Blog

Security Insights from the ThreatLens360 Team

Threat research, regulatory analysis, and practical guidance on external attack surface management, threat intelligence, and European cybersecurity compliance.

The 2026 European Threat Landscape: What Mid-Market Organisations Need to Know
Threat Research12 min read

The 2026 European Threat Landscape: What Mid-Market Organisations Need to Know

Our analysis of 10,000+ organisations reveals the key trends shaping the external threat environment for European mid-market companies — from the rise of AI-assisted phishing to the expansion of ransomware targeting operational technology environments.

February 14, 2026Read Article
Regulatory

NIS2 Compliance for Mid-Market: A Practical Guide to Article 21 Requirements

NIS2's Article 21 sets out specific cybersecurity measures that essential and important entities must implement. We break down what each requirement means in practice and how ThreatLens360 maps to them.

February 10, 20268 min read
Attack Surface

How Attackers Use Certificate Transparency to Find Your Hidden Infrastructure

Certificate transparency logs are public — and threat actors use them to discover newly registered subdomains and services before you've had a chance to secure them. Here's how they do it, and how you can too.

February 5, 20266 min read
Regulatory

DORA Deep Dive: ICT Third-Party Risk Management Requirements Explained

The Digital Operational Resilience Act came into force in January 2025. This guide breaks down what financial entities need to do to meet the ICT third-party risk management requirements.

January 28, 202610 min read
Product

Why Your ThreatLens Score Changed: Understanding Score Dynamics

ThreatLens Scores change as your attack surface evolves. This post explains exactly what causes score changes — and what you can do to maximise your improvement trajectory.

January 22, 20265 min read
Threat Research

The Anatomy of a Supply Chain Attack: Lessons from the European MOVEit Incidents

When the MOVEit vulnerability was exploited, hundreds of European organisations discovered they had been affected through vendors they hadn't even monitored. We analyse how the attack unfolded and what better vendor risk management could have changed.

January 15, 20269 min read
Threat Intelligence

Dark Web Monitoring 101: What Security Teams Need to Know

Dark web monitoring is now an essential security capability — but what does it actually mean to monitor the dark web, and what can you realistically expect to find? This primer explains the fundamentals.

January 8, 20267 min read

Subscribe to Our Weekly Threat Briefing

Every Tuesday, we send a curated summary of the most important European cybersecurity developments — threats, regulatory updates, and practical guidance. No spam.

GDPR compliant. Unsubscribe at any time.