Iran’s confrontation with the US and Israel is playing out as a rolling cyber campaign, with Iran aligned and proxy groups running noisy DDoS, defacement and hack and leak attacks on banks, telecoms and government targets, while active Chrome zero days give attackers fresh options.
Australia’s healthcare sector faces sustained ransomware pressure, with multiple threat groups exploiting weak controls and legacy systems. Recent breaches highlight systemic gaps, where compromised vendors and undetected lateral movement are driving a rising risk of sector-wide disruption.
NVIDIA turned AI factories into grid assets, China published its AI dominance doctrine, and the US military confirmed using Claude in Iran strikes. From energy infrastructure to battlefield targeting, the AI race this week moved well beyond Silicon Valley.
2nd of April 2026 Cyber Update: Zero Days, Ransomware Pressure and AI‑Charged Geopolitics
Iran’s confrontation with the US and Israel is playing out as a rolling cyber campaign, with Iran aligned and proxy groups running noisy DDoS, defacement and hack and leak attacks on banks, telecoms and government targets, while active Chrome zero days give attackers fresh options.
The past 48 hours have been defined by fresh zero day activity across Google’s ecosystem, elevated geopolitical cyber operations, and steady pressure on Australian and US critical sectors.
Google has pushed an emergency Chrome update to patch CVE 2026 5281, a high severity use after free in the Dawn WebGPU component that is already being exploited in the wild, continuing a pattern of rapidly weaponised browser flaws this year.
In the mobile stack, Google and partners are still managing the fallout from a Qualcomm related Android zero day that has moved from research finding to confirmed exploitation and mandatory patching across US federal networks. In the background, cyber activity linked to the latest phase of conflict with Iran is sustaining a higher tempo of disruptive and influence operations by state aligned and ideologically motivated groups, with spillover risk for Western commercial networks and infrastructure.
Palo Alto Networks’ Unit 42 reports a surge in Iran aligned and pro Russian hacktivist activity following the US and Israeli operations, with around 60 groups active as of early March and continuing campaigns of DDoS, defacements and hack and leak operations against governments, financial services, telecoms and infrastructure across at least 16 countries.
Why it matters
For Australian and US enterprises, the current wave of Chrome and Android zero days highlights how client side vulnerabilities are being cycled through live campaigns at speed, shrinking the margin for delayed patching on both managed and BYO endpoints. Endpoint hygiene, rapid patch orchestration and realistic browser and mobile exploitation scenarios in red teaming are now central operational issues rather than best practice talking points.
In the Australian market, ongoing Five Eyes warnings about ransomware crews targeting healthcare, professional services and mid market businesses reinforce that criminal operators are exploiting the same gaps in patching discipline and basic configuration that high end actors use, while policy settings and disclosure expectations continue to harden. Set against an environment where AI is being operationalised for reconnaissance, targeting and information operations in live conflicts, boards and executives should be treating AI enhanced tradecraft and geopolitical escalation as core assumptions in cyber risk, not emerging future trends.
Get the stories that matter to you. Subscribe to Cyber News Centre and update your preferences to follow our Daily 4min Cyber Update, Innovative AI Startups, The AI Diplomat series, or the main Cyber News Centre newsletter — featuring in-depth analysis on major cyber incidents, tech breakthroughs, global policy, and AI developments.
Sign up for Cyber News Centre
Where cybersecurity meets innovation, the CNC team delivers AI and tech breakthroughs for our digital future. We analyze incidents, data, and insights to keep you informed, secure, and ahead.
Australia’s healthcare sector faces sustained ransomware pressure, with multiple threat groups exploiting weak controls and legacy systems. Recent breaches highlight systemic gaps, where compromised vendors and undetected lateral movement are driving a rising risk of sector-wide disruption.
DragonForce ransomware hit Health Management Systems, an Australian healthcare software provider. Hospitals/clinics urged to check vendor security, isolate backups & train staff vs phishing.
A global coalition led by Microsoft and Europol has dismantled the Tycoon 2FA phishing-as-a-service platform, a major criminal enterprise that enabled attackers to bypass multi-factor authentication and compromise nearly 100,000 organisations worldwide.
Stryker is rebuilding after a cyberattack that wiped about 80,000 devices via a compromised Intune admin account, with up to 50TB of data reportedly exfiltrated. As US systems face similar probes, Australia is exposed, increasing pressure on boards to tighten cyber controls and readiness.
Where cybersecurity meets innovation, the CNC team delivers AI and tech breakthroughs for our digital future. We analyze incidents, data, and insights to keep you informed, secure, and ahead. Sign up for free!