Engagements that produced findings
18 of 18, no clean sheets
Hacker mindset. AI to OT. Human-led.
Cyber Node runs three types of engagement. Fixed-price manual pen testing for FinTech, engineer-led OT assessments for industrial operators, and an A$399 Cyber Exposure Snapshot for SMBs who need a fast external scan. Every engagement is human-led. No scanner-only reports.
Three years on the frontline
Across 18 manual penetration testing engagements spanning 15 sectors, from neobanks and AI FinTechs to state utilities, government facilities, medical devices, and EdTech, every single engagement produced findings. These are the numbers.
Engagements that produced findings
18 of 18, no clean sheets
Had Critical or High-risk findings
7 of 18 carried serious exposure
Distinct vulnerabilities logged
8.8 average findings per engagement
Where we work
Trusted by Australian organisations
Three ways we work with you
We don’t sell a single engagement template. Pick the shape that fits your business and your compliance drivers.
For FinTech & financial services
Manual penetration testing of web apps, APIs, and cloud infrastructure. Scoped to APRA CPS 234, PCI DSS, SOC 2, and ISO 27001. Reports your QSA and auditor will accept. Fixed-price engagements from AUD $12k. Cyber Node is a FinTech Australia member.
Scope an engagement →For Industrial & critical infrastructure
SCADA, DCS, and historian assessments for resources, energy, and critical infrastructure. Led by an engineer who has worked Shell Prelude FLNG, LNG, and nuclear projects. Passive assessment and test-bench options for production plants. On-site for WA, the Pilbara, and regional Queensland.
Talk to an engineer →For Small & mid-sized business
One-shot automated external scan of your public attack surface. Open ports, expired certs, forgotten admin panels, exposed services. Fast, simple, self-serve. A$399 per scan. Typical turnaround under 24 hours. See what an attacker sees before they see it.
Scan your domain →Fourth path · for partners
Resell CES to your clients under your own brand. Three tiers. White-label reports. Australian-hosted.
Cyber Exposure Snapshot · April 2026 research
Cyber Node scanned 351 Australian SMB domains non-intrusively. 274 came back HIGH or CRITICAL. 99% had at least one high-severity exposure. The scan surfaced 1,787 actionable findings in total.
Nothing was touched. No credentials used. No internal systems accessed. Just the drive-by view an attacker already has — and a list your MSP can close in days.
How we work
Every engagement follows the same methodology. You know what to expect at every stage, and so do your auditors.
Short call to understand your environment, compliance drivers, and what you actually need tested. Fixed-price proposal within 48 hours.
Manual testing by a named human. Scanners for coverage, not conclusions. Chained findings, business logic flaws, real exploitation attempts.
Findings rated by real-world impact, not CVSS alone. Executive summary for the board. Technical detail for the engineer fixing it.
Free retest on all findings within 60 days to confirm remediation worked. No charge if the fix lands the first time.
Led by
Chemical and process engineer turned cybersecurity specialist. Prior work includes Shell Prelude FLNG, LNG facilities, and nuclear engineering projects. Holds a Masters in Chemical Engineering, EMBA, PMP, and AWS Certified Security Specialist. Registered member of Engineers Australia.
Read Matt’s story →Case study
A mid-market Australian SaaS product had been tested twice by other firms. Both prior reports were scanner output with a cover page. We found a tenant isolation bypass through two chained low-severity findings neither prior test had flagged. Remediated within 72 hours.Australian SaaS platform · manual penetration testing engagement. Read the full case study →