Threat Landscape and Good Practice Guide for Software Defined Networks/5G
Foreign Information Manipulation Interference (FIMI) and Cybersecurity - Threat Landscape
Ad-hoc & sensor networking for M2M Communications - Threat Landscape and Good Practice Guide
Detect, SHARE, Protect - Solutions for Improving Threat Data Exchange among CERTs
ENISA Threat Landscape for Ransomware Attacks
ENISA Threat Landscape 2020 - Malware
The report provides an overview and findings of malware, identifies trends and proposes actions for malware mitigation.
ENISA Threat Landscape 2020 - Spam
The report details the different spamming techniques and provides a series of actions for mitigating spam messages.
ENISA Threat Landscape 2020 - Cryptojacking
The report outlines the findings on cryptojacking, provides a description and analysis of the domain and lists relevant recent incidents. A series of proposed actions for mitigation is provided.
ENISA Threat Landscape 2020 - Ransomware
The report outlines the findings on ransomware, provides a description and analysis of the domain and lists relevant recent incidents. A series of proposed actions for mitigation is provided
ENISA Threat Landscape 2020 - Botnet
The report outlines the findings related to botnet, provides a description and analysis of the domain and lists relevant recent incidents. A series of proposed actions for mitigation is provided.
Pagination