October Cyber News Wrap-Up

October was a high-tempo month for Australian cyber news: big-brand breaches, government policy moves, and fresh research on how attacks actually succeed. Our goal with this wrap-up is to give busy leaders a crisp, sourced brief you can share with execs and boards on what happened, why it matters, and the takeaways for the month ahead.

The headline story was Qantas. After the July incident, the airline confirmed in mid-October that customer data stolen via a third-party platform was released online by cybercriminals, prompting additional monitoring and support measures. Days later, Qantas’ Chief Customer & Digital Officer, Catriona Larritt, announced her departure in an internal memo, with cyber oversight moving under the risk function as part of a broader reshuffle. The impacted data reportedly included contact details and frequent flyer numbers; investigations are continuing alongside Australian authorities.

Daily News-Cyber Attack
ImageResizer.ashx?n=http%3a%2f%2fi.nextmedia.com.au%2fNews%2f20140619041753_threat400.jpg&h=420&w=748&c=0&s=0

Threats

Toxic combinations drive 70% of major breaches. Panaseer’s latest analysis argues most material incidents aren’t caused by a single control failure, but by overlapping risks, think unpatched assets plus over-privileged identities plus internet exposure forming “toxic combinations”. For leaders, the implication is to invest in control assurance and risk correlation, not just more tools.

Australia to sign a United Nations (UN) cybercrime treaty in Hanoi. Australia joined 60 countries in signing a UN convention aimed at coordinating cross-border cybercrime response. Supporters see better evidence-sharing; critics warn of potential surveillance overreach without tight safeguards. Track implementation details and carve-outs for privacy and civil society.

Vulnerabilities

Exploit ecosystem case study: L3Harris Australian exec. The U.S. Department of Justice (DoJ) said an Australian former division chief at L3Harris pleaded guilty to stealing and selling cyber-exploit components to a Russian broker. Beyond the headline, the matter highlights insider-risk controls and export-controlled tooling governance, especially for Five Eyes suppliers.

Resilience gap spotlighted by AWS (Amazon Web Services) outage. An AWS US-EAST-1 disruption cascaded across popular services, reinforcing that concentration risk and single-region architectures remain business-continuity weaknesses. Prioritise multi-region patterns, tested failover, and DNS resilience.

a-computer-system-hacked-warning.jpg?s=612x612&w=0&k=20&c=U45FHOm5rflXIRqmYByxlQANtdtycEdFZz2Vp5dgI8E=
3676938.jpg?1396395716

Tech News

ACCC (Australian Competition and Consumer Commission) sues Microsoft over Microsoft 365 (M365) fees tied to Copilot. The watchdog alleges 2.7 million Australians were misled about subscription options when the Copilot add-on rolled out. For enterprises, watch for potential changes in disclosures and packaging of AI features—and review procurement communications for clarity.

Cloud operations aftershocks. Analyses of the October AWS outage emphasise dependency mapping and regulatory scrutiny (e.g., DORA in the EU) for critical third-party providers, signalling that tech-risk oversight of hyperscalers is tightening globally.

October Analysis & Lessons Learned

October’s main issue was compound risk: breaches triggered by third-party platforms, leaks from misconfigured cloud backups, and the systemic blast radius of a hyperscale outage.

Three takeaways that stand out:

1. Assume extortion is a marathon, not a sprint. Even when a breach is “contained,” data can surface months later. Maintain long-tail protections (targeted phishing controls, identity monitoring, and proactive customer comms).

2. Treat configuration as code and back up your backups securely. Lock down storage by default, enforce encryption, use automated policies (SCPs, guardrails), and scan for exposed objects and secrets continuously.

3. Engineer out single points of failure. Map critical dependencies, adopt multi-AZ/region architectures, rehearse failover, and include DNS in resilience testing. Regulators and boards are now explicitly asking for this.

More from this months newsletter >

Continuous Vulnerability Scanning for Real Risk

30 October 2025

Scheduled Vs Continuous Vulnerability Scanning Why the old model is leaving gaps you cannot ignore […]

Read More

How to Maximise ROI from Your 2026 Cyber Security Budget

30 October 2025

Cybersecurity budgets are rising in 2026, but smart allocation is what drives real ROI. Here’s […]

Read More

Hackers Exploit Microsoft Teams Access Tokens to Steal Chats and Emails

30 October 2025

Hackers are exploiting Microsoft Teams access tokens to infiltrate chats, emails, and documents here’s what […]

Read More

7 Types of Cyber Security Audits Every Organisation Needs in 2026

30 October 2025

Every organisation needs a layered approach to Cyber Security audits, here are the essential types […]

Read More