INTELLIGENCE > > Europe


« Back to News

2018-06-12

Ukraine Detects A Cyber Attack On A NATO Member

The Ukraine Security Service claims to have frustrated an attempted attack on a NATO member state, but remains oddly silent about which one.

2018-05-23

Turkey Using German Spy Software On Opposition Politicians & Activists

The Turkish government has used a German-made spy program to infiltrate the smartphones of the Turkish opposition, despite a ban on its export.

2018-04-10

Denmark: A Leader In Cyber Security

Denmark is amongst the countries that suffer from lowest numbers of cyber attacks, despite being a highly digitised nation.

2018-03-19

The Growing Threat Of Russian Cyber Reprisals On Britain

UK Banks, energy & water companies are on maximum alert over the threat of a serious cyber attack from Russia following an assassination attempt.

2018-03-16

Dutch Intelligence Agency Pinpoints Cyberattacks

The AIVD reports that attempts at digital espionage and online political manipulation in the EU are on the rise both in number & in complexity.

2018-03-15

Russia Warns UK Against Cyber Retaliation

Britain could launch a cyber attack in retaliation for the alleged use of a nerve agent in an assassination attempt on Russians in the UK.

2018-03-13

Further Cyberattacks On German Government Networks

While blaming Russian APT28 hackers Germany's security services have allowed the attack to continue in order to gather more information.

2018-03-05

Cyber Attack On German Government

Cyber spies belonging to the Russian hacker group "APT28" are said to have attacked the federal government's sensitive data network.

2018-02-19

UK Blames Russia For NotPetya Cyberattack

UK Defence Minister accuses the Russian government of “undermining democracy” with a cyberattack targeting Ukraine and spread across Europe.

2018-02-12

What Does Brexit Mean For Britain's Spies?

As the UK negotiates Brexit, two former intelligence chiefs warn that Britain's security expertise should not become a "bargaining chip".

2018-02-01

Spy vs Spy - Cozy Bear Hackers Hacked

Dutch intelligence were the first to alert US agencies about the Russian hack of DNC after penetrating the Cozy Bears' servers and CCTV.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

TechInsurance

TechInsurance

TechInsurance is America's top technology insurance company offering a range of technology related products including Cyber Liability insurance.

European Cyber Security Organisation (ECSO)

European Cyber Security Organisation (ECSO)

The main objective of ECSO is to support all types of initiatives or projects that aim to develop, promote and encourage European cybersecurity.

CyberPilot

CyberPilot

CyberPilot ApS is a Danish cybersecurity company. We work with all types of companies and organisations, both large and small, who want to achieve effective cybersecurity.

KeepSolid

KeepSolid

KeepSolid is a Virtual Private Network services provider offering secure encrypted access to the internet.

Intelligent Business Solutions Cyprus (IBSCY)

Intelligent Business Solutions Cyprus (IBSCY)

IBSCY Ltd is a leading provider of total IT solutions and services in Cyprus specializing in the areas of cloud services and applications, systems integration, IT infrastructure and security.

Telelogos

Telelogos

Telelogos is a European provider of Enterprise Mobility Management software, Digital Signage software and Data Transfer and Synchronization software.

Jumio

Jumio

Jumio’s end-to-end identity verification and authentication solutions fight fraud, maintain compliance and onboard good customers faster.

Lightship Security

Lightship Security

Lightship Security is an accredited Common Criteria and FIPS 140-2 IT security testing laboratory that specializes in test conformance automation solutions and IT product security certifications.

Polyrize

Polyrize

The Polyrize continuous authorization platform for SaaS and IaaS stops tomorrow's public cloud cyber threats, today.

Cyber Security Africa

Cyber Security Africa

Cyber Security Africa is a full-service Information Security Consulting firm offering a comprehensive range of Services and Products to help organizations protect their valuable assets.

ColorTokens

ColorTokens

ColorTokens Xtended ZeroTrust Platform protects from the inside out with unified visibility, micro-segmentation, zero-trust network access, cloud workload and endpoint protection.

Entara

Entara

Entara (formerly YJT Solutions) is an eXtended Service Provider (XSP) focused on providing cutting edge technology and cyber security solutions to companies in regulated industries.

Aravo Solutions

Aravo Solutions

Your Extended Enterprise is full of hidden risks – Aravo makes them visible, measurable, and manageable.

Sitehop

Sitehop

Sitehop is a cybersecurity technology company developing and supplying FPGA hardware-enforced cyber security solutions for networks.

Phylum

Phylum

Phylum provides powerful, automated software supply chain risk analysis that protects organizations, defends developers and enables secure innovation.

Graphiant

Graphiant

Graphiant’s Data Assurance service gives businesses end-to-end control and visibility into how data travels throughout the entire business network.