October Cyber News Wrap-Up
October was a high-tempo month for Australian cyber news: big-brand breaches, government policy moves, and fresh research on how attacks actually succeed. Our goal with this wrap-up is to give busy leaders a crisp, sourced brief you can share with execs and boards on what happened, why it matters, and the takeaways for the month ahead.
The headline story was Qantas. After the July incident, the airline confirmed in mid-October that customer data stolen via a third-party platform was released online by cybercriminals, prompting additional monitoring and support measures. Days later, Qantas’ Chief Customer & Digital Officer, Catriona Larritt, announced her departure in an internal memo, with cyber oversight moving under the risk function as part of a broader reshuffle. The impacted data reportedly included contact details and frequent flyer numbers; investigations are continuing alongside Australian authorities.
Threats
Toxic combinations drive 70% of major breaches. Panaseer’s latest analysis argues most material incidents aren’t caused by a single control failure, but by overlapping risks, think unpatched assets plus over-privileged identities plus internet exposure forming “toxic combinations”. For leaders, the implication is to invest in control assurance and risk correlation, not just more tools.
Australia to sign a United Nations (UN) cybercrime treaty in Hanoi. Australia joined 60 countries in signing a UN convention aimed at coordinating cross-border cybercrime response. Supporters see better evidence-sharing; critics warn of potential surveillance overreach without tight safeguards. Track implementation details and carve-outs for privacy and civil society.
Vulnerabilities
Exploit ecosystem case study: L3Harris Australian exec. The U.S. Department of Justice (DoJ) said an Australian former division chief at L3Harris pleaded guilty to stealing and selling cyber-exploit components to a Russian broker. Beyond the headline, the matter highlights insider-risk controls and export-controlled tooling governance, especially for Five Eyes suppliers.
Resilience gap spotlighted by AWS (Amazon Web Services) outage. An AWS US-EAST-1 disruption cascaded across popular services, reinforcing that concentration risk and single-region architectures remain business-continuity weaknesses. Prioritise multi-region patterns, tested failover, and DNS resilience.
Tech News
ACCC (Australian Competition and Consumer Commission) sues Microsoft over Microsoft 365 (M365) fees tied to Copilot. The watchdog alleges 2.7 million Australians were misled about subscription options when the Copilot add-on rolled out. For enterprises, watch for potential changes in disclosures and packaging of AI features—and review procurement communications for clarity.
Cloud operations aftershocks. Analyses of the October AWS outage emphasise dependency mapping and regulatory scrutiny (e.g., DORA in the EU) for critical third-party providers, signalling that tech-risk oversight of hyperscalers is tightening globally.
October Analysis & Lessons Learned
October’s main issue was compound risk: breaches triggered by third-party platforms, leaks from misconfigured cloud backups, and the systemic blast radius of a hyperscale outage.
Three takeaways that stand out:
1. Assume extortion is a marathon, not a sprint. Even when a breach is “contained,” data can surface months later. Maintain long-tail protections (targeted phishing controls, identity monitoring, and proactive customer comms).
2. Treat configuration as code and back up your backups securely. Lock down storage by default, enforce encryption, use automated policies (SCPs, guardrails), and scan for exposed objects and secrets continuously.
3. Engineer out single points of failure. Map critical dependencies, adopt multi-AZ/region architectures, rehearse failover, and include DNS in resilience testing. Regulators and boards are now explicitly asking for this.
More from this months newsletter >
Advanced Phishing Emails: Real-World Example and How to Stay Protected
Advanced Phishing Emails: Real-World Example and How to Stay Protected Phishing continues to be one […]
Spotlight Feature Devo: Real-Time Security Analytics
Spotlight Feature Devo: Real-Time Security Analytics Security leaders are facing mounting pressure with limited resources […]
Top 3 Cyber Events in Australia – February 2026
Top 3 Cyber Incidents in Australia – February 2026 February delivered another stark reminder that […]
Cyber News Wrap-Up January: Key Cyber Security Stories
CYBER NEWS WRAP-UP: JANUARY 2026 Welcome everyone to the first cyber recap of the year! […]


