{"id":129841,"date":"2023-02-03T03:00:43","date_gmt":"2023-02-03T02:00:43","guid":{"rendered":"https:\/\/www.cde.ual.es\/?p=129841"},"modified":"2023-02-02T12:00:16","modified_gmt":"2023-02-02T11:00:16","slug":"top-8-cybersecurity-threats-in-2022-and-beyond-in-the-eu","status":"publish","type":"post","link":"https:\/\/www.cde.ual.es\/en\/top-8-cybersecurity-threats-in-2022-and-beyond-in-the-eu\/","title":{"rendered":"Top 8 cybersecurity threats in 2022 and beyond in the EU"},"content":{"rendered":"<p style=\"text-align: justify;\"><strong>The digital transformation has inevitably led to new cybersecurity threats. During the coronavirus pandemic, companies had to adapt to remote working and this created more possibilities for cybercriminals. The war in Ukraine has also affected cybersecurity.<\/strong><\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/www.cde.ual.es\/wp-content\/uploads\/2022\/02\/cibersecurity-scaled.jpg\"><img decoding=\"async\" class=\"size-large wp-image-94681 aligncenter\" src=\"https:\/\/www.cde.ual.es\/wp-content\/uploads\/2022\/02\/cibersecurity-1024x673.jpg\" alt=\"tel\u00e9fono m\u00f3vil con pantalla de desbloqueo\" width=\"1024\" height=\"673\" srcset=\"https:\/\/www.cde.ual.es\/wp-content\/uploads\/2022\/02\/cibersecurity-1024x673.jpg 1024w, https:\/\/www.cde.ual.es\/wp-content\/uploads\/2022\/02\/cibersecurity-300x197.jpg 300w, https:\/\/www.cde.ual.es\/wp-content\/uploads\/2022\/02\/cibersecurity-768x505.jpg 768w, https:\/\/www.cde.ual.es\/wp-content\/uploads\/2022\/02\/cibersecurity-1536x1010.jpg 1536w, https:\/\/www.cde.ual.es\/wp-content\/uploads\/2022\/02\/cibersecurity-2048x1346.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<p style=\"text-align: justify;\">In response to the evolution of cybersecurity threats, Parliament adopted a new EU directive introducing harmonised measures across the EU, including on the protection of essential sectors.<\/p>\n<p style=\"text-align: justify;\"><strong>1. Ransomware: hackers seize control of someone\u2019s data and demand a ransom to restore access<\/strong><\/p>\n<p style=\"text-align: justify;\">In 2022, ransomware attacks continued to be one of the main cyberthreats. They are also getting more complex. According to a survey quoted by Enisa that was conducted at the end of 2021 and in 2022, over half of respondents or their employees had been approached in ransomware attacks.<\/p>\n<p style=\"text-align: justify;\">Data quoted by the EU Agency for Cybersecurity shows that the highest ransomware demand grew from \u20ac13 million in 2019 to \u20ac62 million in 2021 and the average ransom paid doubled from \u20ac71,000 in 2019 to \u20ac150,000 in 2020. It is estimated that in 2021 global ransomware reached \u20ac18 billion worth of damages \u2013 57 times more than in 2015.<\/p>\n<p style=\"text-align: justify;\"><strong>2. Malware: software that harms a system<\/strong><\/p>\n<p style=\"text-align: justify;\">Malware includes viruses, worms, Trojan horses and spyware. After a global decrease in malware linked to the Covid-19 pandemic in 2020 and early 2021, its use increased heavily by the end of 2021, as people started returning to the office.<\/p>\n<p style=\"text-align: justify;\">The rise of malware is also attributed to crypto-jacking (the secret use of a victim\u2019s computer to create cryptocurrency illegally) and Internet-of-Things malware (malware targeting devices connected to the internet such as routers or cameras).<\/p>\n<p style=\"text-align: justify;\">According to Enisa, there were more Internet-of-Things attacks in the first six months of 2022 than in the previous four years.<\/p>\n<p style=\"text-align: justify;\"><strong>3. Social engineering threats: exploiting human error to gain access to information or services<\/strong><\/p>\n<p style=\"text-align: justify;\">Tricking victims into opening malicious documents, files or emails, visiting websites and thus granting unauthorised access to systems or services. The most common attack of this sort is phishing (through email) or smishing (through text messages).