Australia’s A$25bn AI wager, Bezos’s leap into “physical AI” and Musk’s push to shift data centres into orbit turned this week into a defining moment in the AI global industrial contest, with the Global South emerging as both proving ground and prize in the new AI steel age.
Vercel confirms a security incident after a compromised third-party AI tool's OAuth token allowed attackers to pivot into internal systems, exposing environment variables and API keys across its platform.
Anthropic is scrambling to contain fresh questions over its Mythos AI after online users reportedly accessed the ultra‑powerful model through previously mapped pathways, sharpening Pentagon supply chain concerns and spooking markets already on edge about AI‑driven cyber risk
16th January 2026 Cyber Update: Nissan Hit by Everest Ransomware, 900GB Data Stolen
Japanese automaker Nissan is the latest victim of the Everest ransomware group, which claims to have stolen 900GB of sensitive data. The breach, announced January 10, threatens internal records, dealer info, and possibly customer data —raising serious concerns for its Australian operations.
Cyber News Centre's cyber update for 16th January 2026: Nissan has become the latest target of a major ransomware attack, with the Everest group claiming to have exfiltrated 900GB of sensitive data.
Nissan Motor Corporation, a leading Japanese multinational automobile manufacturer, is grappling with a significant cybersecurity incident. The Everest ransomware group, a notorious Russia-linked cybercriminal organisation, announced on its dark web leak site on January 10, 2026, that it had successfully breached the automaker's systems and stolen a massive 900GB of internal data. The group has threatened to leak the data if a ransom is not paid within five days.
The Update and Why It Matters
Update: The Everest group has released sample data to substantiate its claims, including screenshots of internal documents, dealership information, and confidential business records. The exfiltrated data reportedly contains a wide range of sensitive information, including proprietary manufacturing designs, financial records, audit reports, and potentially the personal data of employees and customers. File formats in the leak include .csv, .txt, .pgp, and .xls, suggesting a mix of structured data from various internal systems.
This incident follows a string of previous cyberattacks on Nissan, including a 2024 breach by the Akira ransomware gang that affected 100,000 individuals in Australia and New Zealand, and another in December 2025 that exposed the data of 21,000 customers. Nissan has not yet publicly confirmed the full extent of the Everest breach, but the incident highlights the persistent and evolving threats facing the global automotive industry. The attackers are using a double-extortion tactic, not only encrypting data but also threatening to publish it, thereby increasing pressure on the company to negotiate.
Why it Matters: This breach has significant implications for Nissan's global operations, particularly in Australia, where the company has a substantial presence and a history of being targeted. The exposure of sensitive dealership and customer information poses a direct risk of fraud, phishing attacks, and identity theft to Australian consumers and businesses.
For Nissan, the reputational damage could be severe, eroding customer trust and potentially leading to significant financial losses and regulatory penalties under data protection laws like Australia's Privacy Act. The incident serves as a stark reminder of the vulnerability of complex, interconnected supply chains within the automotive sector. As vehicles become increasingly software-dependent and connected, the attack surface for cybercriminals expands, making robust, multi-layered security not just a recommendation, but a critical necessity for survival in the modern industrial landscape.
Get the stories that matter to you. Subscribe to Cyber News Centre and update your preferences to follow our Daily 4min Cyber Update, Innovative AI Startups, The AI Diplomat series, or the main Cyber News Centre newsletter — featuring in-depth analysis on major cyber incidents, tech breakthroughs, global policy, and AI developments.
Sign up for Cyber News Centre
Where cybersecurity meets innovation, the CNC team delivers AI and tech breakthroughs for our digital future. We analyze incidents, data, and insights to keep you informed, secure, and ahead.
Vercel confirms a security incident after a compromised third-party AI tool's OAuth token allowed attackers to pivot into internal systems, exposing environment variables and API keys across its platform.
According to Microsoft’s April 2026 Security Update Guide, the company fixed more than 160 vulnerabilities across Windows, Office and core services, including an actively exploited SharePoint zero‑day and a Defender privilege‑escalation flaw.
The largest DeFi exploit of 2026 has seen $293 million drained from Kelp DAO's LayerZero cross-chain bridge, triggering a $5.4 billion withdrawal panic across the broader ecosystem and exposing critical centralization flaws in modular security.
ShinyHunters has exposed a critical weakness in cloud systems. The McGraw Hill breach shows how misconfigured Salesforce portals enabled large scale data leaks, with no software flaw to fix. This marks a shift toward exploiting common operational gaps rather than rare vulnerabilities.
Where cybersecurity meets innovation, the CNC team delivers AI and tech breakthroughs for our digital future. We analyze incidents, data, and insights to keep you informed, secure, and ahead. Sign up for free!