September 2025 Cybersecurity Brief

September 15, 2025


September 2025 Cybersecurity Brief

Supply-chain ransomware, airport disruption, and real post-quantum cryptography (PQC) rollouts.

TL;DR: Attacks targeted shared platforms and vendors. Airports and enterprises felt it. At the same time, providers shipped PQC for TLS at scale. Laws tightened breach deadlines. Reduce blast radius, verify suppliers, and start hybrid-PQC now.

What happened in September 2025

Operational disruption
  • European airports suffered check-in outages after a vendor platform was hit, affecting multiple hubs.
  • Ransomware volumes remained high, with manufacturing and services leading victim counts.
  • Several brands faced HR and third-party SaaS exposures, showing supply-chain risk concentration.
Crypto and policy shifts
  • CDNs and security providers rolled out hybrid-PQC key exchange for client traffic.
  • Tooling emerged to assess PQC readiness across Web2/Web3 stacks.
  • States advanced faster breach-notification deadlines, compressing response windows.

Why it matters

Attackers favor leverage. If a shared vendor or platform fails, many organizations fail together. Meanwhile, “harvest-now, decrypt-later” pressure makes long-lived data and logs a future target. The response is architectural: contain by design and upgrade crypto before attackers can read the past.

Data-centric, zero-trust response
  1. Protect the object: enforce ABAC + rule-based access at the data layer, not the network.
  2. Constrain suppliers: isolate third-party integrations behind PEPs (proxies, gateways) with default-deny.
  3. Prove decisions: append policy versions and access outcomes to an immutable log for fast audits.
  4. Go hybrid-PQC: enable PQC+classical handshakes for TLS now; plan PQC-only cutovers later.

Key incidents and trends, explained

Airline check-in and passenger processing depended on a common vendor service. A ransomware event upstream created cascading failures. Lesson: treat vendor platforms like untrusted networks. Terminate, inspect, and authorize per request.

Victim counts stayed elevated. New affiliates and AI-assisted delivery increased speed from foothold to impact. Lesson: reduce privileges, segment by blast radius, and keep recovery immutable and offline-verifiable.

Major networks enabled hybrid PQC key exchange for client traffic. Some UEM and infra vendors began shipping PQC features for device fleets. Lesson: you can test PQC today with phased rollout flags and fallbacks.

Practical actions for September–October 2025

ActionOwnerTarget
Enable hybrid-PQC (e.g., X25519+ML-KEM) on edge proxies and test client behavior Network/SRE Pilot in 2 weeks; telemetry on CPU/latency
Gate vendor APIs via PEPs with ABAC and deny-by-default rules App Sec / Platform Top 5 critical vendors first
Immutably log policy versions and access outcomes; anchor daily hash Security Eng 30-day baseline, proof-of-tamper
Rehearse 30-day breach-notification playbook with legal and comms IR / Legal Tabletop this month
Offline-verifiable backups with staged restore tests (RTO/RPO) IT Ops Weekly checks, signed manifests

Post-quantum rollout basics

Transport
  • Hybrid KEM for TLS 1.3 at edges and WAF/CDN.
  • PQC-downgrade-allowed in phase 1; PQC-only later.
  • Short-lived certs and strict TLS versions.
Evidence
  • Hash logs and policies with SHA-3/Shake256 ≥256-bit.
  • Sign ledger checkpoints with Dilithium or SPHINCS+.
  • Anchor Merkle roots to a public chain periodically.

Plain-English FAQ

No. Most testing happens in browsers, apps, and edge services. Start at your gateways and CDNs, then move inward.

No. A managed append-only log works. Anchoring periodic hashes to a public chain adds external timestamping and tamper evidence.

Edge providers report modest overhead in hybrid mode. Measure CPU and handshake latency in your environment before forcing PQC-only.

Takeaway: contain vendors, enforce at the data, and adopt hybrid-PQC now so records and logs remain safe against future decryption.