Skip to content
Tiatra, LLCTiatra, LLC
Tiatra, LLC
Information Technology Solutions for Washington, DC Government Agencies
  • Home
  • About Us
  • Services
    • IT Engineering and Support
    • Software Development
    • Information Assurance and Testing
    • Project and Program Management
  • Clients & Partners
  • Careers
  • News
  • Contact
 
  • Home
  • About Us
  • Services
    • IT Engineering and Support
    • Software Development
    • Information Assurance and Testing
    • Project and Program Management
  • Clients & Partners
  • Careers
  • News
  • Contact

Seven inevitable cyber threats every Australian organisation must be ready to contain

Australian organisations are investing heavily in cyber security, yet most breaches still exploit simple, preventable weaknesses. The 2025 Nexon Cyber Security Report, based on penetration testing of 126 organisations across 30+ industries, reveals seven recurring vulnerabilities that attackers exploit, and explains how to fix them.

From poor password hygiene to misconfigured cloud systems, every single organisation we tested had at least one vulnerability that could have been prevented with stronger foundations.

Simple mistakes leave the door ajar

Most cyber breaches don’t come from advanced hacking techniques or nation-state actors. Nexon’s penetration testing this year showed that attackers succeed by exploiting basic, preventable gaps that appear across every layer of the environment.

The pattern was consistent: weak credential hygiene, missing multi-factor authentication (MFA), insecure web applications, human error, perimeter gaps, flat internal networks and cloud misconfigurations.

Below are the seven common threats we found. For the complete findings, including detailed statistics, staged implementation roadmaps and specific remediation guidance for addressing each vulnerability, download the complimentary 2025 Cyber Security Report.

1. Weak passwords remain the easiest way in

Predictable and reused credentials facilitated unauthorised access more often than any advanced hacking technique in our 126 penetration tests. We found ‘Password123’ and other predictable patterns, seasonal combinations like ‘Winter2025!’, passwords based on company names and default or hardcoded service account credentials are still in widespread use.

  • 59% of passwords were only 8–10 characters long
  • 1 in 4 organisations reused passwords across accounts
  • 10% still enforced weak or outdated password policies

2. Multi-factor authentication gaps expose accounts

Even with strong passwords in place, attackers often found authentication endpoints lacking enforced MFA or with bypassable challenge flows. We found that nearly 1 in 10 web apps lacked MFA enforcement, that cloud admin accounts were exempt from MFA and that privileged accounts – including executives and automated service accounts – were commonly exempt from MFA.

  • MFA was missing or misconfigured in 9% of web applications, 5% of perimeter services and 3% of cloud admin accounts

3. Web application housekeeping flaws create real risks

Every day mistakes, not complex attacks, are the biggest cause of web and API weaknesses. Attackers often piece together minor issues, such as misconfigured parameters or outdated dependencies, to find ways to break in.

  • 63% of web applications had at least one security misconfiguration
  • 64% of APIs lacked critical controls

4. People remain the most exploitable entry point

Phishing and social engineering were the most reliable methods for cyber attackers to obtain initial access in simulations. Once attackers got in through people, insufficient internal access controls and network segmentation made escalation easy. Many of these attacks went undetected until our team reported them.

  • 83% of phishing attempts in simulated attacks gained credentials
  • 72% of engagements escalated to the domain admin within days
  • 60% of simulated attacks went undetected by monitoring teams

5. External perimeters still have openings

Fewer direct perimeter break-ins occurred this year than in previous years, but simple methods, such as weak passwords and missing two-factor logins, still let attackers in. In many cases, just one overlooked system was enough to give attackers access.

  • 5% of external-facing services had no two-factor login
  • 8% of organisations had weak or outdated encryption

6. Flat internal networks give attackers the keys

Once attackers got inside, they often found wide-open networks. Weak protocols, exposed data sharing and poor system separation made it easy to move around and gain complete control.

  • 72% of engagements reached domain admin control – giving attackers the keys to everything

7. Cloud misconfigurations create big risks from small gaps

Most cloud breaches stemmed from insecure default configurations, not advanced attacks. Excessive permissions, poor login controls and dangerous defaults left sensitive data and accounts exposed in many environments.

  • 6% of cloud setups left unsafe default settings in place
  • 4% used outdated or weak login methods

A structured approach to addressing these gaps

Addressing these foundational gaps removes the majority of exploitable weaknesses. There’s no point investing in advanced security tools if attackers can still walk in through weak passwords or missing MFA.

Nexon’s three-stage cyber security framework provides a structured approach: Get Protected by putting the right foundations in place, Stay Protected through continuous monitoring and incident response, and Don’t Get Caught Out by proactively testing and strengthening defences against evolving threats.

Leveraging Microsoft technologies, Nexon delivers a strategic, end-to-end approach to cybersecurity, combining certified expertise, proven processes, and advanced solutions to strengthen digital resilience.

The complimentary 2025 Nexon Cyber Security Report provides detailed remediation roadmaps, implementation guides and specific actions to address each threat. Download your copy to see where your organisation may be exposed and how to close these gaps.

