ENISA Threat Landscape through the years
The ENISA Threat Landscape provides an overview of threats, together with current and emerging trends. It is based on publicly available data and provides an independent view on observed threats, threat agents and threat trends. Hundreds of reports from security industry, networks of excellence, standardisation bodies and other independent institutes have been analysed.
ETL 2020
The ENISA Threat Landscape 2020 Reports provides a comprehensive analysis of top 15 cyberthreats encoutnered within the time period January 2019-April 2020. The Cybersecurity Act revamps and strengthens ENISA’s role by granting it a permanent mandate, more resources and new tasks. Furthermore, the agency is starting a new chapter with a new executive director, a new strategy and a new organisational structure. With all these changes taking place, it is time for the ETL to change too and to adopt a new structure and a modern look and feel, moving away from a lengthy and static type of report. With its new visual identity and format, the ETL report has become a versatile, dynamic and easy-to-use digital report, attempting to meet the expectations of a growing and demanding audience. This publication is divided into 22 different reports, available in pdf form and ebook form.
See also:
Infographic Threat Landscape Mapping during COVID-19
ETL 2018
The ENISA Threat Landscape 2018 provides a comprehensive compilation of top 15 cyberthreats encoutnered within the time period December 2017 - December 2018. 2018 was a year that has brought significant changes in the cyberthreat landscape. Those changes had as source discrete developments in motives and tactics of the most important threat agent groups, namely cyber-criminals and state-sponsored actors. Monetization motives have contributed to the appearance of crypto-miners in the top 15 threats. State-sponsored activities have led to the assumption that there is a shift towards reducing the use of complex malicious software and infrastructures and going towards low profile social engineering attacks. These developments are the subject of this threat landscape report.
ETL 2017
The ENISA Threat Landscape 2017 provides a comprehensive compilation of top 15 cyberthreats encoutnered within the time period December 2016 - December 2017. The document contains top cyberthreats, together with information on kill-chain, threat agents and attack vectors. Some information about the state-of-play in Cyberthreat Intelligence (CTI) is also being provided.
ETL 2016
The ENISA Threat Landscape 2016 - the summary of the most prevalent cyber-threats – is sobering: everybody is exposed to cyber-threats, with the main motive being monetization. The year 2016 is thus characterized by “the efficiency of cyber-crime monetization”. Undoubtedly, optimization of cyber-crime turnover was THE trend observed in 2016.
ETL 2015
ENISA’s Threat Landscape 2015 (ETL 2015) is the fifth yearly report in sequence, summarizing top cyber threats encountered in 2015. The 2015 edition of the cyber-threat landscape features a number of unique observations, the main one being the smooth advancement of maturity. As a matter of fact, cyber-space stakeholders have gone through varying degrees of further maturity. While the friendly agents – the good guys – have demonstrated increased cooperation and orchestrated reaction to cyber-threats, hostile agents – the bad guys – have advanced their malicious tools with obfuscation, stealthiness and striking power.
See also:
- Brochure: Cyber 7: Seven Messages to the Edge of Cyber-Space
- ETL 2015 Cyber Threats Poster
- ENISA Threat Taxonomy (Updated September 2016)
ETL 2014
In the ETL 2014, details of the developments made in 2014 are consolidated by means of top cyber threats and emerging threat trends in various technological and application areas. References to over 400 relevant sources on threats will help decision makers, security experts and interested individuals to navigate through the threat landscape.
ETL 2013
ETL 2013 is based on a comprehensive information collection of publicly available open source material. Reports of various kinds (i.e. content, context, level of detail, subject areas, etc.) are collected over the entire reporting period. These reports are parsed to identify relevant content, such as threats, threat agents and trends.
The work on the ENISA Threat Landscape has been performed as part of the ENISA Work Programme 2013 under the Work Stream “Evolving risk environment & opportunities”.
ETL 2012
The ENISA Threat Landscape 2012 provides an overview of threats, together with current and emerging trends. It is based on publicly available data and provides an independent view on observed threats, threat agents and threat trends. Over 140 recent reports from security industry, networks of excellence, standardisation bodies and other independent institutes have been analysed.