NVIDIA turned AI factories into grid assets, China published its AI dominance doctrine, and the US military confirmed using Claude in Iran strikes. From energy infrastructure to battlefield targeting, the AI race this week moved well beyond Silicon Valley.
DragonForce ransomware hit Health Management Systems, an Australian healthcare software provider. Hospitals/clinics urged to check vendor security, isolate backups & train staff vs phishing.
A global coalition led by Microsoft and Europol has dismantled the Tycoon 2FA phishing-as-a-service platform, a major criminal enterprise that enabled attackers to bypass multi-factor authentication and compromise nearly 100,000 organisations worldwide.
CISA and International Partners Release New Network Security Guidance
In a significant move towards strengthening global cybersecurity frameworks, the Cybersecurity and Infrastructure Security Agency (CISA), in collaboration with the Federal Bureau of Investigation (FBI), has unveiled new guidance titled "Modern Approaches to Network Access Security."
In a significant move towards strengthening global cybersecurity frameworks, the Cybersecurity and Infrastructure Security Agency (CISA), in collaboration with the Federal Bureau of Investigation (FBI), has unveiled new guidance titled "Modern Approaches to Network Access Security."
This initiative sees a convergence of efforts from international partners including New Zealand’s Government Communications Security Bureau (GCSB), New Zealand’s Computer Emergency Response Team (CERT-NZ), and the Canadian Centre for Cyber Security (CCCS).
This newly released guidance underscores the urgent need for businesses of all sizes to transition to more advanced security solutions, such as Zero Trust, Secure Service Edge (SSE), and Secure Access Service Edge (SASE).
These frameworks aim to enhance visibility into network activities and mitigate risks associated with traditional remote access and VPN configurations, which have become increasingly vulnerable in the face of sophisticated cyber threats.
CISA's Cross-Sector Cybersecurity Performance Goals (CPGs) play a crucial role in this initiative. These goals represent a common set of protections that all critical infrastructure entities—from large to small—should implement to meaningfully reduce the likelihood and impact of known risks and adversary techniques.
Developed through extensive consultation with industry, government, and experts, the CPGs provide a baseline set of cybersecurity practices with high-impact outcomes, serving as a benchmark for critical infrastructure operators to measure and improve their cybersecurity maturity.
By adopting these practices, small- and medium-sized organisations can prioritise essential security actions, thus kickstarting their cybersecurity efforts. The CPGs are unique as they address both individual and national risks, combining recommended practices for information technology and operational technology owners.
Released on November 22, 2023, the 2023-2030 Australian Cyber Security Strategy aims to position Australia as a global leader in cybersecurity by 2030.
The strategy emphasises six key cyber shields: strong businesses and citizens, safe technology, world-class threat sharing and blocking, protected critical infrastructure, sovereign capabilities, and resilient regional and global leadership.
The Australian Government has taken concrete steps by appointing a Cyber Coordinator lead by military intelligence veteran Michelle McGuinness In charge to responding to major cyber incidents and by enhancing cyber incident reporting through Project REDSPICE. The one-stop shop at cyber.gov.au simplifies incident reporting, making it easier for businesses to meet their regulatory obligations.
The release of guidance by CISA and its international partners marks a positive step towards concerted global cybersecurity cooperation.
This collaborative approach helps establish a unified framework for network access security, enhances threat intelligence sharing, and promotes the adoption of cutting-edge security models. As businesses worldwide grapple with evolving threats, adherence to this guidance is crucial in safeguarding network access and maintaining robust security postures.
A critical pre‑authentication remote code execution flaw in BeyondTrust’s Remote Support and Privileged Remote Access allows unauthenticated attackers to run arbitrary commands on exposed appliances, enabling full system compromise and broad lateral movement.
A critical 9.8‑rated flaw (CVE-2025-40551) in SolarWinds Web Help Desk is under active exploitation, letting unauthenticated attackers execute remote code and prompting urgent patch orders for government and enterprise users worldwide.
January 2026 reveals AI’s true battleground: not just code, but power, chips, and physical infrastructure. From TSMC and ASML shaping compute supply to robots, exoskeletons, and soaring energy demand, the race for intelligence now spans factories, grids, and even orbit above and below too now
By 2027 the race to become the first cosmic CEO is moving from science fiction to strategy. Starcloud has already trained an AI model in orbit on an Nvidia H100, while Google prepares Project Suncatcher. What remains missing is not ambition, but clear pricing and proof orbital compute can pay.
Where cybersecurity meets innovation, the CNC team delivers AI and tech breakthroughs for our digital future. We analyze incidents, data, and insights to keep you informed, secure, and ahead. Sign up for free!