{"id":54834,"date":"2020-10-23T03:00:07","date_gmt":"2020-10-23T01:00:07","guid":{"rendered":"https:\/\/www.cde.ual.es\/?p=54834"},"modified":"2021-11-17T10:13:58","modified_gmt":"2021-11-17T09:13:58","slug":"enisa-cyber-attacks-becoming-more-sophisticated","status":"publish","type":"post","link":"https:\/\/www.cde.ual.es\/en\/enisa-cyber-attacks-becoming-more-sophisticated\/","title":{"rendered":"ENISA: Cyber Attacks Becoming More Sophisticated"},"content":{"rendered":"<p class=\"content-summary\" data-diazo=\"summary\"><em><strong>Threat landscape maps Malware standing strong as #1 Cyber Threat in the EU, with an increase in Phishing, Identity Theft, Ransomware; Monetisation holding its place as cyber criminals\u2019 top motivation; and the COVID-19 environment fuelling attacks on homes, businesses, governments and critical infrastructure.<\/strong><\/em><\/p>\n<p><a href=\"https:\/\/www.cde.ual.es\/wp-content\/uploads\/2020\/05\/cyber-security-3400657_1920.jpg\"><img decoding=\"async\" class=\" wp-image-43324 aligncenter\" src=\"https:\/\/www.cde.ual.es\/wp-content\/uploads\/2020\/05\/cyber-security-3400657_1920-1024x614.jpg\" alt=\"cyber-security-EU-ENISA\" width=\"500\" height=\"300\" srcset=\"https:\/\/www.cde.ual.es\/wp-content\/uploads\/2020\/05\/cyber-security-3400657_1920-1024x614.jpg 1024w, https:\/\/www.cde.ual.es\/wp-content\/uploads\/2020\/05\/cyber-security-3400657_1920-300x180.jpg 300w, https:\/\/www.cde.ual.es\/wp-content\/uploads\/2020\/05\/cyber-security-3400657_1920-768x461.jpg 768w, https:\/\/www.cde.ual.es\/wp-content\/uploads\/2020\/05\/cyber-security-3400657_1920-1536x922.jpg 1536w, https:\/\/www.cde.ual.es\/wp-content\/uploads\/2020\/05\/cyber-security-3400657_1920.jpg 1920w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<p>Today, the European Union Agency for Cybersecurity (ENISA), with the support of the European Commission, EU Member States and the CTI Stakeholders Group, has published the 8th annual\u00a0ENISA Threat Landscape (ETL) 2020\u00a0report, identifying and evaluating the top cyber threats for the period January 2019-April 2020.<\/p>\n<p>This year\u2019s publication is divided into 22 different reports, available in pdf form and ebook form. The combined report lists the major change from the 2018 threat landscape as the COVID-19-led transformation of the digital environment. During the pandemic, cyber criminals have been seen advancing their capabilities, adapting quickly and targeting relevant victim groups more effectively.<\/p>\n<p>The top 15 cyber threat reports are of a technical nature, and include findings, major incidents, statistics and more. The threat reports are the following:<\/p>\n<ol>\n<li>Malware<\/li>\n<li>Web-based Attacks<\/li>\n<li>Phishing<\/li>\n<li>Web Application Attacks<\/li>\n<li>SPAM<\/li>\n<li>Distributed Denial of Service (DDoS)<\/li>\n<li>Identity Theft<\/li>\n<li>Data Breach<\/li>\n<li>Insider Threat<\/li>\n<li>Botnets<\/li>\n<li>Physical Manipulation, Damage, Theft and Loss<\/li>\n<li>Information Leakage<\/li>\n<li>Ransomware<\/li>\n<li>Cyber Espionage<\/li>\n<li>Cryptojacking<\/li>\n<\/ol>\n<h3>Summary of trends in the threat landscape<\/h3>\n<ul>\n<li>There will be a new norm during and after the COVID-19 pandemic that is even more dependent on a secure and reliable cyberspace.<\/li>\n<li>The number of fake online shopping websites and fraudulent online merchants reportedly has increased during the COVID-19 pandemic. From copycats of popular brands websites to fraudulent services that never deliver the merchandise, the coronavirus revealed weaknesses in the trust model used in online shopping.<\/li>\n<li>The number of cyberbullying and sextortion incidents also increased with the COVID-19 pandemic. The adoption of mobile technology and subscription to digital platforms makes younger generations more vulnerable to these types of threats.<\/li>\n<li>Malicious actors are using social media platforms to increase efficiency in targeted attacks.<\/li>\n<li>Financial reward is still the main motivation behind most cyber attacks.<\/li>\n<li>Finely targeted and persistent attacks on high-value data, such as intellectual property and state secrets, are being meticulously planned and executed often by state-sponsored actors.