Weekly Cybersecurity Digest [October, Week 4]

Posted on October 28, 2025

Dear Valued Clients,

Welcome to this week’s cybersecurity digest from Make Sense, your trusted partner in building measurable resilience across Europe’s interconnected digital and critical-infrastructure landscape. The closing week of October underscored how energy, telecom, and aviation systems now share a common exposure: supply-chain weakness amplified by evolving ransomware and hybrid threat actors.

From airport data breaches and 5G reforms to power-grid intrusions, Europe’s cyber defence narrative is shifting – from individual protection to systemic resilience and shared accountability.

✅ Top Stories of the Week

i. Dublin Airport supplier breach exposes passenger data of millions 

Dublin Airport operator daa confirmed a data breach at third-party supplier Collins Aerospace, potentially exposing boarding and itinerary details of passengers who travelled in August, possibly affecting millions. The Irish Data Protection Commission has been notified, with early findings pointing to weaknesses in vendor oversight and data segregation. The incident renewed focus on aviation supply-chain risk and the need for greater transparency across third-party ecosystems. [Read more via The Irish Times]

Consider: How frequently do you reassess vendor data-handling practices — and do your contracts include breach response transparency clauses?

ii. France, the Czech Republic and Poland tighten 5G security regimes

On 23 October, three European nations unveiled updated 5G security frameworks to address hybrid threats. France extended Huawei removal deadlines but maintained vendor restrictions; the Czech Republic classified mobile networks as strategic assets under its NIS2 transposition; and Poland advanced its vendor-risk amendments. The coordinated approach signals a growing European commitment to telecom sovereignty and supply-chain integrity amid geopolitical pressure. [Read more via Cullen International]

Reflect: How resilient are your own critical communications dependencies to sudden regulatory or vendor-origin shifts in Europe’s telecom ecosystem?

iii. Sweden’s power-grid operator confirms data breach claimed by ransomware gang

On 27 October 2025, Sweden’s state-owned power-grid operator Svenska kraftnät disclosed a breach of an external file-transfer solution, following claims by the Everest ransomware group that it had exfiltrated roughly 280 GB of internal data. While electricity transmission remained unaffected, investigators confirmed that mission-critical systems were untouched, and the incident is being handled with national cyber-authorities. The event highlights the growing convergence of ransomware and critical infrastructure risk. [Read more via The Record]

Action prompt: When was your last critical infrastructure dependency audit, and does it include data-transfer platforms outside your core operational networks?

✅ Industry Trends & Insights

European Cyber Agora spotlights AI-driven cyber risk and resilience

At the European Cyber Agora conference (22–23 October, Brussels), public and private leaders warned that generative AI is rapidly widening the threat surface – from phishing automation to synthetic identity fraud. Delegates emphasised scaling resilience funding, public–private exercises, and continuous simulation to test real-world readiness. The event reinforced that AI assurance and information sharing are now strategic imperatives, not just research goals. [Read more via European Cyber Agora]

Reflect: Where could AI-powered detection or simulation improve your incident readiness in the next six months?

The EU signs the United Nations Convention against Cybercrime 

On 27 October, the European Commission signed the new UN Convention against Cybercrime on behalf of the EU, marking a significant step in international legal cooperation to combat online fraud, child exploitation, and ransomware. The treaty aims to streamline evidence-sharing and mutual assistance between the EU and its global partners, signalling a new phase of transnational cyber law enforcement. [Read more via European Commission]

Consider: Does your organisation’s compliance or investigations process rely on jurisdictions with limited cybercrime cooperation? If so, how are you mitigating cross-border evidence challenges?

✅ Regulatory & Policy Updates

EU updates Cybersecurity Work Programme for “Digital Europe” 2025-27

On 22 October, the European Cybersecurity Competence Centre (ECCC) approved amendments to the Digital Europe Cybersecurity Work Programme 2025–27. €35 million was reallocated toward AI-Gigafactory security and Regional Cable Hub resilience, part of the EU Action Plan on Cable Security. The revisions aim to strengthen critical infrastructure protection and align EU funding priorities with emerging AI and connectivity threats. [Read more via ECCC]

Reflect: Which of your AI or connectivity projects would fall under Europe’s next wave of cyber funding or oversight priorities?

EU states urge accelerated implementation of cybersecurity laws

At a 23 October summit, EU officials warned that several member states remain behind on NIS2 transposition and enforcement, undermining collective resilience. Regulators called for rapid alignment of reporting protocols and supervisory standards to avoid fragmented security postures. The message was unequivocal: EU cyber policy must move from drafting to delivery. [Read more via Mlex]

Consider: How well aligned are your internal reporting and incident disclosure processes with upcoming NIS2 and DORA enforcement deadlines?

✅ Cyber IQ Challenge + Proactive Security Hacks

Quick Quiz:
Which approach most effectively enhances Europe’s resilience against ransomware and critical-infrastructure attacks?

A) Focus only on post-incident recovery
B) Continuous third-party validation and secure file-transfer oversight
C) Segregating IT and OT without shared threat visibility
D) Relying solely on national incident coordination

(Answer below)

Smart Security Moves of the Week:

  • Third-party assurance: Audit external data-transfer and managed-service platforms for encryption, logging, and breach detection controls.

  • Critical systems rehearsal: Conduct a tabletop simulation of ransomware impact on operational technology (OT) environments.

  • AI risk forecasting: Integrate threat-modelling tools to anticipate AI-driven attack paths across digital infrastructure.

  • Telecom & grid continuity: Cross-map dependencies between energy, transport, and communications suppliers for shared risk exposure.

Answer: B) Continuous third-party validation and secure file-transfer oversight.

✅ Conclusion

From aviation data exposure and 5G vendor reforms to ransomware intrusions in energy networks, this week demonstrated that Europe’s cyber frontier is fully interconnected – where one breach can ripple across sectors. The balance between digital innovation and operational safety now hinges on coordinated assurance, transparent partnerships, and real-time validation.

Final reflection: If a ransomware actor breached your non-critical network today, how confident are you that containment and communication would prevent impact on your operational core?

At Make Sense, we translate intelligence into measurable defence – uniting supply-chain assurance, data governance, and cross-sector resilience to secure Europe’s evolving critical infrastructure.

 

Stay secure,
The Make Sense SRL Team & CyberTania