• ENISA Threat Landscape 2020 - Web application attacks

    The report outlines the trends of web application attacks and provides guidelines to mitigate them

    Published on October 20, 2020
  • ENISA Threat Landscape 2020 - Web-based attacks

    The report offers an overview of the web-based attacks, provides a compendium of trends and identifies attack vectors. A series of proposed actions for mitigation is provided.

    Published on October 20, 2020
  • ENISA Threat Landscape 2020 - Identity Theft

    The report outlines the findings on identity theft, provides a description and analysis of the domain and lists relevant recent incidents. A series of proposed actions for mitigation is provided.

    Published on October 20, 2020
  • ENISA Threat Landscape 2020 - Insider Threat

    The report outlines the findings related to Insider Threat, provides an overview of the trends in this domain and details the top phishing themes in 2019. A series of proposed actions for mitigation is provided.

    Published on October 20, 2020
  • ENISA Threat Landscape 2020 - Sectoral/thematic threat analysis

    Apart from indicating adversaries’ motivations, the report provides evidence about the most common attack techniques and threat exposure applying to a particular sector, thus indicate protection requirements and priorities.

    Published on October 20, 2020
  • ENISA Threat Landscape 2020 - List of top 15 threats

    This report provides an analysis of the top 15 cyber threats that dominated the period between January 2019 and April 2020.

    Published on October 20, 2020
  • ENISA Threat Landscape 2020 - Main Incidents

    This report provides an analysis of the main cybersecurity related incidents in the EU and worldwide from January 2019 to April 2020.

    Published on October 20, 2020
  • ENISA Threat Landscape 2020 - Phishing

    The report outlines the findings related to phishing, provides an overview of the trends in this domain and details the top phishing themes in 2019. A series of proposed actions for mitigation is provided

    Published on October 20, 2020
  • ENISA Threat Landscape 2020 - Distributed denial of service

    The report outlines the findings on ddos attacks, provides a description and analysis of the domain and lists relevant recent incidents. A series of proposed actions for mitigation is provided.

    Published on October 20, 2020
  • ENISA Threat Landscape 2020 - Information Leakage

    The report outlines the findings on information leakage, provides a description and analysis of the domain and lists relevant recent incidents. A series of proposed actions for mitigation is provided

    Published on October 20, 2020
  • ENISA Threat Landscape 2020 - Ransomware

    The report outlines the findings on ransomware, provides a description and analysis of the domain and lists relevant recent incidents. A series of proposed actions for mitigation is provided

    Published on October 20, 2020
  • ENISA Threat Landscape 2020 - Cryptojacking

    The report outlines the findings on cryptojacking, provides a description and analysis of the domain and lists relevant recent incidents. A series of proposed actions for mitigation is provided.

    Published on October 20, 2020
  • ENISA Threat Landscape 2020 - Research topics

    In this report we highlight some of the most important cybersecurity research and innovation topics explored in the EU and around the world.

    Published on October 20, 2020
  • ENISA Threat Landscape 2020 - Botnet

    The report outlines the findings related to botnet, provides a description and analysis of the domain and lists relevant recent incidents. A series of proposed actions for mitigation is provided.

    Published on October 20, 2020
  • ENISA Threat Landscape 2020 - Data Breach

    The report outlines the findings on data breach, provides a description and analysis of the domain and lists relevant recent incidents. A series of proposed actions for mitigation is provided.

    Published on October 20, 2020
  • ENISA Threat Landscape 2020 - Malware

    The report provides an overview and findings of malware, identifies trends and proposes actions for malware mitigation.

    Published on October 20, 2020
  • ENISA Threat Landscape 2020 - Spam

    The report details the different spamming techniques and provides a series of actions for mitigating spam messages.

    Published on October 20, 2020
  • ENISA Threat Landscape 2020 - Cyber threat intelligence overview

    The report assesses the state-of-play of cyber threat intelligence (CTI) as a dynamic cybersecurity domain. This analysis aims to indicate the main trends in the expeditious development of CTI by providing relevant references and summarizing the...

    Published on October 20, 2020
  • ENISA Threat Landscape 2020 - Physical manipulation/ damage/ theft/ loss

    The report provides an overview of physical tampering, damage, theft and loss of devices and outlines security practices, trends and findings. It also lists proposed actions for mitigation

    Published on October 20, 2020
  • ENISA Threat Landscape - Emerging trends

    With the start of a new decade, significant changes can be expected in the way we perceive and understand cybersecurity or the security of cyberspace. The report lists relevant cybersecurity challenges and the top five trends with cyberthreats.

    Published on October 20, 2020
  • ENISA Threat Landscape - The year in review

    This report provides a general overview of the threat landscape, outlining the most important topics referenced across all the other reports. It also provides ENISA’s list of the top 15 threats, conclusions and recommendations.

    Published on October 20, 2020
  • ENISA Threat Landscape 2020 - Cyber espionage

    The report outlines the trends related to cyber espionage attacks and provides guidelines to mitigate them.

    Published on October 20, 2020
  • ENISA threat landscape for 5G Networks

    This report draws an initial threat landscape and presents an overview of the challenges in the security of 5G networks. Its added value lays with the creation of a comprehensive 5G architecture, the identification of important assets (asset...

    Published on November 21, 2019
  • ENISA Threat Landscape Report 2018

    2018 was a year that has brought significant changes in the cyberthreat landscape. Those changes had as source discrete developments in motives and tactics of the most important threat agent groups, namely cyber-criminals and state-sponsored actors

    Published on January 28, 2019
  • Looking into the crystal ball: A report on emerging technologies and security challenges

    The time has come for ENISA to take a look at the crystal ball of technology; In particular looking at what are considered to be emerging technologies and what might be their prospective usage scenarios. Considering emerging technologies and...