<\/li>\n<li>Massively distributed attacks with a short duration and wide impact are used with multiple aims such as credential theft.<\/li>\n<li>The number of phishing victims in the EU continues to grow with malicious actors using the COVID-19 theme to lure them in. COVID-19-themed attacks include messages carrying malicious file attachments and messages containing malicious links that redirect users to phishing sites or malware downloads.<\/li>\n<li>Business Email Compromise (BEC) and COVID-19-themed attacks are being used in cyber-scams resulting in the loss of millions of euros for EU citizens and corporations. European Small and Medium Enterprises (SMEs) have also fallen victim of these threats in a time when many are going through severe financial difficulties due to the loss of revenue.<\/li>\n<li>Ransomware remains widespread with costly consequences to many EU organisations.<\/li>\n<li>Many cybersecurity incidents still go unnoticed or take a long time to be detected.<\/li>\n<li>The number of potential vulnerabilities in a virtual or physical environment continues to expand as a new phase of digital transformation arises (as technology will keep diversifying).<\/li>\n<li>With more security automation, organisations will invest more in preparedness using CTI as their main capability.<\/li>\n<\/ul>\n<h3>More information<\/h3>\n<p><a href=\"https:\/\/www.enisa.europa.eu\/news\/enisa-news\/enisa-threat-landscape-2020\">Full news<\/a><\/p>\n<p><a href=\"https:\/\/www.cde.ual.es\/ficha\/enisa-programming-document-2020-2022\/\">ENISA Programming Document 2020-2022<\/a><\/p>\n<p><a href=\"https:\/\/www.cde.ual.es\/ficha\/eu-funding-for-cybersecurity-capacity-building\/\">EU funding for cybersecurity capacity building<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Threat landscape maps Malware standing strong as #1 Cyber Threat in the EU, with an increase in Phishing, Identity Theft, Ransomware; Monetisation holding its place as cyber criminals\u2019 top motivation; and the COVID-19 environment fuelling attacks on homes, businesses, governments and critical infrastructure. Today, the European Union Agency for Cybersecurity (ENISA), with the support of [&hellip;]<\/p>\n","protected":false},"author":101012,"featured_media":43325,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[4076,4075,346],"tags":[548,1482],"class_list":{"0":"post-54834","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cybersec","8":"category-defence-security","9":"category-eu-news","10":"tag-cybersecurity","11":"tag-enisa","12":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>ENISA: Cyber Attacks Becoming More Sophisticated | CDE Almer\u00eda - Centro de Documentaci\u00f3n Europea - Universidad de Almer\u00eda<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cde.ual.es\/en\/enisa-cyber-attacks-becoming-more-sophisticated\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ENISA: Cyber Attacks Becoming More Sophisticated | CDE Almer\u00eda - Centro de Documentaci\u00f3n Europea - Universidad de Almer\u00eda\" \/>\n<meta property=\"og:description\" content=\"Threat landscape maps Malware standing strong as #1 Cyber Threat in the EU, with an increase in Phishing, Identity Theft, Ransomware; Monetisation holding its place as cyber criminals\u2019 top motivation; and the COVID-19 environment fuelling attacks on homes, businesses, governments and critical infrastructure. Today, the European Union Agency for Cybersecurity (ENISA), with the support of [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cde.ual.es\/en\/enisa-cyber-attacks-becoming-more-sophisticated\/\" \/>\n<meta property=\"og:site_name\" content=\"CDE Almer\u00eda - Centro de Documentaci\u00f3n Europea - Universidad de Almer\u00eda\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/cdeuniversidadalmeria\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-23T01:00:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-11-17T09:13:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cde.ual.es\/wp-content\/uploads\/2020\/05\/cyber-security-3400657_1920.