CyberSecurity Knuggets
Dec 24, 2025
I just heard about some major moves and incidents shaking up the cybersecurity landscape that we need to watch closely. One big development is ServiceNow’s acquisition of Armis for $7.75 billion in cash, signaling a strong push to enhance security, especially around connected devices. This shows how critical asset visibility and management have become, given attackers increasingly target IoT and other networked devices. Organizations relying on these infrastructures should be prepared for shifts in how device security is handled and integrated going forward.
On the regulatory side, the U.S. Federal Communications Commission has banned the sale of all new foreign-made drones, mainly targeting Chinese brands like DJI due to national security concerns. While existing drones used by emergency services are still allowed, businesses using these devices must anticipate stricter compliance requirements and consider transitioning to approved hardware. This ban underscores growing worries about supply chain vulnerabilities tied to hardware, which can have serious security implications.
There have also been alarming cyberattacks recently. Romania’s national water authority was hit by a ransomware attack affecting about 1,000 systems across multiple regional offices. Although critical services weren’t disrupted, the attackers used Windows BitLocker encryption, making recovery more difficult. Even more concerning is the University of Phoenix breach, where a zero-day exploit in Oracle’s E-Business Suite exposed sensitive data of 3.5 million people, including Social Security numbers and banking information. This breach places affected individuals at significant risk of identity theft and fraud.
Adding to these threats, a malicious NPM package with tens of thousands of downloads was discovered stealing WhatsApp credentials and other sensitive information. This incident highlights ongoing risks within the open-source software ecosystem, where attackers exploit supply chain weaknesses to distribute malware. Developers and organizations must urgently review their software dependencies and tighten security controls to prevent such infections and data theft.
Altogether, these developments stress the urgent need to stay vigilant against increasingly sophisticated attacks, whether through hardware supply chains, ransomware, software exploits, or open-source components. Immediate actions should include patching vulnerabilities, securing third-party technology, and preparing for evolving regulatory requirements that affect technology procurement and deployment. Staying proactive is essential to protecting critical assets and sensitive data in this rapidly changing threat environment.
Stay Well!