    Published on January 31, 2018
  • ENISA Threat Landscape Report 2017

    2017 was the year in which incidents in the cyberthreat landscape have led to the definitive recognition of some omnipresent facts. We have gained unwavering evidence regarding monetization methods, attacks to democracies, cyber-war, transformation...

    Published on January 15, 2018
  • Ad-hoc & sensor networking for M2M Communications - Threat Landscape and Good Practice Guide

    The ad-hoc and sensor networking Threat Landscape and Good Practice Guide complements the Annual Cyber Security ENISA Threat Landscape (ETL). It provides a deep overview of the current state of security in the ad-hoc and sensor networking for M2M...

    Published on February 08, 2017
  • Hardware Threat Landscape and Good Practice Guide

    The goal of this report is the compilation of a comprehensive landscape of hardware-related assets, threats, and good practices. This landscape provides basic information for manufacturers and developers who want to understand which threats their...

    Published on February 08, 2017
  • ENISA Threat Landscape Report 2016

    The ENISA Threat Landscape 2016 - the summary of the most prevalent cyber-threats – is sobering: everybody is exposed to cyber-threats, with the main motive being monetization. The year 2016 is thus characterized by “the efficiency of...

    Published on February 08, 2017
  • Big Data Threat Landscape

    This Threat Landscape and Good Practice Guide for Big Data provides an overview of the current state of security in the Big Data area. In particular, it identifies Big Data assets, analyses exposure of these assets to threats, lists threat agents...

    Published on January 27, 2016
  • Threat Landscape and Good Practice Guide for Software Defined Networks/5G

    This study reviews threats and potential compromises related to the security of SDN/5G networks. More specifically, this report has identified related network assets and the security threats, challenges and risks arising for these assets. Driven by...

    Published on January 27, 2016
  • ENISA Threat Landscape 2015

    This report, the ENISA Threat Landscape 2015 (ETL 2015), is the result of an analysis of cyber-threats that have been encountered in the last 12 months, that is, approximately between December 2014 and December 2015. ETL 2015 is the fourth in a...

    Published on January 27, 2016
  • Threat Landscape for Smart Home and Media Convergence

    The study identifies threats to all asset classes, across the several alternative design pathways to smart homes. As it develops, the smart home will exhibit a high cyber security risk profile for the individual context, with additional systematic...

    Published on February 09, 2015
  • ENISA Threat Landscape 2014

    In the ETL 2014, details of the developments made in 2014 are consolidated by means of top cyber threats and emerging threat trends in various technological and application areas. References to over 400 relevant sources on threats will help decision...

    Published on January 27, 2015
  • Threat Landscape of Internet Infrastructure

    This study details a list of good practices that aim at securing an Internet infrastructure asset from Important Specific Threats. A gap analysis identifies that some assets remain not covered by current good practices: human resources...

    Published on January 15, 2015
  • Smart Grid Threat Landscape and Good Practice Guide

    ENISA report on threats in the area of smart grids and good practice guide.

    Published on December 17, 2013
  • ENISA Threat Landscape 2013 - Overview of current and emerging cyber-threats

    ENISA releases the 2013's ENISA Threat Landscape (ETL 2013). The ENISA Threat Landscape is a collection of top cyber-threats that have been assessed in the reporting period, ie. end 2012-end 2013. ENISA has collected over 250 reports regarding...

    Published on December 11, 2013
  • ENISA Threat Landscape mid year 2013

    ENISA presents in this short paper a first “taste” of current developments related to the Threat Landscape 2013.

    Published on September 19, 2013
  • ENISA Threat Landscape 2012

    The ENISA Threat Landscape provides an overview of threats, together with current and emerging trends. It is based on publicly available data and provides an independent view on observed threats, threat agents and threat trends. Over 140 recent...

    Published on January 08, 2013
  • Consumerization of IT: Final report on Risk Mitigation Strategies and Good Practices

    This report presents security policies that can be deployed to mitigate risks that are related with the trend of Consumerization of IT (COIT) and Bring Your Own Device (BYOD). The aim of this document is to identify mitigation strategies, policies...

    Published on December 19, 2012
  • Consumerization of IT: Top Risks and Opportunities

    This report is an ENISA deliverable in the area of “Identifying & Responding to the Evolving Threat Environment”. It delivers the results of a risk and opportunity assessment in the area of “Consumerization of IT” (COIT), that is, the recent...

    Published on October 18, 2012
  • Smartphones: Information security risks, opportunities and recommendations for users

    The objective of this report is to allow an informed assessment of the information security and privacy risks of using smartphones. Most importantly, we make practical recommendations on how to address these risks. We assess and rank the most...

    Published on December 10, 2010
  • Flying 2.0 - Enabling automated air travel by identifying and addressing the challenges of IoT & RFID technology: Annex II

    This is Annex II - "Risk Assessment Spreadsheet" of the Final Report "Flying 2.0 - Enabling automated air travel by identifying and addressing the challenges of IoT & RFID technology".

    Published on April 12, 2010
  • Flying 2.0 - Enabling automated air travel by identifying and addressing the challenges of IoT & RFID technology: Annex I

    This is Annex I - " Scenario Building & Analysis" of the Final Report "Flying 2.0 - Enabling automated air travel by identifying and addressing the challenges of IoT & RFID technology".

    Published on April 12, 2010

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information