
HBK EUROPE MANAGEMENT LLP
None



None

Since 1820, Swedbank has been the bank for the many households and businesses. We are a modern financial services platform focused on customer satisfaction. Our goal is to encourage people to save for a better future, and we aim to help people, businesses and society to grow by promoting a healthy and sustainable economy. As an equal opportunity employer, we believe that diversity and equality help us to grow and achieve our goals. We encourage a culture built on trust, respect and our values - open, simple and caring. With 7.4 million private customers and more than 600,000 corporate and organisational customers, we have a leading position in our home markets of Sweden, Estonia, Latvia and Lithuania. This position also enables us to offer our employees great opportunities to grow and develop. Working here is about creating value for our customers, our colleagues and society. Inspiring and learning from one another is what moves us forward, and by working together, we make a difference. Find our policy for social media here: www.swedbank.se/om-oss/policy-fb
Security & Compliance Standards Overview












No incidents recorded for HBK EUROPE MANAGEMENT LLP in 2026.
No incidents recorded for Swedbank in 2026.
HBK EUROPE MANAGEMENT LLP cyber incidents detection timeline including parent company and subsidiaries
Swedbank cyber incidents detection timeline including parent company and subsidiaries
Last 3 Security & Risk Events by Company
Hirschmann EagleSDV version 05.4.01 prior to 05.4.02 contains a denial-of-service vulnerability that causes the device to crash during session establishment when using TLS 1.0 or TLS 1.1. Attackers can trigger a crash by initiating TLS connections with these protocol versions to disrupt service availability.
The stored API keys in temporary browser client is not marked as protected allowing for JavScript console or other errors to allow for extraction of the encryption credentials.
XSS vulnerability in cveInterface.js allows for inject HTML to be passed to display, as cveInterface trusts input from CVE API services
Multiple reflected cross-site scripting (XSS) vulnerabilities in the login.php endpoint of Interzen Consulting S.r.l ZenShare Suite v17.0 allows attackers to execute arbitrary Javascript in the context of the user's browser via a crafted URL injected into the codice_azienda and red_url parameters.
A reflected cross-site scripting (XSS) vulnerability in the login_newpwd.php endpoint of Interzen Consulting S.r.l ZenShare Suite v17.0 allows attackers to execute arbitrary Javascript in the context of the user's browser via a crafted URL injected into the codice_azienda parameter.