In 2018, the cyber threat landscape changed significantly. The most important threat agent groups, namely cyber-criminals and state-sponsored actors have further advanced their motives and tactics. Monetisation motives contributed to the…
Interim report: Top Cyber Threats - smarter targeted attacks, mobile threats, and social media identity thefts by cyber-criminals using Cloud services.
ENISA today presented its list of top cyber threats, as a first “taste” of its interim Threat Landscape 2013 report. The study analyses 50 reports, and identifies an increase in threats to: infrastructure through targeted attacks; mobile devices;…
From Cyber to Outer Space: A Guide to Securing Commercial Satellite Operations
The European Union Agency for Cybersecurity (ENISA) explores the cybersecurity threat landscape of space to strengthen the resilience of commercial satellites.
Cyber security according to Winnie the Pooh: new report by EU Agency ENISA on ‘digital trap’ honeypots to detect cyber-attacks creates a buzz
The EU ‘cyber security’ Agency ENISA is launching an in-depth study on 30 different ‘digital traps’ or honeypots that can be used by Computer Emergency Response Teams (CERT)s and National/Government CERTs to proactively detect cyber-attacks. The…
ENISA calls for better data sharing and interoperability among “Digital Fire Brigades” to mitigate cyber attacks in new report; “Detect, SHARE, Protect”
The EU Agency ENISA launches its new report “Detect, SHARE, Protection: Improving Threat Data Exchange among CERTs” on how to make data threat exchange easier and better between the “digital fire brigades” (i.e. Computer Emergency Response Teams (…
Understanding the increase in Supply Chain Security Attacks
The European Union Agency for Cybersecurity mapping on emerging supply chain attacks finds 66% of attacks focus on the supplier’s code.
The Netherlands: Advice and measures against DDoS attacks
The National Cyber Security Centre has created two factsheets to assist organisations in their response to Distributed Denial-of-Service ((D)DoS) attacks.
Attacks on ICS-SCADA: How to protect critical infrastructures
ENISA publishes a study on the "Communication network dependencies for ICS-SCADA Systems". The report identifies good practices and recommendations to help the security of ICS-SCADA against cyber threats.
Cyber Europe 2024: Unveiling key insights from the cyber exercise that tested the cybersecurity of EU’s energy sector
The after action report provides an overview of the 2024 edition of the Cyber Europe exercise which was conducted in June and aimed at identifying gaps and increasing cybersecurity preparedeness and resilience.
Pagination