
This document marks the first report on the state of cybersecurity in the Union, adopted by ENISA in cooperation with the NIS Cooperation Group and the European Commission, in accordance with Article 18 of the Directive (EU) 2022/2555 (…
This document marks the first report on the state of cybersecurity in the Union, adopted by ENISA in cooperation with the NIS Cooperation Group and the European Commission, in accordance with Article 18 of the Directive (EU) 2022/2555 (…
Seven prime cybersecurity threats were identified in 2024, with threats against availability topping the chart and followed by ransomware and threats against data, and the report provides a relevant deep-dive on each one of them by analysing…
This study highlights the complexities behind the notion of cyber crisis and the degree of subjectivity it involves. The elevation of a large-scale cyber incident into a cyber crisis relies predominantly on a political decision, and depends…
The report outlines the trends related to cyber espionage attacks and provides guidelines to mitigate them.
The report outlines the findings on data breach, provides a description and analysis of the domain and lists relevant recent incidents. A series of proposed actions for mitigation is provided.
The report outlines the findings on ddos attacks, provides a description and analysis of the domain and lists relevant recent incidents. A series of proposed actions for mitigation is provided.
The report outlines the findings on identity theft, provides a description and analysis of the domain and lists relevant recent incidents. A series of proposed actions for mitigation is provided.
This report provides an analysis of the top 15 cyber threats that dominated the period between January 2019 and April 2020.
This report provides an analysis of the main cybersecurity related incidents in the EU and worldwide from January 2019 to April 2020.
In this report we highlight some of the most important cybersecurity research and innovation topics explored in the EU and around the world.
The report outlines the trends of web application attacks and provides guidelines to mitigate them
The report offers an overview of the web-based attacks, provides a compendium of trends and identifies attack vectors. A series of proposed actions for mitigation is provided.
Pagination