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1152\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"BECACDE1\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cdeualmeria\" \/>\n<meta name=\"twitter:site\" content=\"@cdeualmeria\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"BECACDE1\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/en\\\/enisa-cyber-attacks-becoming-more-sophisticated\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/en\\\/enisa-cyber-attacks-becoming-more-sophisticated\\\/\"},\"author\":{\"name\":\"BECACDE1\",\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/#\\\/schema\\\/person\\\/bf2f837cf3353e2161fe1087adbd728f\"},\"headline\":\"ENISA: Cyber Attacks Becoming More Sophisticated\",\"datePublished\":\"2020-10-23T01:00:07+00:00\",\"dateModified\":\"2021-11-17T09:13:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/en\\\/enisa-cyber-attacks-becoming-more-sophisticated\\\/\"},\"wordCount\":562,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/en\\\/enisa-cyber-attacks-becoming-more-sophisticated\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cde.ual.es\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/cyber-security-3400657_1920.jpg\",\"keywords\":[\"cybersecurity\",\"ENISA\"],\"articleSection\":[\"Cybersecurity\",\"Defence &amp; Security\",\"EU News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.cde.ual.es\\\/en\\\/enisa-cyber-attacks-becoming-more-sophisticated\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/en\\\/enisa-cyber-attacks-becoming-more-sophisticated\\\/\",\"url\":\"https:\\\/\\\/www.cde.ual.es\\\/en\\\/enisa-cyber-attacks-becoming-more-sophisticated\\\/\",\"name\":\"ENISA: Cyber Attacks Becoming More Sophisticated | CDE Almer\u00eda - Centro de Documentaci\u00f3n Europea - Universidad de Almer\u00eda\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/en\\\/enisa-cyber-attacks-becoming-more-sophisticated\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/en\\\/enisa-cyber-attacks-becoming-more-sophisticated\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cde.ual.es\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/cyber-security-3400657_1920.jpg\",\"datePublished\":\"2020-10-23T01:00:07+00:00\",\"dateModified\":\"2021-11-17T09:13:58+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/en\\\/enisa-cyber-attacks-becoming-more-sophisticated\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cde.ual.es\\\/en\\\/enisa-cyber-attacks-becoming-more-sophisticated\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/en\\\/enisa-cyber-attacks-becoming-more-sophisticated\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cde.ual.es\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/cyber-security-3400657_1920.jpg\",\"contentUrl\":\"https:\\\/\\\/www.cde.ual.es\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/cyber-security-3400657_1920.jpg\",\"width\":1920,\"height\":1152,\"caption\":\"cyber-security-EU-ENISA\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/en\\\/enisa-cyber-attacks-becoming-more-sophisticated\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\\\/\\\/www.cde.ual.es\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"EU News\",\"item\":\"https:\\\/\\\/www.cde.ual.es\\\/en\\\/category\\\/eu-news\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Defence &amp; Security\",\"item\":\"https:\\\/\\\/www.cde.ual.es\\\/en\\\/category\\\/eu-news\\\/defence-security\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/www.cde.ual.es\\\/en\\\/category\\\/eu-news\\\/defence-security\\\/cybersec\\\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"ENISA: Cyber Attacks Becoming More Sophisticated\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/#website\",\"url\":\"https:\\\/\\\/www.cde.ual.es\\\/\",\"name\":\"CDE Almer\u00eda - Centro de Documentaci\u00f3n Europea - Universidad de Almer\u00eda\",\"description\":\"Centro de Documentaci\u00f3n Europea de la Universidad de Almer\u00eda\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/#organization\"},\"alternateName\":\"CDE Almer\u00eda\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cde.ual.es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/#organization\",\"name\":\"Centro de Documentaci\u00f3n Europea de Almer\u00eda\",\"url\":\"https:\\\/\\\/www.cde.ual.es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.cde.ual.es\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/cde-logo-3.png\",\"contentUrl\":\"https:\\\/\\\/www.cde.ual.es\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/cde-logo-3.png\",\"width\":1400,\"height\":300,\"caption\":\"Centro de Documentaci\u00f3n Europea de Almer\u00eda\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/cdeuniversidadalmeria\\\/\",\"https:\\\/\\\/x.com\\\/cdeualmeria\",\"https:\\\/\\\/www.tiktok.com\\\/@cdealmeria\",\"https:\\\/\\\/www.instagram.com\\\/cdealmeria\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/cde-almera-812b26a9\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/#\\\/schema\\\/person\\\/bf2f837cf3353e2161fe1087adbd728f\",\"name\":\"BECACDE1\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/16a4c1e422b5dec818ee13eab3353b19db9cfd278cc10f9b0e1188a37671d9d4?