EU and Ukraine enhance cyber cooperation to counter Russian aggression

The European Union Agency for Cybersecurity (ENISA) has announced it will work with Ukraine to bolster international cybersecurity cooperation. The partnership, which involves the National Cybersecurity Coordination Center (NCCC) and the Administration of the State Service of Special Communications and Information Protection of Ukraine (SSSCIP), aims to enhance capacity-building and situational awareness and exchange best practices.

The arrangement covers short-term structured cooperation actions and paves the way for a longer-term alignment of cybersecurity policies and implementation approaches. The areas of cooperation include:

  • Cyber Awareness & Capacity Building: The partnership will work to enhance cyber resilience. This includes facilitating the participation of third-country representatives in specific EU-wide cybersecurity exercises or training, possible secondment arrangements, and the sharing and promotion of cyber awareness tools and programs.

  • Best Practice Exchange: The partnership will ensure alignment of legislation and implementation, including key cyber legislation implementation such as NIS2, and sectors such as telecommunications and energy.

  • Knowledge and Information Sharing: The partnership will work towards a more systematic sharing of knowledge and information about the cybersecurity threat landscape. This will increase the common situational awareness of the stakeholders and communities.

This partnership represents a significant step in strengthening international cybersecurity cooperation and enhancing the cyber resilience of both the EU and Ukraine.


Back to the list

Latest Posts

Operation Endgame takes down over 1K servers linked to Rhadamanthys, VenomRAT, and Elysium malware

The main suspect behind VenomRAT was arrested in Greece.
13 November 2025

Thousands of domains target hotel guests in massive phishing campaign

The campaign employs a phishing kit that customizes the page presented to the site visitor depending on a unique string in the URL path.
12 November 2025

Hackers exploit Citrix and Cisco zero-days to deploy custom malware

Attackers leveraged the Cisco flaw to gain pre-authentication admin access and installed a custom web shell called “IdentityAuditAction,” masquerading as a legitimate ISE component.
12 November 2025