{"id":84385,"date":"2021-11-03T03:00:22","date_gmt":"2021-11-03T02:00:22","guid":{"rendered":"https:\/\/www.cde.ual.es\/?p=84385"},"modified":"2021-11-02T14:18:28","modified_gmt":"2021-11-02T13:18:28","slug":"the-cybersecurity-threat-landscape","status":"publish","type":"post","link":"https:\/\/www.cde.ual.es\/en\/the-cybersecurity-threat-landscape\/","title":{"rendered":"The cybersecurity threat landscape"},"content":{"rendered":"<p>The cybersecurity threat landscape has grown in terms of sophistication of attacks, complexity and impact.\u00a0<strong>Such a trend is spurred by an ever-growing online presence<\/strong>, the transitioning of traditional infrastructures to online solutions, advanced interconnectivity and the exploitation of new features of emerging technologies.<\/p>\n<p><a href=\"https:\/\/www.cde.ual.es\/wp-content\/uploads\/2021\/11\/ciberseguridad.jpg\"><img decoding=\"async\" class=\" wp-image-84386 aligncenter\" src=\"https:\/\/www.cde.ual.es\/wp-content\/uploads\/2021\/11\/ciberseguridad.jpg\" alt=\"\" width=\"474\" height=\"316\" srcset=\"https:\/\/www.cde.ual.es\/wp-content\/uploads\/2021\/11\/ciberseguridad.jpg 1920w, https:\/\/www.cde.ual.es\/wp-content\/uploads\/2021\/11\/ciberseguridad-300x200.jpg 300w, https:\/\/www.cde.ual.es\/wp-content\/uploads\/2021\/11\/ciberseguridad-1024x683.jpg 1024w, https:\/\/www.cde.ual.es\/wp-content\/uploads\/2021\/11\/ciberseguridad-768x512.jpg 768w, https:\/\/www.cde.ual.es\/wp-content\/uploads\/2021\/11\/ciberseguridad-1536x1024.jpg 1536w\" sizes=\"(max-width: 474px) 100vw, 474px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>Without surprise,\u00a0<strong>supply-chains attacks rank highly among prime threats<\/strong>\u00a0because of the significant potential they have in inducing catastrophic cascading effects. The risk is such that ENISA recently produced a dedicated\u00a0<a href=\"https:\/\/www.enisa.europa.eu\/publications\/threat-landscape-for-supply-chain-attacks\">threat landscape report<\/a>\u00a0for this specific category of threat.<\/p>\n<h3><strong>The 9 top threats<\/strong><\/h3>\n<p>9 threat groups were identified due to their prominent materialisation over the reporting period.<\/p>\n<ol>\n<li>Ransomware;<\/li>\n<li>Malware;<\/li>\n<li>Cryptojacking;<\/li>\n<li>E-mail related threats;<\/li>\n<li>Threats against data;<\/li>\n<li>Threats against availability and integrity;<\/li>\n<li>Disinformation \u2013 misinformation;<\/li>\n<li>Non-malicious threats;<\/li>\n<li>Supply-chain attacks.<\/li>\n<\/ol>\n<h3><strong>Key trends<\/strong><\/h3>\n<p>The COVID-19 crisis has created possibilities for adversaries who used the pandemic as a dominant lure in campaigns for email attacks for instance. Monetisation appears to be the main driver of such activities.<\/p>\n<p>The techniques that threat actors are resorting to are numerous. The non-exhaustive list below presents some of the most prevalent ones identified in the report, across all threats:<\/p>\n<ul>\n<li>Ransomware as a Service (RaaS)-type business models;<\/li>\n<li>Multiple extortion ransomware schemes;<\/li>\n<li>Business Email Compromise (BEC);<\/li>\n<li>Phishing-as-a-service (PhaaS);<\/li>\n<li>Disinformation-as-a-Service (DaaS) business model; etc.<\/li>\n<\/ul>\n<h3><strong>Focus on three threats<\/strong><\/h3>\n<ul>\n<li><strong>Ransomware<\/strong><\/li>\n<\/ul>\n<p>Ransomware is a type of malicious attack where attackers encrypt an organisation\u2019s data and demand payment to restore access. Ransomware has been the prime threat during the reporting period, with several high profile and highly publicised incidents. The significance and impact of the threat of ransomware is also evidenced by a series of related policy initiatives in the European Union (EU) and worldwide.<\/p>\n<p>Compromise through phishing e-mails and brute-forcing on Remote Desktop Protocol (RDP) services remain the two most common infection vectors. The occurrence of triple extortion schemes also increased strongly during 2021 and cryptocurrency remains the most common pay-out method for threat actors.<\/p>\n<ul>\n<li><strong>Cryptojacking infections<\/strong><\/li>\n<\/ul>\n<p>Cryptojacking or hidden cryptomining is a type of cybercrime where a criminal secretly uses a victim\u2019s computing power to generate cryptocurrency. With the proliferation of cryptocurrencies and their ever-increasing uptake by the wider public, an increase in corresponding cybersecurity incidents has been observed. Cryptocurrency remains the most common pay-out method for threat actors.