Weekly Cybersecurity Digest [September, Week 3]

Posted on September 23, 2025

Dear Valued Clients,

Welcome to this week’s cybersecurity digest from Make Sense, your partner in strengthening resilience against evolving digital risks.

The past days have seen ransomware cripple aviation services, with check-in systems collapsing across multiple airports after a supplier breach, law enforcement coordinate cross-border prosecutions, and hospitals targeted by state-linked hackers. At the same time, fresh warnings spotlight vulnerabilities in supply chains and AI adoption, while new government initiatives seek to streamline cyber growth and governance.

Question for you: If your most critical vendor went offline for just one day, how long could your operations stay afloat?

Our goal is not only to inform but also to provide you with actionable strategies to stay compliant, resilient, and secure in an increasingly complex environment.


✅ Top Stories of the Week

i. Airport chaos highlights rise in high-profile ransomware attacks
A ransomware attack on Collins Aerospace paralysed automated check-in and baggage systems at multiple European airports, forcing staff into manual operations and leaving thousands of passengers stranded.

Think about it: Is your failover plan tested for business disruption visibility — not just ransom risk?

Investigators note that cybercriminals increasingly aim for visibility and disruption, not just ransom revenue. The aviation sector’s reliance on external technology vendors is being re-examined, with experts urging renewed focus on redundancy, rapid failover strategies, and third-party cybersecurity assessments. [Read more via Reuters]

ii. Russian hackers target Polish hospitals and city water supply
Poland confirmed a surge of Russian-linked cyberattacks targeting healthcare facilities and municipal water utilities, disrupting patient services and prompting emergency infrastructure reviews.

Mini-exercise: Which of your OT systems could cause patient or customer harm if compromised?

Officials warned that these strikes form part of a wider hybrid campaign designed to destabilise civic systems. In response, Warsaw pledged increased funding for cybersecurity defences and enhanced collaboration with NATO partners, highlighting the risks state-sponsored groups pose to public-sector resilience across Europe. [Read more via Firstpost]

iii. Flights across Europe delayed after cyberattack targets third-party vendor
A ransomware incident on a U.S. third-party provider supplying automated check-in systems cascaded into widespread delays across European airports, including Heathrow, Schiphol, and Frankfurt.

Finish the sentence: “One weak vendor can ___.” (paralyse your whole sector).

Authorities confirmed the attack disrupted passenger services for hours, highlighting the vulnerability of critical travel infrastructure to single points of vendor failure. The NCSC is coordinating with regulators and airlines to push for tougher vendor assurance frameworks. [Read more via Cybersecurity Dive]


✅ Industry Trends & Insights

Germany: Cyber attacks cost economy ~€300bn in past year — Bitkom survey

A Bitkom survey of ~1,000 firms estimates cyber incidents drained nearly €300 billion from Germany over 12 months. Nearly half of companies that traced attacks pointed to Russia and China; some cited EU states or the US. Ransomware surged, with 1 in 7 firms paying ransoms. Losses stemmed from data theft, production outages, legal costs, and remediation. [Read more via Reuters]

UK banking giant flags AI-model supply-chain risk

Lloyds Bank’s data and AI lead has raised red flags over the growing reliance on third-party AI models within development teams. Without proper vetting, organisations could expose themselves to data poisoning, intellectual property violations, and compliance breaches.

Prediction: What would regulators demand first — provenance controls or large-scale audits?

The call reflects a broader trend across Europe: embedding AI governance, traceability, and provenance controls into operational pipelines before large-scale adoption in sensitive industries. [Read more on TheRegister]


✅ Regulatory & Policy Updates

EU launches ‘Digital Omnibus’ feedback to simplify cyber/AI/data rules

The European Commission has opened a consultation on simplifying overlapping regulations in cybersecurity, AI, and data management. Dubbed the “Digital Omnibus,” this exercise seeks to reduce friction in compliance by streamlining certification, auditing, and NIS2 alignment processes. While businesses welcome the effort, experts stress the need to preserve Europe’s high trust standards. The outcome may reshape the legislative landscape by 2026. [Read more via Digital Strategy EU]

UK publishes Cyber Growth Action Plan (final report)

The UK government unveiled its final Cyber Growth Action Plan, outlining nine key recommendations to stimulate the sector’s expansion. It calls for stronger skills pipelines, regional innovation clusters, and more rigorous metrics such as GDP contribution and incident cost benchmarking. The plan also emphasises demand creation through initiatives like Cyber Essentials, positioning the UK and EU cyber economy for greater scalability and competitiveness. [Read more via GOV.UK]


✅ Cyber IQ Challenge + Proactive Security Hacks

Quick Quiz:
Which sector was most disrupted by last week’s Collins Aerospace ransomware incident?
A) Healthcare
B) Aviation
C) Education
D) Manufacturing

(Answer revealed below!)

Smart Security Moves of the Week:

  • Audit Transport Sector Vendors: Strengthen resilience of aviation and logistics systems by requiring independent audits of third-party tech suppliers.

  • Fortify Healthcare & Utilities: Polish hospital and water supply incidents show the importance of OT segmentation and real-time monitoring.

  • Embed AI Governance: Banks are leading the charge — establish provenance checks and risk frameworks before scaling third-party AI models.

  • Engage Policy Feedback: Participate in EU consultations like the Digital Omnibus to influence compliance frameworks.

  • Invest in Skills Pipelines: Leverage national plans like the UK Cyber Growth Action Plan to close workforce gaps.

Answer: B) Aviation


✅ Conclusion

From ransomware-induced airport chaos to Russian-linked strikes on Polish hospitals, this week highlights the expanding threat canvas facing Europe.

Final thought for you: Which of your vendors, if compromised tomorrow, would cause the loudest headlines?

Industry trends underline the dangers of over-reliance on third parties, with cascading disruptions showing how one weak link can paralyse entire sectors. At the same time, governments are tightening oversight, whether through the UK’s growth strategy or Brussels’ Digital Omnibus consultation.

For businesses, the clear takeaway is dual: sharpen technical resilience against state and criminal actors, while keeping pace with the regulatory frameworks shaping compliance.

Make Sense empowers enterprises to bridge intelligence, policy, and preparedness — turning evolving threats into actionable, auditable defences. Staying informed is just the start; resilience comes from execution.

Stay secure,
The Make Sense SRL Team & CyberTania