For more information about penetration testing, security assessments and addressing these common vulnerabilities, contact us at nexon.com.au/nexon-cyber.

srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/11/2025-Solution-Partner-edited.png?quality=50&strip=all 630w, https://b2b-contenthub.com/wp-content/uploads/2025/11/2025-Solution-Partner-edited.png?resize=300%2C200&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/11/2025-Solution-Partner-edited.png?resize=150%2C100&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2025/11/2025-Solution-Partner-edited.png?resize=252%2C168&quality=50&strip=all 252w, https://b2b-contenthub.com/wp-content/uploads/2025/11/2025-Solution-Partner-edited.png?resize=126%2C84&quality=50&strip=all 126w, https://b2b-contenthub.com/wp-content/uploads/2025/11/2025-Solution-Partner-edited.png?resize=540%2C360&quality=50&strip=all 540w, https://b2b-contenthub.com/wp-content/uploads/2025/11/2025-Solution-Partner-edited.png?resize=375%2C250&quality=50&strip=all 375w” width=”540″ height=”360″ sizes=”auto, (max-width: 540px) 100vw, 540px”>

Reference: 1. Nexon: 2025 Nexon Cyber Security Report


Read More from This Article: Seven inevitable cyber threats every Australian organisation must be ready to contain
Source: News

Category: NewsNovember 17, 2025
Tags: art

Post navigation

PreviousPrevious post:세일즈포스, 도티 인수···슬랙 AI 검색 강화한다NextNext post:“AI가 고용 지형 흔든다” 젊은층과 초급 직무부터 타격

Related posts

AI churn has IT rebuilding tech stacks every 90 days
December 9, 2025
Time for CIOs to ratify an IT constitution
December 9, 2025
How the BMC Helix spin-off has fared, one year later
December 9, 2025
La industria farmacéutica abraza la inteligencia artificial
December 9, 2025
공격적 보안, AI 시대 보안 전략의 핵심으로 부상
December 9, 2025
“실시간 데이터 기술 경쟁 분기점” IBM, 데이터·자동화 포트폴리오 확장 위해 컨플루언트 인수
December 9, 2025
Recent Posts
  • AI churn has IT rebuilding tech stacks every 90 days
  • Time for CIOs to ratify an IT constitution
  • How the BMC Helix spin-off has fared, one year later
  • La industria farmacéutica abraza la inteligencia artificial
  • 공격적 보안, AI 시대 보안 전략의 핵심으로 부상
Recent Comments
    Archives
    • December 2025
    • November 2025
    • October 2025
    • September 2025
    • August 2025
    • July 2025
    • June 2025
    • May 2025
    • April 2025
    • March 2025
    • February 2025
    • January 2025
    • December 2024
    • November 2024
    • October 2024
    • September 2024
    • August 2024
    • July 2024
    • June 2024
    • May 2024
    • April 2024
    • March 2024
    • February 2024
    • January 2024
    • December 2023
    • November 2023
    • October 2023
    • September 2023
    • August 2023
    • July 2023
    • June 2023
    • May 2023
    • April 2023
    • March 2023
    • February 2023
    • January 2023
    • December 2022
    • November 2022
    • October 2022
    • September 2022
    • August 2022
    • July 2022
    • June 2022
    • May 2022
    • April 2022
    • March 2022
    • February 2022
    • January 2022
    • December 2021
    • November 2021
    • October 2021
    • September 2021
    • August 2021
    • July 2021
    • June 2021
    • May 2021
    • April 2021
    • March 2021
    • February 2021
    • January 2021
    • December 2020
    • November 2020
    • October 2020
    • September 2020
    • August 2020
    • July 2020
    • June 2020
    • May 2020
    • April 2020
    • January 2020
    • December 2019
    • November 2019
    • October 2019
    • September 2019
    • August 2019
    • July 2019
    • June 2019
    • May 2019
    • April 2019
    • March 2019
    • February 2019
    • January 2019
    • December 2018
    • November 2018
    • October 2018
    • September 2018
    • August 2018
    • July 2018
    • June 2018
    • May 2018
    • April 2018
    • March 2018
    • February 2018
    • January 2018
    • December 2017
    • November 2017
    • October 2017
    • September 2017
    • August 2017
    • July 2017
    • June 2017
    • May 2017
    • April 2017
    • March 2017
    • February 2017
    • January 2017
    Categories
    • News
    Meta
    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org
    Tiatra LLC.

    Tiatra, LLC, based in the Washington, DC metropolitan area, proudly serves federal government agencies, organizations that work with the government and other commercial businesses and organizations. Tiatra specializes in a broad range of information technology (IT) development and management services incorporating solid engineering, attention to client needs, and meeting or exceeding any security parameters required. Our small yet innovative company is structured with a full complement of the necessary technical experts, working with hands-on management, to provide a high level of service and competitive pricing for your systems and engineering requirements.

    Find us on:

    FacebookTwitterLinkedin

    Submitclear

    Tiatra, LLC
    Copyright 2016. All rights reserved.