The report outlines the findings related to phishing, provides an overview of the trends in this domain and details the top phishing themes in 2019. A series of proposed actions for mitigation is provided
ENISA Threat Landscape - Emerging trends
With the start of a new decade, significant changes can be expected in the way we perceive and understand cybersecurity or the security of cyberspace. The report lists relevant cybersecurity challenges and the top five trends with cyberthreats.…
Foresight Cybersecurity Threats For 2030 - Update 2024
This booklet summarises upcoming challenges and provides for an assessment of the risks. We are now ready to design the cyber secure future ahead of us.
ENISA Threat Landscape 2020 - Cyber espionage
The report outlines the trends related to cyber espionage attacks and provides guidelines to mitigate them.
ENISA Threat Landscape 2020 - Main Incidents
This report provides an analysis of the main cybersecurity related incidents in the EU and worldwide from January 2019 to April 2020.
ENISA Threat Landscape 2020 - Research topics
In this report we highlight some of the most important cybersecurity research and innovation topics explored in the EU and around the world.
ENISA Threat Landscape 2020 - Data Breach
The report outlines the findings on data breach, provides a description and analysis of the domain and lists relevant recent incidents. A series of proposed actions for mitigation is provided.
ENISA Threat Landscape 2020 - Identity Theft
The report outlines the findings on identity theft, provides a description and analysis of the domain and lists relevant recent incidents. A series of proposed actions for mitigation is provided.
ENISA Threat Landscape 2020 - Information Leakage
The report outlines the findings on information leakage, provides a description and analysis of the domain and lists relevant recent incidents. A series of proposed actions for mitigation is provided
ENISA Threat Landscape 2020 - Web application attacks
The report outlines the trends of web application attacks and provides guidelines to mitigate them
Pagination