<\/p>\n<p style=\"text-align: justify;\">Almost 60% of the breaches in Europe, the Middle East and Africa include a social engineering component, according to research quoted by Enisa.<\/p>\n<p style=\"text-align: justify;\">The top organisations impersonated by phishers were from the financial and technology sectors. Criminals are also increasingly targeting crypto exchanges and cryptocurrency owners.<\/p>\n<p style=\"text-align: justify;\"><strong>4. Threats against data: targeting sources of data to get unauthorised access and disclosure<\/strong><\/p>\n<p style=\"text-align: justify;\">We live in a data-driven economy, producing huge amounts of data that are extremely important for, among others, enterprises and Artificial Intelligence, which makes it a major target for cybercriminals. Threats against data can be mainly classified as data breaches (intentional attacks by a cybercriminal) and data leaks (unintentional releases of data).<\/p>\n<p style=\"text-align: justify;\">Money remains the most common motivation of such attacks. Only in 10% of cases is espionage the motive.<\/p>\n<table style=\"width: 99.9988%; border-collapse: collapse; border-style: double; border-color: #001f7d;\" cellpadding=\"0,5\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><a href=\"https:\/\/www.cde.ual.es\/ficha\/foreign-information-manipulation-interference-fimi-and-cybersecurity-threat-landscape\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"alignleft\" src=\"https:\/\/www.cde.ual.es\/wp-content\/uploads\/2022\/12\/foreign-information-manipulation.png\" alt=\"\" width=\"159\" height=\"225\" \/><\/a><\/p>\n<h4 class=\"entry-title\"><a href=\"https:\/\/www.cde.ual.es\/ficha\/foreign-information-manipulation-interference-fimi-and-cybersecurity-threat-landscape\/\" target=\"_blank\" rel=\"noopener\">Foreign Information Manipulation Interference (FIMI) and Cybersecurity &#8211; Threat Landscape<\/a><\/h4>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"text-align: justify;\"><strong>5. Threats against availability &#8211; Denial of Service: attacks preventing users from accessing data or services<\/strong><\/p>\n<p style=\"text-align: justify;\">These are some of the most critical threats to IT systems. They are increasing in scope and complexity. One common form of attack is to overload the network infrastructure and make a system unavailable.<\/p>\n<p style=\"text-align: justify;\">Denial of Service attacks are increasingly hitting mobile networks and connected devices. They are used a lot in Russia-Ukraine cyberwarfare. Covid-19 related websites, such as those for vaccination have also been targeted.<\/p>\n<table style=\"width: 99.9988%; border-collapse: collapse; border-style: double; border-color: #001f7d;\" cellpadding=\"0,5\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><a href=\"https:\/\/www.cde.ual.es\/en\/cyber-defence-eu-boosts-action-against-cyber-threats\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"alignleft\" src=\"https:\/\/www.cde.ual.es\/wp-content\/uploads\/2022\/11\/Candado-scaled.jpg\" alt=\"\" width=\"159\" height=\"225\" \/><\/a><\/p>\n<h4 class=\"entry-title\"><a href=\"https:\/\/www.cde.ual.es\/en\/cyber-defence-eu-boosts-action-against-cyber-threats\/\" target=\"_blank\" rel=\"noopener\">Cyber Defence: EU boosts action against cyber threats<br \/>\n<\/a><\/h4>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"text-align: justify;\"><strong>6. Threats against availability: threats to the availability of the internet<\/strong><\/p>\n<p style=\"text-align: justify;\">These include physical take-over and destruction of internet infrastructure, as seen in occupied Ukrainian territories since the invasion, as well as the active censoring of news or social media websites.<\/p>\n<p style=\"text-align: justify;\"><strong>7. Disinformation\/misinformation: the spread of misleading information<\/strong><\/p>\n<p style=\"text-align: justify;\">The increasing use of social media platforms and online media has led to a rise in campaigns spreading disinformation (purposefully falsified information) and misinformation (sharing wrong data). The aim is to cause fear and uncertainty.