Philip Roberts | 11 February 2026
Fortian is pleased to present its annual Security Operations Centre report, outlining the most material cyber threat trends affecting Australian organisations throughout 2025. This report draws on incidents detected, investigated, and mitigated by Fortian’s SOC over the past year.
The findings reflect real-world attacker behaviour observed across our customer base, rather than theoretical or headline-driven threats. They are set within the context of broader shifts in enterprise technology, including widespread cloud migration, accelerating SaaS adoption, the move toward identity-centric security models, and the increasing operational use of AI across business environments.
Most importantly, the report identifies practical defensive measures that Australian organisations can implement to reduce exposure, strengthen detection, and better align security controls with the realities of modern enterprise architecture.
This article provides a summary of the key observations and themes from the full report. The complete report includes deeper technical analysis, additional case examples, and more detailed defensive guidance, and is available on request directly from Fortian, via the link at the bottom of the page.

Across all campaigns observed in 2025, Fortian identified a clear departure from traditional perimeter-focused intrusion toward attacks that exploit identity, SaaS platforms, browsers, and other technologies that now sit at the core of modern business operations. As organisations continued to dissolve the network perimeter through Zero Trust architectures and distributed cloud services, threat actors adjusted accordingly, shifting their focus to the identity plane and to platforms that aggregate access to high-value data but are often inconsistently governed.
Across 2025, Fortian observed four dominant and interconnected threat trends:
Infostealer malware emerged as the dominant enabler of modern attack chains, reflecting a broader move toward scalable, low-friction identity compromise rather than destructive outcomes.
These campaigns prioritised the theft of credentials and session tokens, enabling delayed compromise, resale of access, and follow-on attacks months after initial infection.
Infection vectors shifted away from email-based phishing toward instruction-driven execution techniques such as ClickFix, SEO poisoning, and malicious content hosted on trusted platforms.
This mirrors a wider trend in which attackers exploit user trust in browsers, cloud services, and developer platforms, rather than attempting to bypass hardened operating systems or email gateways.
Fortian also observed a marked increase in data theft via Software as a Service platforms, particularly where these platforms operate outside centralised identity governance and security monitoring.
Salesforce emerged as a primary target in 2025, with threat actors leveraging helpdesk vishing and OAuth consent abuse to achieve rapid, tenant-level access and high-volume data exfiltration.
These campaigns did not rely on software vulnerabilities, but instead exploited organisational process gaps, fragmented identity models, and the absence of consistent entitlement management across SaaS environments.
The speed and scale of these compromises highlight how cloud platforms can compress attack timelines when governance and detection controls lag behind adoption.
Defence evasion was a defining feature of threat activity in 2025.
Threat actors across all levels of sophistication adopted residential IP proxy networks and abused legitimate cloud and line-of-business platforms for phishing, malware delivery, and command-and-control.
These techniques allowed malicious activity to blend into normal consumer and enterprise traffic, significantly reducing the effectiveness of IP reputation, geofencing, and static indicators.
Fortian’s observations reinforce a broader industry shift away from network-centric controls toward behavioural, identity-aware detection strategies that operate across users, devices, and applications.
A further evolution observed in 2025 was the emergence of Living-off-the-Browser attacks, where malicious browser and IDE extensions abuse native application functionality to perform credential theft and data exfiltration without deploying traditional malware.
This reflects a structural blind spot in many organisations, where endpoints are heavily hardened but the browser remains largely ungoverned despite functioning as the primary interface to SaaS, identity providers, financial services, and AI tools.
As browsers increasingly act as the execution environment for sensitive workflows, they have become a high-value target for threat actors seeking to avoid operating system-level detection entirely.
While no single campaign observed by Fortian relied exclusively on AI, its influence was evident across multiple threat classes.
AI lowered barriers for threat actors by enabling more convincing phishing and vishing lures, accelerating malware development, and increasing the operational velocity of campaigns.
At the same time, enterprise adoption of AI and emerging agentic systems expanded the attack surface, introducing new identity types, new trust relationships, and new governance challenges that are not yet well addressed by existing security models.
The findings in this report point to two enduring strategic defensive imperatives for organisations entering 2026.
Taken together, these findings underscore the need for organisations to realign security strategy with the realities of modern enterprise architecture, prioritising identity, governance, and behavioural detection to remain resilient against evolving threats.
As stated previously, this article provides a summary of the key observations and themes from the full report. The complete report includes deeper technical analysis, additional case examples, and more detailed defensive guidance, and is available on request directly from Fortian via the link below.
Request a consultation with one of our security specialists today or sign up to receive our monthly newsletter via email.
Get in touch Sign up!