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/16a4c1e422b5dec818ee13eab3353b19db9cfd278cc10f9b0e1188a37671d9d4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/16a4c1e422b5dec818ee13eab3353b19db9cfd278cc10f9b0e1188a37671d9d4?s=96&d=mm&r=g\",\"caption\":\"BECACDE1\"},\"sameAs\":[\"http:\\\/\\\/www.cdealmeria.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ENISA: Cyber Attacks Becoming More Sophisticated | CDE Almer\u00eda - Centro de Documentaci\u00f3n Europea - Universidad de Almer\u00eda","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cde.ual.es\/en\/enisa-cyber-attacks-becoming-more-sophisticated\/","og_locale":"en_US","og_type":"article","og_title":"ENISA: Cyber Attacks Becoming More Sophisticated | CDE Almer\u00eda - Centro de Documentaci\u00f3n Europea - Universidad de Almer\u00eda","og_description":"Threat landscape maps Malware standing strong as #1 Cyber Threat in the EU, with an increase in Phishing, Identity Theft, Ransomware; Monetisation holding its place as cyber criminals\u2019 top motivation; and the COVID-19 environment fuelling attacks on homes, businesses, governments and critical infrastructure. Today, the European Union Agency for Cybersecurity (ENISA), with the support of [&hellip;]","og_url":"https:\/\/www.cde.ual.es\/en\/enisa-cyber-attacks-becoming-more-sophisticated\/","og_site_name":"CDE Almer\u00eda - Centro de Documentaci\u00f3n Europea - Universidad de Almer\u00eda","article_publisher":"https:\/\/www.facebook.com\/cdeuniversidadalmeria\/","article_published_time":"2020-10-23T01:00:07+00:00","article_modified_time":"2021-11-17T09:13:58+00:00","og_image":[{"width":1920,"height":1152,"url":"https:\/\/www.cde.ual.es\/wp-content\/uploads\/2020\/05\/cyber-security-3400657_1920.jpg","type":"image\/jpeg"}],"author":"BECACDE1","twitter_card":"summary_large_image","twitter_creator":"@cdeualmeria","twitter_site":"@cdeualmeria","twitter_misc":{"Written by":"BECACDE1","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cde.ual.es\/en\/enisa-cyber-attacks-becoming-more-sophisticated\/#article","isPartOf":{"@id":"https:\/\/www.cde.ual.es\/en\/enisa-cyber-attacks-becoming-more-sophisticated\/"},"author":{"name":"BECACDE1","@id":"https:\/\/www.cde.ual.es\/#\/schema\/person\/bf2f837cf3353e2161fe1087adbd728f"},"headline":"ENISA: Cyber Attacks Becoming More Sophisticated","datePublished":"2020-10-23T01:00:07+00:00","dateModified":"2021-11-17T09:13:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cde.ual.es\/en\/enisa-cyber-attacks-becoming-more-sophisticated\/"},"wordCount":562,"commentCount":0,"publisher":{"@id":"https:\/\/www.cde.ual.es\/#organization"},"image":{"@id":"https:\/\/www.cde.ual.es\/en\/enisa-cyber-attacks-becoming-more-sophisticated\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cde.ual.es\/wp-content\/uploads\/2020\/05\/cyber-security-3400657_1920.jpg","keywords":["cybersecurity","ENISA"],"articleSection":["Cybersecurity","Defence &amp; Security","EU News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.cde.ual.es\/en\/enisa-cyber-attacks-becoming-more-sophisticated\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.cde.ual.es\/en\/enisa-cyber-attacks-becoming-more-sophisticated\/","url":"https:\/\/www.cde.ual.es\/en\/enisa-cyber-attacks-becoming-more-sophisticated\/","name":"ENISA: Cyber Attacks Becoming More Sophisticated | CDE Almer\u00eda - Centro de Documentaci\u00f3n Europea - Universidad de