Australia’s A$25bn AI wager, Bezos’s leap into “physical AI” and Musk’s push to shift data centres into orbit turned this week into a defining moment in the AI global industrial contest, with the Global South emerging as both proving ground and prize in the new AI steel age.
Vercel confirms a security incident after a compromised third-party AI tool's OAuth token allowed attackers to pivot into internal systems, exposing environment variables and API keys across its platform.
Anthropic is scrambling to contain fresh questions over its Mythos AI after online users reportedly accessed the ultra‑powerful model through previously mapped pathways, sharpening Pentagon supply chain concerns and spooking markets already on edge about AI‑driven cyber risk
12th March 2026 Cyber Update: Five Eyes Agencies Warn of INC Ransom Attacks on Australian Healthcare
Joint advisory by Australian, New Zealand, and Tongan cyber authorities warns of rising INC Ransom attacks on critical infrastructure. The RaaS group has breached 11 Australian organisations, mainly in healthcare and professional services.
Cyber News Centre's cyber update for 12th March 2026: Australian and Pacific cyber authorities have issued a joint warning on the INC Ransom group, citing ongoing ransomware and data-extortion activity affecting organisations across Australia, New Zealand, and Pacific island states.
The Australian Cyber Security Centre (ACSC) is Australia's lead federal government agency for cybersecurity, operating under the Australian Signals Directorate (ASD). It provides guidance, threat intelligence, and incident response support to government and private sector organisations. The ACSC works closely with international partners, including New Zealand's NCSC and CERT Tonga, to coordinate responses to cross-border cyber threats.
The Update and Why It Matters
Update: A joint advisory from the Australian Cyber Security Centre (ACSC), New Zealand's NCSC, and CERT Tonga has highlighted a significant threat from the INC Ransom group, which has intensified its focus on the Pacific region since early 2025. Operating a Ransomware-as-a-Service (RaaS) model, the group's affiliates have compromised at least 11 Australian organisations between July 2024 and December 2025, primarily targeting the healthcare and professional services sectors.
The attackers gain initial access via spear-phishing, exploiting unpatched systems, or using purchased credentials. Once inside, they escalate privileges, move laterally, and exfiltrate sensitive data including medical records before deploying the ransomware.
This double-extortion tactic pressures victims to pay by threatening to publish stolen data on their dark web leak site. The advisory notes that INC Ransom's affiliates use legitimate tools like 7-Zip and rclone to blend in with normal network activity, making detection more difficult. The group, also known as Tarnished Scorpion and GOLD IONIC, has been linked to disruptive attacks on health networks in Tonga and New Zealand, demonstrating a clear pattern of targeting critical infrastructure where operational downtime carries severe consequences.
Why it Matters: The coordinated warning from three national cybersecurity agencies underscores the escalating and tangible threat that ransomware groups like INC Ransom pose to Australia's most sensitive sectors.
The specific targeting of healthcare is not accidental; it is a calculated strategy that leverages the immense pressure these organisations face to maintain continuous operations. For Australians, this means the potential for direct disruption to essential medical services, cancellation of appointments, and the exposure of highly personal health information.
The RaaS model lowers the barrier to entry for less sophisticated criminals, effectively franchising cybercrime and amplifying the threat. This incident serves as a stark reminder that the digital supply chain for critical services remains a vulnerable frontier, where a single breach can have cascading, real-world impacts on public safety and national security.
Get the stories that matter to you. Subscribe to Cyber News Centre and update your preferences to follow our Daily 4min Cyber Update, Innovative AI Startups, The AI Diplomat series, or the main Cyber News Centre newsletter — featuring in-depth analysis on major cyber incidents, tech breakthroughs, global policy, and AI developments.
Sign up for Cyber News Centre
Where cybersecurity meets innovation, the CNC team delivers AI and tech breakthroughs for our digital future. We analyze incidents, data, and insights to keep you informed, secure, and ahead.
Vercel confirms a security incident after a compromised third-party AI tool's OAuth token allowed attackers to pivot into internal systems, exposing environment variables and API keys across its platform.
According to Microsoft’s April 2026 Security Update Guide, the company fixed more than 160 vulnerabilities across Windows, Office and core services, including an actively exploited SharePoint zero‑day and a Defender privilege‑escalation flaw.
The largest DeFi exploit of 2026 has seen $293 million drained from Kelp DAO's LayerZero cross-chain bridge, triggering a $5.4 billion withdrawal panic across the broader ecosystem and exposing critical centralization flaws in modular security.
ShinyHunters has exposed a critical weakness in cloud systems. The McGraw Hill breach shows how misconfigured Salesforce portals enabled large scale data leaks, with no software flaw to fix. This marks a shift toward exploiting common operational gaps rather than rare vulnerabilities.
Where cybersecurity meets innovation, the CNC team delivers AI and tech breakthroughs for our digital future. We analyze incidents, data, and insights to keep you informed, secure, and ahead. Sign up for free!