<\/p>\n<p style=\"text-align: justify;\">Russia has used this technology to target perceptions of the war.<\/p>\n<p style=\"text-align: justify;\"><strong>8. Supply-chain attacks: targeting the relationship between organisations and suppliers<\/strong><\/p>\n<p style=\"text-align: justify;\">This is a combination of two attacks &#8211; on the supplier and on the customer. Organisations are becoming more vulnerable to such attacks, because of increasingly complex systems and a multitude of suppliers, which are harder to oversee.<\/p>\n<p style=\"text-align: justify;\"><strong>More information: <a href=\"https:\/\/www.europarl.europa.eu\/news\/es\/headlines\/society\/20220120STO21428\/ciberseguridad-amenanzas-principales-y-emergentes\">European Parliament<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The digital transformation has inevitably led to new cybersecurity threats. During the coronavirus pandemic, companies had to adapt to remote working and this created more possibilities for cybercriminals. The war in Ukraine has also affected cybersecurity. In response to the evolution of cybersecurity threats, Parliament adopted a new EU directive introducing harmonised measures across the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":94682,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[4076,4075,346],"tags":[8446,548,779],"class_list":{"0":"post-129841","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cybersec","8":"category-defence-security","9":"category-eu-news","10":"tag-8-main-threats","11":"tag-cybersecurity","12":"tag-eu-en","13":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Top 8 cybersecurity threats in 2022 and beyond in the EU | CDE Almer\u00eda - Centro de Documentaci\u00f3n Europea - Universidad de Almer\u00eda<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cde.ual.es\/las-ocho-amenazas-mas-frecuentes-a-la-ciberseguridad-en-2022-en-la-ue\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top 8 cybersecurity threats in 2022 and beyond in the EU | CDE Almer\u00eda - Centro de Documentaci\u00f3n Europea - Universidad de Almer\u00eda\" \/>\n<meta property=\"og:description\" content=\"The digital transformation has inevitably led to new cybersecurity threats. During the coronavirus pandemic, companies had to adapt to remote working and this created more possibilities for cybercriminals. The war in Ukraine has also affected cybersecurity. In response to the evolution of cybersecurity threats, Parliament adopted a new EU directive introducing harmonised measures across the [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cde.ual.es\/las-ocho-amenazas-mas-frecuentes-a-la-ciberseguridad-en-2022-en-la-ue\/\" \/>\n<meta property=\"og:site_name\" content=\"CDE Almer\u00eda - Centro de Documentaci\u00f3n Europea - Universidad de Almer\u00eda\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/cdeuniversidadalmeria\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-03T02:00:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cde.ual.es\/wp-content\/uploads\/2022\/02\/cibersecurity-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"AdminCDE\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cdeualmeria\" \/>\n<meta name=\"twitter:site\" content=\"@cdeualmeria\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"AdminCDE\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/las-ocho-amenazas-mas-frecuentes-a-la-ciberseguridad-en-2022-en-la-ue\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/las-ocho-amenazas-mas-frecuentes-a-la-ciberseguridad-en-2022-en-la-ue\\\/\"},\"author\":{\"name\":\"AdminCDE\",\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/#\\\/schema\\\/person\\\/224ef08c8bcc005f319d2713ce37ee5f\"},\"headline\":\"Top 8 cybersecurity threats in 2022 and beyond in the EU\",\"datePublished\":\"2023-02-03T02:00:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/las-ocho-amenazas-mas-frecuentes-a-la-ciberseguridad-en-2022-en-la-ue\\\/\"},\"wordCount\":698,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/las-ocho-amenazas-mas-frecuentes-a-la-ciberseguridad-en-2022-en-la-ue\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cde.ual.es\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/cibersecurity-scaled.jpg\",\"keywords\":[\"8 