The Australian threat landscape reflects the same global shifts highlighted in PwC’s Annual Threat Dynamics 2026 report, but with a local profile shaped by ransomware pressure, identity-driven intrusion, regulatory change, and targeting of sectors critical to the Australian economy.
The most effective response is not just stronger prevention, but faster detection, clearer governance, and better resilience across identity, cloud, data, and third-party risk. The report frames today’s environment as identity-driven, AI-accelerated and inseparable from wider business and geopolitical risk.
"In Australia, the cyber threat landscape is evolving at an unprecedented pace. Lines are blurring and the rules of engagement have changed. Australian organisations that treat cyber resilience as a boardroom priority, not just a technical one, will be the ones that stay ahead"
Identity will remain in pole position as the primary attack vector. As organisations adopt zero-trust architectures, adversaries will iterate with techniques to spoof device posture, abuse non-human identities (NHIs), and target AI-driven automated workflows. Treating identity governance as a strategic, board-level priority — not a technical checkbox — will be critical to staying ahead of the field.
AI-driven threats may outpace traditional detection and response models, and quantum advancements will change the track entirely. Organisations should anticipate malware that natively incorporates AI to evade detection and target high-value data, alongside a widening pool of less skilled threat actors leveraging AI to punch above their weight. This concern is reflected in Australia, where according to the PwC Digital Trust Insights (DTI) 2026, 50% of Australian organisations rank AI-powered malware as the key AI attack scenario they are most concerned about over the next year. Investing in AI-enhanced defence, embedding frameworks into threat modelling, and becoming post-quantum ready will be essential to keeping pace.
No cyber intrusion exists in a vacuum. Trade disputes, elections, conflicts, and shifting alliances will continue to shape threat actor targeting and tempo. This is increasingly reflected in business decision-making in Australia, where 62% of Australian business and tech leaders ranked cyber risk investment in their top three strategic priorities in response to ongoing geopolitical uncertainty, and 74% of Australian organisations predict an increase in their cyber budget for 2026 in the PwC DTI survey. Organisations that embed geopolitical and supply chain risk into strategic decision-making; aligning cyber, legal, HR, finance, and communications capabilities — will be positioned to navigate the turbulence ahead.
Australia remains part of the broader global rise in ransomware activity, but with a local pattern shaped by sector concentration, growing threat actor diversity, and a response environment increasingly influenced by regulation. We have observed Australia was the 9th most targeted country by ransomware, by victim count.
Australia’s ransomware cyber response environment has materially changed from encouragement to obligation as of 30 May 2025. The Cyber Security Act 2024 and the Cyber Security (Ransomware Payment Reporting) Rules 2025 now require organisations with annual turnover of at least AUD 3 million in the previous financial year, or with select critical infrastructure assets, to notify the Commonwealth within 72 hours if they make, or become aware that another party has made a ransomware or a cyber extortion payment on their behalf.
This is a notable uplift in Australia’s ransomware posture because it creates a specific, mandatory reporting regime tied to ransom payments, rather than relying only on broader cyber incident or sector-specific notification obligations. The immediate takeaway for applicable organisations is that ransomware response plans should now expressly cover payment decision-making, 72-hour reporting triggers, evidence capture, and coordination across legal, cyber, crisis management and any third parties acting on the organisation's behalf.
Australia is currently the first in the Five Eyes nations (intelligence-sharing alliance consisting of Australia, Canada, New Zealand, the United Kingdom, and the United States) with an active mandatory reporting regime specifically for ransomware and cyber extortion payments.
United Kingdom - has been consulting on proposed ransomware payment and incident reporting laws however is yet to formalise.
United States - Critical Incident Reporting for Critical Infrastructure Act (CIRCIA) includes ransomware obligations however only applies to the critical infrastructure entities.
Canada and New Zealand - Currently encourage reporting of ransomware incidents and payments rather than imposing a mandatory reporting requirement.
The challenge is no longer only to prevent compromise. It is to reduce the blast radius, contain access abuse, and respond quickly when incidents cross technical, legal, and executive boundaries.
In Australia, cyber resilience is no longer solely a technical challenge, it has become a critical governance priority. Cyber risk now spans far beyond traditional IT and security teams, touching on all aspects of an organisation including identity management, third-party access, regulatory reporting, sector-specific vulnerabilities, legal considerations, and executive accountability. A failure or weakness in any one of these areas can rapidly cascade into operational disruptions, mandatory breach notifications, regulatory investigations, and reputational damage.
This evolving landscape is especially relevant for organisations experiencing growth, embracing new technologies, and operating across diverse business units, vendors, and cloud environments. Security protocols that once sufficed in smaller or centralised organisations can become fragmented with this growth, leading to blind spots and unclear ownership. Threat actors will be able to exploit these gaps as they do not target organisations based on their internal organisational chart and will attack weak connections between teams, inconsistent controls, and slow response processes.
The organisations that succeed in managing cyber risk holistically are those that maintain clear visibility of threats end to end regardless of teams and act decisively on access control and containment when an incident occurs. Achieving this requires streamlining fragmented processes, defining clear accountability at every level, and enabling early, informed decision-making before a cyber incident escalates into a costly regulatory, commercial, or reputational crisis.
Peter Malan
Partner, Cybersecurity & Privacy Practice Leader, PwC Australia
Robert Di Pietro
Partner, Cybersecurity & Privacy, PwC Australia
Jason Smart
Director, Global Threat Intelligence Lead, PwC Australia