<\/p>\n<ul>\n<li><strong>Misinformation and disinformation<\/strong><\/li>\n<\/ul>\n<p>This type of threats makes its first appearance in the ENISA threat landscape report.<\/p>\n<p>Disinformation and misinformation campaigns are on the rise as a result of the increased online presence due to the COVID-19 pandemic logically leading to an overuse of social media platforms and online media.<\/p>\n<p>Such threats are of paramount importance in the cyber world. Disinformation and misinformation campaigns are frequently used in hybrid attacks to foster doubt or create confusion, therefore reducing the overall perception of trust as a consequence and damaging this major proponent of cybersecurity in the process.<\/p>\n<h3><strong>Threat actors: who are they?<\/strong><\/h3>\n<p>Cyber threat actors are an integral component of the threat landscape. They are entities aiming to carry out a malicious act by taking advantage of existing vulnerabilities, with the intent to do harm to their victims.\u00a0<strong>Understanding how threat actors think and act, what their motivations and goals are, is an important step towards a stronger cyber incident response.<\/strong>\u00a0Monitoring the latest developments with respect to the tactics and techniques used by threat actors to achieve their objectives is crucial for an efficient defence in today\u2019s cybersecurity ecosystem. Such threat assessment allows us to prioritise security controls and devise an adequate strategy based on the potential impact and likelihood of threat materialisation.<\/p>\n<p>For the purposes of the ETL 2021, focus was given to\u00a0<strong>four categories of cybersecurity threat actors<\/strong>: state-sponsored, cybercrime, hacker-for-hire actors and hacktivists.<\/p>\n<h3>More information<\/h3>\n<p><a href=\"https:\/\/www.enisa.europa.eu\/news\/enisa-news\/hackers-for-hire-drive-the-evolution-of-the-new-enisa-threat-landscape\">ENISA &#8211; Press release<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The cybersecurity threat landscape has grown in terms of sophistication of attacks, complexity and impact.\u00a0Such a trend is spurred by an ever-growing online presence, the transitioning of traditional infrastructures to online solutions, advanced interconnectivity and the exploitation of new features of emerging technologies. &nbsp; Without surprise,\u00a0supply-chains attacks rank highly among prime threats\u00a0because of the significant [&hellip;]<\/p>\n","protected":false},"author":101011,"featured_media":84386,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[4076,4075,346],"tags":[501,779],"class_list":{"0":"post-84385","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cybersec","8":"category-defence-security","9":"category-eu-news","10":"tag-cibersecurity","11":"tag-eu-en","12":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The cybersecurity threat landscape | CDE Almer\u00eda - Centro de Documentaci\u00f3n Europea - Universidad de Almer\u00eda<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cde.ual.es\/en\/the-cybersecurity-threat-landscape\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The cybersecurity threat landscape | CDE Almer\u00eda - Centro de Documentaci\u00f3n Europea - Universidad de Almer\u00eda\" \/>\n<meta property=\"og:description\" content=\"The cybersecurity threat landscape has grown in terms of sophistication of attacks, complexity and impact.\u00a0Such a trend is spurred by an ever-growing online presence, the transitioning of traditional infrastructures to online solutions, advanced interconnectivity and the exploitation of new features of emerging technologies. &nbsp; Without surprise,\u00a0supply-chains attacks rank highly among prime threats\u00a0because of the significant [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cde.ual.es\/en\/the-cybersecurity-threat-landscape\/\" \/>\n<meta property=\"og:site_name\" content=\"CDE Almer\u00eda - Centro de Documentaci\u00f3n Europea - Universidad de Almer\u00eda\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/cdeuniversidadalmeria\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-03T02:00:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cde.ual.es\/wp-content\/uploads\/2021\/11\/ciberseguridad.