main threats\",\"cybersecurity\",\"EU\"],\"articleSection\":[\"Cybersecurity\",\"Defence &amp; Security\",\"EU News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.cde.ual.es\\\/las-ocho-amenazas-mas-frecuentes-a-la-ciberseguridad-en-2022-en-la-ue\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/las-ocho-amenazas-mas-frecuentes-a-la-ciberseguridad-en-2022-en-la-ue\\\/\",\"url\":\"https:\\\/\\\/www.cde.ual.es\\\/las-ocho-amenazas-mas-frecuentes-a-la-ciberseguridad-en-2022-en-la-ue\\\/\",\"name\":\"Top 8 cybersecurity threats in 2022 and beyond in the EU | CDE Almer\u00eda - Centro de Documentaci\u00f3n Europea - Universidad de Almer\u00eda\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/las-ocho-amenazas-mas-frecuentes-a-la-ciberseguridad-en-2022-en-la-ue\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/las-ocho-amenazas-mas-frecuentes-a-la-ciberseguridad-en-2022-en-la-ue\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cde.ual.es\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/cibersecurity-scaled.jpg\",\"datePublished\":\"2023-02-03T02:00:43+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/las-ocho-amenazas-mas-frecuentes-a-la-ciberseguridad-en-2022-en-la-ue\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cde.ual.es\\\/las-ocho-amenazas-mas-frecuentes-a-la-ciberseguridad-en-2022-en-la-ue\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/las-ocho-amenazas-mas-frecuentes-a-la-ciberseguridad-en-2022-en-la-ue\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cde.ual.es\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/cibersecurity-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/www.cde.ual.es\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/cibersecurity-scaled.jpg\",\"width\":2560,\"height\":1683,\"caption\":\"tel\u00e9fono m\u00f3vil con pantalla de desbloqueo\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/las-ocho-amenazas-mas-frecuentes-a-la-ciberseguridad-en-2022-en-la-ue\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\\\/\\\/www.cde.ual.es\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Noticias UE\",\"item\":\"https:\\\/\\\/www.cde.ual.es\\\/category\\\/noticias-ue\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Defensa y Seguridad\",\"item\":\"https:\\\/\\\/www.cde.ual.es\\\/category\\\/noticias-ue\\\/defensa-seguridad\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/www.cde.ual.es\\\/en\\\/category\\\/eu-news\\\/defence-security\\\/cybersec\\\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Top 8 cybersecurity threats in 2022 and beyond in the EU\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/#website\",\"url\":\"https:\\\/\\\/www.cde.ual.es\\\/\",\"name\":\"CDE Almer\u00eda - Centro de Documentaci\u00f3n Europea - Universidad de Almer\u00eda\",\"description\":\"Centro de Documentaci\u00f3n Europea de la Universidad de Almer\u00eda\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/#organization\"},\"alternateName\":\"CDE Almer\u00eda\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cde.ual.es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/#organization\",\"name\":\"Centro de Documentaci\u00f3n Europea de Almer\u00eda\",\"url\":\"https:\\\/\\\/www.cde.ual.es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.cde.ual.es\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/cde-logo-3.png\",\"contentUrl\":\"https:\\\/\\\/www.cde.ual.es\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/cde-logo-3.png\",\"width\":1400,\"height\":300,\"caption\":\"Centro de Documentaci\u00f3n Europea de Almer\u00eda\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/cdeuniversidadalmeria\\\/\",\"https:\\\/\\\/x.com\\\/cdeualmeria\",\"https:\\\/\\\/www.tiktok.com\\\/@cdealmeria\",\"https:\\\/\\\/www.instagram.com\\\/cdealmeria\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/cde-almera-812b26a9\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/#\\\/schema\\\/person\\\/224ef08c8bcc005f319d2713ce37ee5f\",\"name\":\"AdminCDE\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a72d038d371f995cd13706fac32274b7952a52e8fb0a84b5f80c85426f2a98a8?