Almer\u00eda","isPartOf":{"@id":"https:\/\/www.cde.ual.es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cde.ual.es\/en\/enisa-cyber-attacks-becoming-more-sophisticated\/#primaryimage"},"image":{"@id":"https:\/\/www.cde.ual.es\/en\/enisa-cyber-attacks-becoming-more-sophisticated\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cde.ual.es\/wp-content\/uploads\/2020\/05\/cyber-security-3400657_1920.jpg","datePublished":"2020-10-23T01:00:07+00:00","dateModified":"2021-11-17T09:13:58+00:00","breadcrumb":{"@id":"https:\/\/www.cde.ual.es\/en\/enisa-cyber-attacks-becoming-more-sophisticated\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cde.ual.es\/en\/enisa-cyber-attacks-becoming-more-sophisticated\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cde.ual.es\/en\/enisa-cyber-attacks-becoming-more-sophisticated\/#primaryimage","url":"https:\/\/www.cde.ual.es\/wp-content\/uploads\/2020\/05\/cyber-security-3400657_1920.jpg","contentUrl":"https:\/\/www.cde.ual.es\/wp-content\/uploads\/2020\/05\/cyber-security-3400657_1920.jpg","width":1920,"height":1152,"caption":"cyber-security-EU-ENISA"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cde.ual.es\/en\/enisa-cyber-attacks-becoming-more-sophisticated\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/www.cde.ual.es\/en\/"},{"@type":"ListItem","position":2,"name":"EU News","item":"https:\/\/www.cde.ual.es\/en\/category\/eu-news\/"},{"@type":"ListItem","position":3,"name":"Defence &amp; Security","item":"https:\/\/www.cde.ual.es\/en\/category\/eu-news\/defence-security\/"},{"@type":"ListItem","position":4,"name":"Cybersecurity","item":"https:\/\/www.cde.ual.es\/en\/category\/eu-news\/defence-security\/cybersec\/"},{"@type":"ListItem","position":5,"name":"ENISA: Cyber Attacks Becoming More Sophisticated"}]},{"@type":"WebSite","@id":"https:\/\/www.cde.ual.es\/#website","url":"https:\/\/www.cde.ual.es\/","name":"CDE Almer\u00eda - Centro de Documentaci\u00f3n Europea - Universidad de Almer\u00eda","description":"Centro de Documentaci\u00f3n Europea de la Universidad de Almer\u00eda","publisher":{"@id":"https:\/\/www.cde.ual.es\/#organization"},"alternateName":"CDE Almer\u00eda","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cde.ual.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cde.ual.es\/#organization","name":"Centro de Documentaci\u00f3n Europea de Almer\u00eda","url":"https:\/\/www.cde.ual.es\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cde.ual.es\/#\/schema\/logo\/image\/","url":"https:\/\/www.cde.ual.es\/wp-content\/uploads\/2025\/07\/cde-logo-3.png","contentUrl":"https:\/\/www.cde.ual.es\/wp-content\/uploads\/2025\/07\/cde-logo-3.png","width":1400,"height":300,"caption":"Centro de Documentaci\u00f3n Europea de Almer\u00eda"},"image":{"@id":"https:\/\/www.cde.ual.es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/cdeuniversidadalmeria\/","https:\/\/x.com\/cdeualmeria","https:\/\/www.tiktok.com\/@cdealmeria","https:\/\/www.instagram.com\/cdealmeria\/","https:\/\/www.linkedin.com\/in\/cde-almera-812b26a9\/"]},{"@type":"Person","@id":"https:\/\/www.cde.ual.es\/#\/schema\/person\/bf2f837cf3353e2161fe1087adbd728f","name":"BECACDE1","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/16a4c1e422b5dec818ee13eab3353b19db9cfd278cc10f9b0e1188a37671d9d4?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/16a4c1e422b5dec818ee13eab3353b19db9cfd278cc10f9b0e1188a37671d9d4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/16a4c1e422b5dec818ee13eab3353b19db9cfd278cc10f9b0e1188a37671d9d4?s=96&d=mm&r=g","caption":"BECACDE1"},"sameAs":["http:\/\/www.cdealmeria.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.cde.ual.es\/en\/wp-json\/wp\/v2\/posts\/54834","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cde.ual.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cde.ual.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cde.ual.es\/en\/wp-json\/wp\/v2\/users\/101012"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cde.ual.es\/en\/wp-json\/wp\/v2\/comments?post=54834"}],"version-history":[{"count":0,"href":"https:\/\/www.cde.ual.es\/en\/wp-json\/wp\/v2\/posts\/54834\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cde.ual.es\/en\/wp-json\/wp\/v2\/media\/43325"}],"wp:attachment":[{"href":"https:\/\/www.cde.ual.es\/en\/wp-json\/wp\/v2\/media?parent=54834"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cde.ual.es\/en\/wp-json\/wp\/v2\/categories?post=54834"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cde.ual.es\/en\/wp-json\/wp\/v2\/tags?post=54834"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}