. While paying an attacker may allow a business to recover its data or stop a threat, it also supports the cybercrime business model. If a ransomware attack works once, what's going to stop it working again, and again, and again. Paying a ransom just fuels the fire. These payments may have previously gone unreported, however late last month the federal government introduced mandatory ransomware payment reporting requirements. This could change the calculus for local organisations as they seek to avoid the reputational risk of payments going public. Unfortunately, despite best efforts, there is no silver bullet to protect against every single cyberattack. You can't prevent the unpreventable. So the only thing that matters is how quickly you can recover. There are many reasons why the frequency of cyberattacks, like ransomware, are increasing. These include the rising use of AI by cybercriminals, more sophistication of attacks, significant financial incentives, uneasy geopolitical climates, digitisation of organisations, and the shortage of cybersecurity professionals. With this in mind, adopting a preemptive recovery posture - one that recognises a motivated attack will eventually be successful - organisations can take the initiative and recover faster than attackers can adapt. So, it is imperative to be prepared with a recovery plan. To prepare for the worst. To adopt an "assumed breach" mindset. In short, cyber resilience strategies reduce the severity of ransomware threats. Even if an organisation's systems are breached and held to ransom, secure backups ensure the business can quickly assess the scale of the breach, understand the scope of the compromise, and rapidly recover operations - all without paying a ransom. This will lead to a decline in Australian businesses paying out ransoms and perpetuating the cybercrime business model. If the nation is no longer seen as a soft target, if robbers never come away with any loot, they'll shift their attention elsewhere - or better yet, leave the looting life behind. Just like trains in the Wild West, businesses need multiple defences. Even if the thieves make it onto the train, past the guard and get through the locked door, it's not like valuables are out in the open waiting to be taken. They're in safes, requiring different keys and combinations to open. Cyber resilience strategies are an organisation's impenetrable safe - ensuring the crown jewels and critical backups needed to keep the train in motion are out of an attacker's reach.