
Air New Zealand taps digital chief as next CEO to steer firm through challenges
Foran, who joined the airline just as the COVID-19 pandemic loomed, announced his resignation earlier this year, and would be leaving in October. The flag carrier continues to grapple with global supply chain disruptions and persistent engine maintenance issues.
Ravishankar, who has served as Air New Zealand's chief digital officer for nearly four years, will assume the top job on October 20. Prior to joining the airline, he held leadership roles at Vector and consulting firm Accenture (ACN.N), opens new tab, where he was managing director.
"Airlines will continue to face immense challenges, whether that's climate change, customer expectations, technology, cost pressures or geopolitics," said Chair Dame Therese Walsh.
"Nikhil brings a fresh perspective that is grounded in New Zealand values and a deep knowledge of the airline and critical infrastructure across different sectors."
Air New Zealand's struggles have been compounded by a relatively small domestic market and fierce competition from Australian carriers Qantas Airways (QAN.AX), opens new tab and Virgin Australia (VGN.AX), opens new tab. It has also seen delayed plane deliveries and several jets being grounded.
Foran, a former Walmart (WMT.N), opens new tab executive, has led the Kiwi flag carrier through a turbulent period, with the airline facing unique hurdles compared to its global peers, partly due to its geographic isolation.
The carrier had earlier flagged that up to 11 of its aircraft would remain grounded at times in the second half of fiscal 2025, which would bite into the firm's earnings.
The company is also expecting lower earnings in 2025, citing uncertainty around global engine maintenance delays and related compensation levels.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


