Executive Summary As we commence the week, the Australian cybersecurity landscape is dominated by active exploitation of a new vulnerability in the popular SmarterMail platform and a high-profile data disclosure involving Substack. Additionally, the healthcare sector sees a reprieve with the conclusion of the Epworth HealthCare investigation, though the threat level remains critical. This briefing covers the latest intelligence from the last 24-48 hours, essential for decision-makers in Healthcare, SaaS, and Government sectors.
1. Critical SaaS Vulnerability: SmarterMail Exploited in the Wild
Sector: SaaS, Government, Education Threat Level: Critical
Over the weekend, reports confirmed that a new vulnerability in SmarterTools’ SmarterMail is being actively exploited in the wild. SmarterMail, widely used by Australian SMEs and educational institutions for email hosting, has come under attack by threat actors leveraging this flaw to execute arbitrary code and gain persistence on mail servers.
- Impact: Unauthorised access to email communications, potential lateral movement into corporate networks, and data exfiltration.
- Action: Administrators using SmarterMail must verify their instances immediately. If a patch is available from the vendor, apply it instantly. If not, consider restricting external access to the webmail interface until mitigation advice is released.
2. Data Security: Substack Discloses Breach
Sector: SaaS, Media, Tech Threat Level: High
In a blow to the content platform economy, Substack has disclosed a significant data breach. The company's CEO confirmed the incident late last week, stating, "This sucks. I'm sorry." While specific details on the volume of Australian accounts affected are still surfacing, the breach highlights the persistent risk facing SaaS providers who aggregate massive amounts of user data.
- Risk: Exposure of subscriber emails, payment details (potentially), and private reading lists, which could be weaponised for targeted phishing campaigns.
- Action: Users are advised to change passwords and be vigilant against unsolicited emails mimicking Substack support.
3. Healthcare Update: Epworth HealthCare Investigation Concluded
Sector: Healthcare Threat Level: Moderate (De-escalated)
Following a ransomware scare that emerged earlier this month, Epworth HealthCare has completed its forensic investigation. The organisation announced it found no evidence that patient data was accessed or exfiltrated, despite claims made by hackers alleging the theft of 920GB of data.
- Analysis: This incident underscores the prevalence of "phantom claims" by ransomware groups attempting to extort victims without actual proof of compromise. However, the healthcare sector remains a prime target, and vigilance cannot be relaxed.
4. Retail & IoT: Bunnings Facial Recognition Ruling
Sector: eCommerce, Retail, IoT Threat Level: Regulatory/Compliance
A landmark ruling regarding Bunnings' use of facial recognition technology has sent shockwaves through the retail and IoT sectors. The Privacy Commissioner’s decision highlights the legal risks associated with deploying biometric surveillance IoT devices in consumer environments.
- Takeaway: Australian retailers and organisations using smart surveillance must review their data collection policies. The "collect first, ask later" approach is no longer viable under current privacy frameworks.
5. Emerging Trends: AI-Driven Cyber Threats
Sector: All (Focus on FinTech & EdTech)
Gartner’s latest "Top 2026 Cyber Security Trends" and recent alerts from the Australian Cyber Security Centre (ACSC) highlight a surge in AI-augmented attacks. Threat actors are now using Generative AI to craft hyper-realistic phishing emails and automate vulnerability scanning against APIs.
- Observation: We are seeing a rise in "Deepfake" social engineering attacks targeting legal and finance teams in Australian firms, aiming to authorise fraudulent fund transfers.
Key Vulnerabilities to Patch (Last 7 Days)
- SmarterMail: Zero-day (Immediate mitigation required).
- n8n Workflow Automation: CVE-2026-21858 (Critical RCE) – Ensure your automation workflows are behind a firewall or patched to the latest version.
- Ivanti Connect Secure: Ensure all January/February patches are applied as exploitation attempts persist.
Contact us for a quote for penetration testing service or adversary simulation.

