The report assesses the state-of-play of cyber threat intelligence (CTI) as a dynamic cybersecurity domain. This analysis aims to indicate the main trends in the expeditious development of CTI by providing relevant references and summarizing the…
ENISA Threat Landscape 2020 - Cyber espionage
The report outlines the trends related to cyber espionage attacks and provides guidelines to mitigate them.
ENISA Threat Landscape 2020 - List of top 15 threats
This report provides an analysis of the top 15 cyber threats that dominated the period between January 2019 and April 2020.
ENISA Threat Landscape: Finance Sector
This is the first analysis conducted by the European Union Agency for Cybersecurity (ENISA) of the cyber threat
landscape of the European finance sector. From January 2023 to June 2024, the European financial sector faced
significant…
ENISA Threat Landscape Report 2016
The ENISA Threat Landscape 2016 - the summary of the most prevalent cyber-threats – is sobering: everybody is exposed to cyber-threats, with the main motive being monetization. The year 2016 is thus characterized by “the efficiency of cyber-crime…
ENISA Transport Threat Landscape
This report is the first analysis conducted by the European Union Agency for Cybersecurity (ENISA) of the cyber threat landscape of the transport sector in the EU.
The report aims to bring new insights into the reality of the transport sector by…
ENISA Threat Landscape Report 2018
2018 was a year that has brought significant changes in the cyberthreat landscape. Those changes had as source discrete developments in motives and tactics of the most important threat agent groups, namely cyber-criminals and state-sponsored actors
ENISA Threat Landscape Report 2017
2017 was the year in which incidents in the cyberthreat landscape have led to the definitive recognition of some omnipresent facts. We have gained unwavering evidence regarding monetization methods, attacks to democracies, cyber-war, transformation…
Foresight 2030 Threats
This booklet summarises upcoming challenges and provides for an assessment of the
risks. We are now ready to design the cyber secure future ahead of us.
Ad-hoc & sensor networking for M2M Communications - Threat Landscape and Good Practice Guide
The ad-hoc and sensor networking Threat Landscape and Good Practice Guide complements the Annual Cyber Security ENISA Threat Landscape (ETL). It provides a deep overview of the current state of security in the ad-hoc and sensor networking for M2M…
Pagination