The Guardian
9 hours ago
- The Guardian
Ninety laptops, millions of dollars: US woman jailed over North Korea remote-work scam
In March 2020, about the time the Covid pandemic started, Christina Chapman, a woman who lived in Arizona and Minnesota, received a message on LinkedIn asking her to 'be the US face' of a company and help overseas IT workers gain remote employment. As working from home became the norm for many people, Chapman was able to find jobs for the foreign workers at hundreds of US companies, including some in the Fortune 500, such as Nike; 'a premier Silicon Valley technology company'; and one of the 'most recognizable media and entertainment companies in the world'. The employers thought they were hiring US citizens. They were actually people in North Korea. Chapman was participating in the North Korean government's scheme to deploy thousands of 'highly skilled IT workers' by stealing identities to make it look like they were in the US or other countries. They have collected millions of dollars to boost the government's nuclear weapons development, according to the US justice department and court records. Chapman's bizarre story – which culminated in an eight-year prison sentence – is a curious mix of geopolitics, international crime and one woman's tragic tale of isolation and working from home in a gig-dominated economy where increasingly everything happens through a computer screen and it is harder to tell fact from fiction. The secret North Korean workers, according to the federal government and cybersecurity experts, not only help the US's adversary – a dictatorship which has been hobbled by international sanctions over its weapons program – but also harm US citizens by stealing their identities and potentially hurt domestic companies by 'enabling malicious cyber intrusions' into their networks. 'Once Covid hit and everybody really went virtual, a lot of the tech jobs never went back to the office,' said Benjamin Racenberg, a senior intelligence manager at Nisos, a cybersecurity firm. 'Companies quickly realized: I can get good talent from anywhere. North Koreans and other employment fraudsters have realized that they can trick hiring systems to get jobs. I don't think that we have done enough as a community to prevent this.' To run the schemes, the North Koreans need facilitators in the United States, because the companies 'aren't going to willingly send laptops to North Korea or even China', said Adam Meyers, head of counter-adversary operations for CrowdStrike, a cybersecurity firm. 'They find somebody that is also looking for a gig-economy job, and they say, 'Hey, we are happy to get you $200 per laptop that you manage,'' said Meyers, whose team has published reports on the North Korean operation. Chapman grew up in an abusive home and drifted 'between low-paying jobs and unstable housing', according to documents submitted by her attorneys. In 2020, she was also taking care of her mother, who had been diagnosed with renal cancer. About six months after the LinkedIn message, Chapman started running what law enforcement officials describe as 'laptop farms'. In addition to hosting computers, she helped the North Koreans pose as US citizens by validating stolen identity information; sent some laptops abroad; logged into the computers so that the foreign workers could connect remotely; and received paychecks and transferred the money to the workers, according to court documents. Meanwhile, the North Koreans created fictitious personas and online profiles to match the job requirements for remote IT worker positions. They often got the jobs through staffing agencies. In one case, a 'top-five five national television network and media company' headquartered in New York hired one of the North Koreans as a video-streaming engineer. The person posing as 'Daniel B' asked Chapman to join a Microsoft Teams meeting with the employer so that the co-conspirator could also join. The indictment does not list victims' full names. 'I just typed in the name Daniel,' Chapman told the person in North Korea, according to court records of an online conversation. 'If they ask WHY you are using two devices, just say the microphone on your laptop doesn't work right.' 'OK,' the foreign actor responded. 'Most IT people are fine with that explanation,' Chapman replied. Chapman was aware that her actions were illegal. 'I hope you guys can find other people to do your physical I-9s. These are federal documents. I will SEND them for you, but have someone else do the paperwork. I can go to FEDERAL PRISON for falsifying federal documents,' Chapman wrote to a group of her co-conspirators. Chapman was also active on social media. In a video posted in June 2023, she talked about having breakfast on the go because she was so busy, and her clients were 'going crazy!', Wired reported. Behind Chapman were racks with at least a dozen open laptops with sticky notes. In October 2023, federal investigators raided her home and found 90 laptops. In February this year, she pleaded guilty to conspiracy to commit wire fraud, aggravated identity theft and conspiracy to launder monetary instruments. Over the three years that Chapman worked with the North Koreans, some of the employees received hundreds of thousands of dollars from a single company. In total, the scheme generated $17m for Chapman and the North Korean government. The fraudsters also stole the identities of 68 people, who then also had false tax liabilities, according to the justice department. In a letter to the court before her sentencing, Chapman thanked the FBI for arresting her because she had been 'trying to get away from the guys that I was working with for awhile [sic] and I wasn't really sure how to do it'. 'The area where we lived didn't provide for a lot of job opportunities that fit what I needed,' Chapman wrote. 'To the people who were harmed, I send my sincerest apologies. I am not someone who seeks to harm anyone, so knowing that I was a part of a company that set out to harm people is devastating to me.' Last week, US district court judge Randolph Moss sentenced Chapman to more than eight years in prison; to forfeit $284,000 that was to be paid to the North Koreans, and to pay a fine of $176,000. Chapman and her co-conspirators were not the only ones conducting such fraud. In January, the federal government also charged two people in North Korea, a Mexican citizen and two US citizens for a scheme that helped North Korean IT workers land jobs with at least 64 US companies and generated at least $866,000 in revenue, according to the justice department. Racenberg, of Nisos, said he expected cybercriminals to use artificial intelligence to 'get better and better' at performing such schemes. Companies should conduct 'open-source research' on applicants because oftentimes the fraudsters reuse résumé content, Racenberg said. 'If you put the first few lines of the résumé in, you might find two, three other résumés online that are exactly the same with these very similar companies or similar dates,' Racenberg added. 'That should raise some flags.' During an interview, if there is background noise that sounds like a call center or if the applicant refuses to remove a fake or blurred background, that could also be cause for concern, Meyers, of CrowdStrike, said. And companies should ask new hires to visit the office to pick up their laptop rather than mail it to them because that allows the company to see if the person who shows up is the same one you interviewed, Racenberg said. Five years after the pandemic, more companies have also started to require employees to return to the office at least part time. If all corporations did that, would it eliminate the threat? 'It's going to prevent all of this from happening, yes,' Racenberg said. 'But are we going to go back to that? Probably not.'


Reuters
10 hours ago
- Reuters
OPEC+ agrees to 548,000 bpd oil output hike for Sept, sources say
LONDON, Aug 3 (Reuters) - Eight OPEC+ countries meeting on Sunday have agreed to raise oil output in September by 548,000 barrels per day, three OPEC+ sources said while the meeting was under way. The group will hold its next meeting on September 7, one of the sources said.


Reuters
11 hours ago
- Reuters
US deportation threats, EU beauty tariffs and AI voice rules
Follow on Apple or Spotify. Listen on the Reuters app. The Trump administration threatens some migrants with third country deportation - then sends them home. European fashion brands scramble to navigate steep U.S. tariffs without burdening consumers. And new AI rules don't go far enough for voice actors across Europe fearing job loss. Find our new On Assignment podcast here. Visit the Thomson Reuters Privacy Statement for information on our privacy and data protection practices. You may also visit to opt out of targeted advertising. Further Reading The US said it had no choice but to deport them to a third country. Then it sent them home EU brands turn to obscure customs clause to soften blow of Trump's tariffs Voice actors push back as AI threatens dubbing industry