ENISA
https://www.enisa.europa.eu
Trustworthy AI requires solid Cybersecurity
https://www.enisa.europa.eu/news/enisa-news/trustworthy-ai-requires-solid-cybersecurity
At the third annual ENISA-Europol Internet of Things (IoT) Security Conference, it was Artificial Intelligence (AI) that was the newcomer on the scene. The rise of AI technologies requires a new dialogue and awareness of the related cybersecurity challenges.No publisherCyber Threat Analysiscybersecurity5GCyber Threat AgentsCyber Attacks2019/10/25 14:00:00 GMT+2Press ReleaseCyber Threats
https://www.enisa.europa.eu/media/multimedia/videos/cyber-threats
No publisherCyber Threat Analysis2022/11/11 14:46:43 GMT+2ENISA Video FileENISA Foresight Cybersecurity Threats for 2030
https://www.enisa.europa.eu/publications/enisa-foresight-cybersecurity-threats-for-2030
This study aims to identify and collect information on future cybersecurity threats that could affect the Union’s infrastructure and services, and its ability to keep European society and citizens digitally secure.No publisherThreatsCyber AttacksCyber TheatsCyber Threat Analysis2023/03/29 14:00:00 GMT+2Report/StudyENISA Threat Landscape 2020 - Insider threat
https://www.enisa.europa.eu/publications/insider-threat
The report provides an overview of insider threat, describes key findings and attack vectors. It also outlines proposed actions for mitigation. No publisherCyber Threat Analysis2020/10/20 12:05:00 GMT+2Report/StudyENISA Threat Landscape 2020 - Cyber espionage
https://www.enisa.europa.eu/publications/enisa-threat-landscape-2020-cyber-espionage
The report outlines the trends related to cyber espionage attacks and provides guidelines to mitigate them. No publisherCyber Threat AnalysisThreat landscape2020/10/20 12:05:00 GMT+2Report/StudyENISA Threat Landscape 2020 - Cryptojacking
https://www.enisa.europa.eu/publications/enisa-threat-landscape-2020-cryptojacking
The report outlines the findings on cryptojacking, provides a description and analysis of the domain and lists relevant recent incidents. A series of proposed actions for mitigation is provided.No publisherCyber Threat AnalysisThreat landscape2020/10/20 12:05:00 GMT+2Report/StudyENISA Threat Landscape 2020 - Botnet
https://www.enisa.europa.eu/publications/enisa-threat-landscape-2020-botnet
The report outlines the findings related to botnet, provides a description and analysis of the domain and lists relevant recent incidents. A series of proposed actions for mitigation is provided.No publisherCyber Threat AnalysisThreat landscape2020/10/20 12:05:00 GMT+2Report/StudyENISA Threat Landscape 2020 - Main Incidents
https://www.enisa.europa.eu/publications/enisa-threat-landscape-2020-main-incidents
This report provides an analysis of the main cybersecurity related incidents in the EU and worldwide from January 2019 to April 2020.No publisherCyber Threat AnalysisThreat landscape2020/10/20 12:05:00 GMT+2Report/StudyENISA Threat Landscape 2020 - List of top 15 threats
https://www.enisa.europa.eu/publications/enisa-threat-landscape-2020-list-of-top-15-threats
This report provides an analysis of the top 15 cyber threats that dominated the period between January 2019 and April 2020.No publisherCyber Threat AnalysisThreat landscape2020/10/20 12:05:00 GMT+2Report/StudyENISA Threat Landscape 2020 - Research topics
https://www.enisa.europa.eu/publications/enisa-threat-landscape-2020-research-topics
In this report we highlight some of the most important cybersecurity research and innovation topics explored in the EU and around the world.No publisherCyber Threat AnalysisThreat landscape2020/10/20 12:05:00 GMT+2Report/StudyENISA Threat Landscape for 5G Networks Report
https://www.enisa.europa.eu/publications/enisa-threat-landscape-report-for-5g-networks
This report is an update of the ENISA 5G Threat Landscape, published in its first edition in 2019. This document is a major update of the previous edition. It encompasses all novelties introduced, it captures developments in the 5G architecture and it summarizes information found in standardisation documents related to 5G. Moreover, the vulnerability and threat assessments found in this document introduce a significant advancement to the previous edition, by providing more comprehensive information about the exposure of assets of the updated 5G architecture.No publisherCyber Threat Analysis5G Threats2020/12/14 13:15:00 GMT+2Report/Study2023 CTI- EU Conference powered by ENISA
https://www.enisa.europa.eu/events/2023-cti-eu-conference
No publisherCTI-EUENISA eventsCyber Threat IntelligenceCyber Threat AnalysisCybersecurityCybersecurity EducationCTI2023/06/21 14:16:00 GMT+2EventENISA - Threat Landscape Mapping Infographic
https://www.enisa.europa.eu/topics/wfh-covid19/resources/eu-institutions-and-bodies/threat-landscape-mapping-infographic
No publisherCyber Threat AnalysisCOVID192020/06/16 18:20:00 GMT+2LinkENISA Threat Landscape for Ransomware Attacks
https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks
This report aims to bring new insights into the reality of ransomware incidents through mapping and studying ransomware incidents from May 2021 to June 2022. Based on the findings, ransomware has adapted and evolved, becoming more efficient and causing more devastating attacks.No publisherCyber Threat Analysis2022/07/29 12:21:00 GMT+2Report/StudyENISA Threat Landscape Report 2018
https://www.enisa.europa.eu/publications/enisa-threat-landscape-report-2018
2018 was a year that has brought significant changes in the cyberthreat landscape. Those changes had as source discrete developments in motives and tactics of the most important threat agent groups, namely cyber-criminals and state-sponsored actorsNo publisherCyber Threat AnalysisCyber ThreatsThreat landscape2019/01/28 09:00:00 GMT+2Report/Study