Australia’s A$25bn AI wager, Bezos’s leap into “physical AI” and Musk’s push to shift data centres into orbit turned this week into a defining moment in the AI global industrial contest, with the Global South emerging as both proving ground and prize in the new AI steel age.
Vercel confirms a security incident after a compromised third-party AI tool's OAuth token allowed attackers to pivot into internal systems, exposing environment variables and API keys across its platform.
Anthropic is scrambling to contain fresh questions over its Mythos AI after online users reportedly accessed the ultra‑powerful model through previously mapped pathways, sharpening Pentagon supply chain concerns and spooking markets already on edge about AI‑driven cyber risk
23rd January 2026 Cyber Update: ASRock Rack Breach Exposes Server Firmware, Supply Chain at Risk
The Everest ransomware group has breached ASRock Rack, a major server hardware vendor, stealing 509GB of sensitive data including firmware, BIOS, and other critical files. The breach creates a significant supply chain risk, potentially allowing attackers to embed vulnerabilities in server hardware.
Cyber News Centre's cyber update for 23rd January 2026: ASRock Rack has been breached by the Everest ransomware group, exposing critical server hardware data and creating a significant supply chain risk.
ASRock Rack Inc., the enterprise server hardware subsidiary of Taiwanese manufacturer ASRock, was listed on the Everest ransomware group's dark web leak site on January 21, 2026. Established in 2013, the company specialises in cloud computing server hardware, including motherboards, servers, and storage solutions used in data centers worldwide.
The Update and Why It Matters
Update: The Everest ransomware group, a Russian-speaking cybercriminal entity known for data exfiltration and access brokering, claims to have stolen a 509-gigabyte database from ASRock Rack. The stolen data reportedly includes highly sensitive technical documentation, firmware, software, BIOS files, diagnostic and installation tools, and Baseboard Management Controller (BMC) firmware. Everest has threatened to publish the full data set within nine days if its demands are not met, though no public ransom amount has been specified. The group provided screenshots of file trees as proof, with keywords like "data centre" and "diag" suggesting the authenticity of the stolen material.
This incident is part of a recent wave of attacks by Everest, which also targeted McDonald's India and an ASUS supplier. The group has a history of evolving its tactics, moving from simple data exfiltration to full-scale ransomware and, more recently, focusing on data-only extortion. This attack on a core hardware vendor highlights the increasing focus of ransomware groups on high-value enterprise targets with the potential for widespread downstream impact. The exfiltration of low-level hardware and firmware files represents a significant escalation in the group's operational capabilities and strategic targeting.
Why it Matters: This breach extends beyond a typical data leak and poses a severe supply chain risk to organizations globally, including in Australia, that rely on ASRock Rack server hardware. With access to firmware and BIOS-related material, attackers could potentially embed hidden vulnerabilities or backdoors directly into the hardware's core software. Malicious actors could repackage these authentic-looking drivers and firmware updates for malicious distribution, creating a trusted entry point into secure networks.
This incident serves as a critical reminder that the security of the digital supply chain is only as strong as its weakest link, and a compromise at the hardware level can undermine layers of software-based security, creating persistent and hard-to-detect risks for enterprise and government infrastructure.
Get the stories that matter to you. Subscribe to Cyber News Centre and update your preferences to follow our Daily 4min Cyber Update, Innovative AI Startups, The AI Diplomat series, or the main Cyber News Centre newsletter — featuring in-depth analysis on major cyber incidents, tech breakthroughs, global policy, and AI developments.
Sign up for Cyber News Centre
Where cybersecurity meets innovation, the CNC team delivers AI and tech breakthroughs for our digital future. We analyze incidents, data, and insights to keep you informed, secure, and ahead.
Vercel confirms a security incident after a compromised third-party AI tool's OAuth token allowed attackers to pivot into internal systems, exposing environment variables and API keys across its platform.
According to Microsoft’s April 2026 Security Update Guide, the company fixed more than 160 vulnerabilities across Windows, Office and core services, including an actively exploited SharePoint zero‑day and a Defender privilege‑escalation flaw.
The largest DeFi exploit of 2026 has seen $293 million drained from Kelp DAO's LayerZero cross-chain bridge, triggering a $5.4 billion withdrawal panic across the broader ecosystem and exposing critical centralization flaws in modular security.
ShinyHunters has exposed a critical weakness in cloud systems. The McGraw Hill breach shows how misconfigured Salesforce portals enabled large scale data leaks, with no software flaw to fix. This marks a shift toward exploiting common operational gaps rather than rare vulnerabilities.
Where cybersecurity meets innovation, the CNC team delivers AI and tech breakthroughs for our digital future. We analyze incidents, data, and insights to keep you informed, secure, and ahead. Sign up for free!