Publications

Featured publications

NIS Investments 2025

The annual NIS Investments report presents the findings of a study conducted by ENISA to explore how cybersecurity policy translates in practice across organisations in the EU and its effects on their investments, resources, and operations.

ENISA Threat Landscape 2025

Through a more threat-centric approach and further contextual analysis, this latest edition of the ENISA Threat Landscape analyses 4875 incidents over a period spanning from 1 July 2024 to 30 June 2025. At its core, this report provides an…

NIS2 Technical Implementation Guidance

This report provides technical guidance to support the implementation of the NIS2 Directive for several types of entities in the NIS2 digital infrastructure, ICT service management and digital providers sectors. The cybersecurity requirements for…

All publications

Publish Date

ENISA Threat Landscape 2020 - Sectoral/thematic threat analysis

Apart from indicating adversaries’ motivations, the report provides evidence about the most common attack techniques and threat exposure applying to a particular sector, thus indicate protection requirements and priorities.

ENISA Threat Landscape 2020 - Malware

The report provides an overview and findings of malware, identifies trends and proposes actions for malware mitigation.

ENISA Threat Landscape 2020 - Phishing

The report outlines the findings related to phishing, provides an overview of the trends in this domain and details the top phishing themes in 2019. A series of proposed actions for mitigation is provided

ENISA Threat Landscape 2020 - Information Leakage

The report outlines the findings on information leakage, provides a description and analysis of the domain and lists relevant recent incidents. A series of proposed actions for mitigation is provided

ENISA threat landscape for 5G Networks

This report draws an initial threat landscape and presents an overview of the challenges in the security of 5G networks. Its added value lays with the creation of a comprehensive 5G architecture, the identification of important assets (asset…

ENISA Threat Landscape Report 2018

2018 was a year that has brought significant changes in the cyberthreat landscape. Those changes had as source discrete developments in motives and tactics of the most important threat agent groups, namely cyber-criminals and state-sponsored…

Exploring the opportunities and limitations of current Threat Intelligence Platforms

The main objective of this report is to understand the limitations of threat information sharing and the analysis tools that are currently in use. Moreover, the second objective is to provide the relevant recommendations so that these limitations…

ENISA Threat Landscape Report 2017

2017 was the year in which incidents in the cyberthreat landscape have led to the definitive recognition of some omnipresent facts. We have gained unwavering evidence regarding monetization methods, attacks to democracies, cyber-war,…

ENISA Threat Landscape Report 2016

The ENISA Threat Landscape 2016 - the summary of the most prevalent cyber-threats – is sobering: everybody is exposed to cyber-threats, with the main motive being monetization. The year 2016 is thus characterized by “the efficiency of cyber-crime…

Ad-hoc & sensor networking for M2M Communications - Threat Landscape and Good Practice Guide

The ad-hoc and sensor networking Threat Landscape and Good Practice Guide complements the Annual Cyber Security ENISA Threat Landscape (ETL). It provides a deep overview of the current state of security in the ad-hoc and sensor networking for M2M…