Instructure has confirmed that a criminal threat actor accessed Canvas user information and messages, while ShinyHunters claims a far larger education-sector data haul affecting millions of students, teachers, and institutions worldwide.
Trellix says attackers gained unauthorised access to part of its source code repository, but has found no evidence that its release pipeline was affected or that code was exploited.
Stargate has become the clearest warning flare in the AI boom, as Norway, Australia and a handful of hyperscalers turn the race for compute into a high‑stakes battle over who will own, power and ultimately control the global inference economy.
20th March 2026 Cyber Update: Headlines of the Week
Stryker is rebuilding after a cyberattack that wiped about 80,000 devices via a compromised Intune admin account, with up to 50TB of data reportedly exfiltrated. As US systems face similar probes, Australia is exposed, increasing pressure on boards to tighten cyber controls and readiness.
Cyber News Centre's cyber update for 20th March 2026: The last 72 hours have underscored how quickly geopolitical cyber tensions can spill into healthcare, law enforcement and, by extension, Australia’s own critical systems.
The Update and Why It Matters
The Update: Medical technology group Stryker says it is working to restore its systems after a cyberattack that reportedly enabled pro-Iranian actors to remotely wipe tens of thousands of employee devices. Open-source reporting suggests the attackers gained access to a Microsoft Intune administrator account and then used Intune’s remote-wipe capability to erase data across roughly 80,000 managed devices within hours. A pro-Iran hacktivist persona, “Handala,” has claimed responsibility, framing the incident as a politically motivated wiper-style operation. The group alleges it both destroyed systems and exfiltrated up to 50 TB of corporate data, including information from employees’ personal devices enrolled in Stryker’s mobile device management environment.
In parallel, US authorities are probing a suspected Chinese compromise of an FBI surveillance platform, a reminder that core law‑enforcement infrastructure is now a live target, not off‑limits “blue space”.
For Australia, the technical details matter less than the direction of travel. Local threat briefings this week flag an upswing in ransomware campaigns and exploitation of new zero‑day vulnerabilities in Cisco SD‑WAN and other edge systems commonly deployed by Australian healthcare, telco and government agencies. That places domestic networks only one step removed from the kind of destructive tradecraft now being field‑tested offshore.
Regulators are responding. AFSA’s March update reiterates expectations for stronger cyber resilience, faster incident reporting and tighter controls around fraud, identity theft and cyber‑enabled financial crime. Agencies and boards are being told, in effect, that “we were collateral damage” will not wash as a defence when basic segmentation, patching and supplier oversight were missing.
Why It Matters: The warning for Australian organisations is blunt: if your systems look like those being successfully hit in the US and Europe, assume the same playbooks are already being pointed at you – and that regulators will expect you to be ready. Incidents like Stryker strengthen the case for Australian regulators to demand tighter third‑party and medical‑device cyber governance, and for boards to treat MDM, Intune and similar tools as high‑risk control points, not background IT plumbing
Get the stories that matter to you. Subscribe to Cyber News Centre and update your preferences to follow our Daily 4min Cyber Update, Innovative AI Startups, The AI Diplomat series, or the main Cyber News Centre newsletter — featuring in-depth analysis on major cyber incidents, tech breakthroughs, global policy, and AI developments.
Sign up for Cyber News Centre
Where cybersecurity meets innovation, the CNC team delivers AI and tech breakthroughs for our digital future. We analyze incidents, data, and insights to keep you informed, secure, and ahead.
Instructure has confirmed that a criminal threat actor accessed Canvas user information and messages, while ShinyHunters claims a far larger education-sector data haul affecting millions of students, teachers, and institutions worldwide.
Trellix says attackers gained unauthorised access to part of its source code repository, but has found no evidence that its release pipeline was affected or that code was exploited.
Stargate has become the clearest warning flare in the AI boom, as Norway, Australia and a handful of hyperscalers turn the race for compute into a high‑stakes battle over who will own, power and ultimately control the global inference economy.
The UK’s 2025/2026 Cyber Security Breaches Survey shows 43% of businesses and 28% of charities reported a cyber incident in the past year. The headline is not just persistence; it is operational exposure. Phishing remains the dominant route in, education is absorbing heavier pressure, and supplier-r
Where cybersecurity meets innovation, the CNC team delivers AI and tech breakthroughs for our digital future. We analyze incidents, data, and insights to keep you informed, secure, and ahead. Sign up for free!