Through a more threat-centric approach and further contextual analysis, this latest edition of the ENISA Threat Landscape analyses 4875 incidents over a period spanning from 1 July 2024 to 30 June 2025. At its core, this report provides an…
Through a more threat-centric approach and further contextual analysis, this latest edition of the ENISA Threat Landscape analyses 4875 incidents over a period spanning from 1 July 2024 to 30 June 2025. At its core, this report provides an…
The annual NIS Investments report presents the findings of a study conducted by ENISA to explore how cybersecurity policy
translates in practice across organisations in the EU and its effects on their investments, resources, and operations.…
This report provides technical guidance to support the implementation of the NIS2 Directive for several types of entities in the NIS2 digital infrastructure, ICT service management and digital providers sectors. The…
The report outlines the findings on identity theft, provides a description and analysis of the domain and lists relevant recent incidents. A series of proposed actions for mitigation is provided.
This report provides an analysis of the top 15 cyber threats that dominated the period between January 2019 and April 2020.
This report provides an analysis of the main cybersecurity related incidents in the EU and worldwide from January 2019 to April 2020.
In this report we highlight some of the most important cybersecurity research and innovation topics explored in the EU and around the world.
The report outlines the findings on information leakage, provides a description and analysis of the domain and lists relevant recent incidents. A series of proposed actions for mitigation is provided
The report outlines the trends of web application attacks and provides guidelines to mitigate them
The report offers an overview of the web-based attacks, provides a compendium of trends and identifies attack vectors. A series of proposed actions for mitigation is provided.
Apart from indicating adversaries’ motivations, the report provides evidence about the most common attack techniques and threat exposure applying to a particular sector, thus indicate protection requirements and priorities.
The report details the different spamming techniques and provides a series of actions for mitigating spam messages.
Pagination