Engagements that produced findings
54 of 54, no clean sheets
Manual penetration testing. Australia.
Cyber Node tests the systems your business runs on, from web apps and APIs to cloud estates, AI agents, and OT plants. Every engagement is delivered by a senior practitioner. No offshore delivery, no scanner output dressed up as a pen test.
Pick your path
Three doors. The same operator scopes every engagement. Pick the one that matches your reason for being here.
Path 1
Engineer-led OT and ICS testing for resources, energy, water, and SOCI-covered operators. IEC 62443 and AESCSF scoped.
Talk to an engineer →Path 2
Manual penetration testing and vCISO support scoped to APRA CPS 234, ISO 27001, SOC 2, PCI DSS, and Essential Eight. Reports your auditor will accept.
Scope an engagement →Path 3
Manual testing for LLM apps, RAG pipelines, and agentic systems. Prompt injection, tool-use abuse, RAG leakage, model supply chain.
Scope an AI review →
Led by
Chemical and process engineer turned cybersecurity specialist. Prior work includes Shell Prelude FLNG (Western Australia), Albemarle Kemerton lithium hydroxide refinery, AREVA nuclear projects, and Kazakhstan ISL uranium operations. Holds a Masters in Chemical Engineering, EMBA, PMP, and AWS Certified Security Specialist. Registered member of Engineers Australia. The same operator scopes every engagement, regardless of which path you took to get here.
Read Matt’s story →Three years on the frontline
Across 54 manual penetration testing engagements spanning 15 sectors, from neobanks and AI FinTechs to state utilities, government facilities, medical devices, and EdTech, every single engagement produced findings. These are the numbers.
Engagements that produced findings
54 of 54, no clean sheets
Had Critical or High-risk findings
21 of 54 carried serious exposure
Distinct vulnerabilities logged
8.8 average findings per engagement
Where we work
Trusted by Australian organisations
Engagements with state utilities, financial services, government facilities, EdTech platforms, and industrial operators across Australia. Confidentiality is the default. Named-client references available on request.
Cyber Exposure Snapshot · April 2026 research
Cyber Node scanned 351 Australian SMB domains non-intrusively. 274 came back HIGH or CRITICAL. 99% had at least one high-severity exposure. The scan surfaced 1,787 actionable findings in total.
Nothing was touched. No credentials used. No internal systems accessed. Just the drive-by view an attacker already has, with a list your MSP can close in days.
How we work
Every engagement follows the same methodology. You know what to expect at every stage, and so do your auditors.
Short call to understand your environment, compliance drivers, and what you actually need tested. Fixed-price proposal within 48 hours.
Manual testing by a named human. Scanners for coverage, not conclusions. Chained findings, business logic flaws, real exploitation attempts.
Findings rated by real-world impact, not CVSS alone. Executive summary for the board. Technical detail for the engineer fixing it.
Free retest on all findings within 60 days to confirm remediation worked. No charge if the fix lands the first time.
Case study
A mid-market Australian SaaS product had been tested twice by other firms. Both prior reports were scanner output with a cover page. We found a tenant isolation bypass through two chained low-severity findings neither prior test had flagged. Remediated within 72 hours.Australian SaaS platform · manual penetration testing engagement. Read the full case study →