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a72d038d371f995cd13706fac32274b7952a52e8fb0a84b5f80c85426f2a98a8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a72d038d371f995cd13706fac32274b7952a52e8fb0a84b5f80c85426f2a98a8?s=96&d=mm&r=g\",\"caption\":\"AdminCDE\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Top 8 cybersecurity threats in 2022 and beyond in the EU | CDE Almer\u00eda - Centro de Documentaci\u00f3n Europea - Universidad de Almer\u00eda","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cde.ual.es\/las-ocho-amenazas-mas-frecuentes-a-la-ciberseguridad-en-2022-en-la-ue\/","og_locale":"en_US","og_type":"article","og_title":"Top 8 cybersecurity threats in 2022 and beyond in the EU | CDE Almer\u00eda - Centro de Documentaci\u00f3n Europea - Universidad de Almer\u00eda","og_description":"The digital transformation has inevitably led to new cybersecurity threats. During the coronavirus pandemic, companies had to adapt to remote working and this created more possibilities for cybercriminals. The war in Ukraine has also affected cybersecurity. In response to the evolution of cybersecurity threats, Parliament adopted a new EU directive introducing harmonised measures across the [&hellip;]","og_url":"https:\/\/www.cde.ual.es\/las-ocho-amenazas-mas-frecuentes-a-la-ciberseguridad-en-2022-en-la-ue\/","og_site_name":"CDE Almer\u00eda - Centro de Documentaci\u00f3n Europea - Universidad de Almer\u00eda","article_publisher":"https:\/\/www.facebook.com\/cdeuniversidadalmeria\/","article_published_time":"2023-02-03T02:00:43+00:00","og_image":[{"width":2560,"height":1683,"url":"https:\/\/www.cde.ual.es\/wp-content\/uploads\/2022\/02\/cibersecurity-scaled.jpg","type":"image\/jpeg"}],"author":"AdminCDE","twitter_card":"summary_large_image","twitter_creator":"@cdeualmeria","twitter_site":"@cdeualmeria","twitter_misc":{"Written by":"AdminCDE","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cde.ual.es\/las-ocho-amenazas-mas-frecuentes-a-la-ciberseguridad-en-2022-en-la-ue\/#article","isPartOf":{"@id":"https:\/\/www.cde.ual.es\/las-ocho-amenazas-mas-frecuentes-a-la-ciberseguridad-en-2022-en-la-ue\/"},"author":{"name":"AdminCDE","@id":"https:\/\/www.cde.ual.es\/#\/schema\/person\/224ef08c8bcc005f319d2713ce37ee5f"},"headline":"Top 8 cybersecurity threats in 2022 and beyond in the EU","datePublished":"2023-02-03T02:00:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cde.ual.es\/las-ocho-amenazas-mas-frecuentes-a-la-ciberseguridad-en-2022-en-la-ue\/"},"wordCount":698,"commentCount":0,"publisher":{"@id":"https:\/\/www.cde.ual.es\/#organization"},"image":{"@id":"https:\/\/www.cde.ual.es\/las-ocho-amenazas-mas-frecuentes-a-la-ciberseguridad-en-2022-en-la-ue\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cde.ual.es\/wp-content\/uploads\/2022\/02\/cibersecurity-scaled.jpg","keywords":["8 main threats","cybersecurity","EU"],"articleSection":["Cybersecurity","Defence &amp; Security","EU News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.cde.ual.es\/las-ocho-amenazas-mas-frecuentes-a-la-ciberseguridad-en-2022-en-la-ue\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.cde.ual.es\/las-ocho-amenazas-mas-frecuentes-a-la-ciberseguridad-en-2022-en-la-ue\/","url":"https:\/\/www.cde.ual.es\/las-ocho-amenazas-mas-frecuentes-a-la-ciberseguridad-en-2022-en-la-ue\/","name":"Top 8 cybersecurity threats in 2022 and beyond in the EU | CDE Almer\u00eda - Centro de Documentaci\u00f3n Europea - Universidad de Almer\u00eda","isPartOf":{"@id":"https:\/\/www.cde.ual.es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cde.ual.es\/las-ocho-amenazas-mas-frecuentes-a-la-ciberseguridad-en-2022-en-la-ue\/#primaryimage"},"image":{"@id":"https:\/\/www.cde.ual.es\/las-ocho-amenazas-mas-frecuentes-a-la-ciberseguridad-en-2022-en-la-ue\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cde.ual.es\/wp-content\/uploads\/2022\/02\/cibersecurity-scaled.jpg","datePublished":"2023-02-03T02:00:43+00:00","breadcrumb":{"@id":"https:\/\/www.cde.ual.es\/las-ocho-amenazas-mas-frecuentes-a-la-ciberseguridad-en-2022-en-la-ue\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cde.ual.es\/las-ocho-amenazas-mas-frecuentes-a-la-ciberseguridad-en-2022-en-la-ue\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cde.ual.es\/las-ocho-amenazas-mas-frecuentes-a-la-ciberseguridad-en-2022-en-la-ue\/#primaryimage","url":"https:\/\/www.cde.ual.es\/wp-content\/uploads\/2022\/02\/cibersecurity-scaled.jpg","contentUrl":"https:\/\/www.cde.ual.es\/wp-content\/uploads\/2022\/02\/cibersecurity-scaled.jpg","width":2560,"height":1683,"caption":"tel\u00e9fono