Jesus ensures stylish Manchester City sweep past Real Madrid | The Guardian

Manchester City were relentless in a dazzling performance of shock-and-awe attacking that pinned back Real Madrid from kick-off to final whistle. It gave Pep Guardiola’s team – and the club – its finest Champions League result and pits them against Lyon in the quarter-finals.Zinedine Zidane’s team were just not allowed to breathe, and in Eden Hazard had an A-list act reduced to a bit-part due to City’s dominance. Downing the record 13-times winners in this manner will surely rocket confidence and convince City they can go on and claim the competition for the first time in their history. Continue reading…

Manchester City were relentless in a dazzling performance of shock-and-awe attacking that pinned back Real Madrid from kick-off to final whistle. It gave Pep Guardiola’s team – and the club – its finest Champions League result and pits them against Lyon in the quarter-finals.

Zinedine Zidane’s team were just not allowed to breathe, and in Eden Hazard had an A-list act reduced to a bit-part due to City’s dominance. Downing the record 13-times winners in this manner will surely rocket confidence and convince City they can go on and claim the competition for the first time in their history.

Continue reading…


Are you Citizen-Journalist Material?

Have a tip or scoop? Do you have info about corruption that needs to be investigated and responsibly exposed ? Get in touch securely via WhatsApp at +44 7771 927378 | Signal at +447766 098270


Receive Exclusives, Features & News Updates

Subscribe



What Are
Geo-Poli-
Cyber™ Risks?

What Is Geo-Poli-Cyber™?

MLi Group created the terms Poli-Cyber™ and Geo-Poli-Cyber™ (GPC™) in 2012 and 2013 based on the philosophy that if you cannot identify and name the threat, you cannot mitigate that threat.

Geo-Poli-Cyber™ attacks are political, ideological, terrorist, extremist, ‘religious’, and/or geo-politically motivated.

More Sinister Than Financial Motivations

Geo-Poli-Cyber™ attacks are significantly different from financially motivated cyber-attacks in damage, scale, magnitude as well as in risk mitigation strategies and solutions.

Click to read more