As a senior penetration tester actively analysing adversary behaviour and responding to frontline incidents, I am tracking a highly volatile threat landscape across Australia today, 27 March 2026. The window between vulnerability disclosure and active exploitation has effectively collapsed. Over the last 24 hours, threat actors have aggressively weaponised artificial intelligence, exploited cloud misconfigurations, and capitalised on critical zero-day vulnerabilities to bypass traditional perimeter defences.
Here is your daily threat briefing detailing the current exploits, active threat actors, and critical vulnerabilities impacting Australian organisations across key sectors.
Healthcare The Australian healthcare sector remains under intense siege from double-extortion ransomware. Following a recent joint advisory by the Australian Cyber Security Centre (ACSC) and Five Eyes partners regarding the INC Ransom group's targeting of healthcare networks, the DragonForce ransomware cartel has now claimed a successful breach of Health Management Systems, an Australian healthcare software provider. This supply chain attack threatens to disrupt patient services and expose sensitive medical records across clinics nationwide. Concurrently, the SafePay ransomware gang has compromised Smile Team Orthodontics, publishing staff details and patient payment plans to the dark web.
SaaS Providers & Government Supply chain vulnerabilities and cloud misconfigurations are at the forefront today. A threat actor tracked as 'FulcrumSec' breached the AWS environment of SaaS provider LexisNexis by exploiting an unpatched web application vulnerability. This critical breach has exposed highly sensitive data belonging to Australian law firms and federal government agencies. At the state level, an audit of the WA Government exposed severe Microsoft 365 cloud misconfigurations—specifically a lack of robust Data Loss Prevention (DLP) controls—which directly facilitated Business Email Compromise (BEC) and the theft of $71,000. Furthermore, the ACSC is actively warning of a critical unauthenticated Remote Code Execution (RCE) vulnerability (CVE-2026-21858) being exploited in the n8n workflow automation platform,.
FinTech & eCommerce The regulatory and threat environments for financial services and eCommerce are intensifying. In a landmark ruling, the Federal Court imposed a $2.5 million penalty on FIIG Securities for cybersecurity governance failures. This serves as a clear warning from ASIC that poor cyber resilience and inadequate network defences will be heavily penalised. In the eCommerce sector, threat actors have leaked data stolen from major Australian processor Hazeldenes, highlighting the fragility of retail supply chains and interconnected web APIs.
Education/EdTech & AI Systems As institutions such as Adelaide University expand their AI research partnerships, the Education and EdTech sectors are facing novel risks from poorly integrated AI models. Security incidents involving 'OpenClaw', a popular open-source AI agent, have prompted urgent policy reviews across institutions this month. Threat actors are manipulating AI APIs and leveraging AI-powered voice cloning deepfakes to bypass traditional authentication for payment fraud against Australian organisations.
IoT & Critical Infrastructure With Australia's new Cyber Security (Security Standards for Smart Device) Rules 2025 taking effect in March 2026, the legislative focus on IoT security is increasing. However, legacy and enterprise IoT devices remain prime targets. The ACSC has issued critical alerts for the active exploitation of Cisco SD-WAN appliances (CVE-2026-20127) and WatchGuard Firebox devices (CVE-2025-14733). These flaws allow attackers to gain administrative privileges and establish persistent access across distributed IoT networks and operational technology (OT) environments.
Summary Today's threat intelligence reinforces the necessity of proactive, continuous security validation. Relying on compliance alone is no longer sufficient; Australian organisations must actively pressure-test their web applications, APIs, cloud environments, and emerging AI integrations to stay ahead of sophisticated threat actors.
Contact us for a quote for penetration testing service or adversary simulation.