m\u00f3vil con pantalla de desbloqueo"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cde.ual.es\/las-ocho-amenazas-mas-frecuentes-a-la-ciberseguridad-en-2022-en-la-ue\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/www.cde.ual.es\/en\/"},{"@type":"ListItem","position":2,"name":"Noticias UE","item":"https:\/\/www.cde.ual.es\/category\/noticias-ue\/"},{"@type":"ListItem","position":3,"name":"Defensa y Seguridad","item":"https:\/\/www.cde.ual.es\/category\/noticias-ue\/defensa-seguridad\/"},{"@type":"ListItem","position":4,"name":"Cybersecurity","item":"https:\/\/www.cde.ual.es\/en\/category\/eu-news\/defence-security\/cybersec\/"},{"@type":"ListItem","position":5,"name":"Top 8 cybersecurity threats in 2022 and beyond in the EU"}]},{"@type":"WebSite","@id":"https:\/\/www.cde.ual.es\/#website","url":"https:\/\/www.cde.ual.es\/","name":"CDE Almer\u00eda - Centro de Documentaci\u00f3n Europea - Universidad de Almer\u00eda","description":"Centro de Documentaci\u00f3n Europea de la Universidad de Almer\u00eda","publisher":{"@id":"https:\/\/www.cde.ual.es\/#organization"},"alternateName":"CDE Almer\u00eda","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cde.ual.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cde.ual.es\/#organization","name":"Centro de Documentaci\u00f3n Europea de Almer\u00eda","url":"https:\/\/www.cde.ual.es\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cde.ual.es\/#\/schema\/logo\/image\/","url":"https:\/\/www.cde.ual.es\/wp-content\/uploads\/2025\/07\/cde-logo-3.png","contentUrl":"https:\/\/www.cde.ual.es\/wp-content\/uploads\/2025\/07\/cde-logo-3.png","width":1400,"height":300,"caption":"Centro de Documentaci\u00f3n Europea de Almer\u00eda"},"image":{"@id":"https:\/\/www.cde.ual.es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/cdeuniversidadalmeria\/","https:\/\/x.com\/cdeualmeria","https:\/\/www.tiktok.com\/@cdealmeria","https:\/\/www.instagram.com\/cdealmeria\/","https:\/\/www.linkedin.com\/in\/cde-almera-812b26a9\/"]},{"@type":"Person","@id":"https:\/\/www.cde.ual.es\/#\/schema\/person\/224ef08c8bcc005f319d2713ce37ee5f","name":"AdminCDE","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/a72d038d371f995cd13706fac32274b7952a52e8fb0a84b5f80c85426f2a98a8?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a72d038d371f995cd13706fac32274b7952a52e8fb0a84b5f80c85426f2a98a8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a72d038d371f995cd13706fac32274b7952a52e8fb0a84b5f80c85426f2a98a8?s=96&d=mm&r=g","caption":"AdminCDE"}}]}},"_links":{"self":[{"href":"https:\/\/www.cde.ual.es\/en\/wp-json\/wp\/v2\/posts\/129841","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cde.ual.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cde.ual.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cde.ual.es\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cde.ual.es\/en\/wp-json\/wp\/v2\/comments?post=129841"}],"version-history":[{"count":1,"href":"https:\/\/www.cde.ual.es\/en\/wp-json\/wp\/v2\/posts\/129841\/revisions"}],"predecessor-version":[{"id":129842,"href":"https:\/\/www.cde.ual.es\/en\/wp-json\/wp\/v2\/posts\/129841\/revisions\/129842"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cde.ual.es\/en\/wp-json\/wp\/v2\/media\/94682"}],"wp:attachment":[{"href":"https:\/\/www.cde.ual.es\/en\/wp-json\/wp\/v2\/media?parent=129841"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cde.ual.es\/en\/wp-json\/wp\/v2\/categories?post=129841"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cde.ual.es\/en\/wp-json\/wp\/v2\/tags?post=129841"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}