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"BECA 2 CDE\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cdeualmeria\" \/>\n<meta name=\"twitter:site\" content=\"@cdeualmeria\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"BECA 2 CDE\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/en\\\/the-cybersecurity-threat-landscape\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/en\\\/the-cybersecurity-threat-landscape\\\/\"},\"author\":{\"name\":\"BECA 2 CDE\",\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/#\\\/schema\\\/person\\\/ee46ebc19edfa19598c02cff83335acc\"},\"headline\":\"The cybersecurity threat landscape\",\"datePublished\":\"2021-11-03T02:00:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/en\\\/the-cybersecurity-threat-landscape\\\/\"},\"wordCount\":618,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/en\\\/the-cybersecurity-threat-landscape\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cde.ual.es\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/ciberseguridad.jpg\",\"keywords\":[\"Cibersecurity\",\"EU\"],\"articleSection\":[\"Cybersecurity\",\"Defence &amp; Security\",\"EU News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.cde.ual.es\\\/en\\\/the-cybersecurity-threat-landscape\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/en\\\/the-cybersecurity-threat-landscape\\\/\",\"url\":\"https:\\\/\\\/www.cde.ual.es\\\/en\\\/the-cybersecurity-threat-landscape\\\/\",\"name\":\"The cybersecurity threat landscape | CDE Almer\u00eda - Centro de Documentaci\u00f3n Europea - Universidad de Almer\u00eda\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/en\\\/the-cybersecurity-threat-landscape\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/en\\\/the-cybersecurity-threat-landscape\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cde.ual.es\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/ciberseguridad.jpg\",\"datePublished\":\"2021-11-03T02:00:22+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/en\\\/the-cybersecurity-threat-landscape\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cde.ual.es\\\/en\\\/the-cybersecurity-threat-landscape\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/en\\\/the-cybersecurity-threat-landscape\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cde.ual.es\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/ciberseguridad.jpg\",\"contentUrl\":\"https:\\\/\\\/www.cde.ual.es\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/ciberseguridad.jpg\",\"width\":1920,\"height\":1280},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/en\\\/the-cybersecurity-threat-landscape\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\\\/\\\/www.cde.ual.es\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"EU News\",\"item\":\"https:\\\/\\\/www.cde.ual.es\\\/en\\\/category\\\/eu-news\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Defence &amp; Security\",\"item\":\"https:\\\/\\\/www.cde.ual.es\\\/en\\\/category\\\/eu-news\\\/defence-security\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/www.cde.ual.es\\\/en\\\/category\\\/eu-news\\\/defence-security\\\/cybersec\\\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"The cybersecurity threat landscape\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/#website\",\"url\":\"https:\\\/\\\/www.cde.ual.es\\\/\",\"name\":\"CDE Almer\u00eda - Centro de Documentaci\u00f3n Europea - Universidad de Almer\u00eda\",\"description\":\"Centro de Documentaci\u00f3n Europea de la Universidad de Almer\u00eda\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/#organization\"},\"alternateName\":\"CDE Almer\u00eda\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cde.ual.es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/#organization\",\"name\":\"Centro de Documentaci\u00f3n Europea de Almer\u00eda\",\"url\":\"https:\\\/\\\/www.cde.ual.es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.cde.ual.es\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/cde-logo-3.png\",\"contentUrl\":\"https:\\\/\\\/www.cde.ual.es\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/cde-logo-3.png\",\"width\":1400,\"height\":300,\"caption\":\"Centro de Documentaci\u00f3n Europea de Almer\u00eda\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/cdeuniversidadalmeria\\\/\",\"https:\\\/\\\/x.com\\\/cdeualmeria\",\"https:\\\/\\\/www.tiktok.com\\\/@cdealmeria\",\"https:\\\/\\\/www.instagram.com\\\/cdealmeria\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/cde-almera-812b26a9\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/#\\\/schema\\\/person\\\/ee46ebc19edfa19598c02cff83335acc\",\"name\":\"BECA 2 CDE\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/35a481bbc04bbd90e91bdfa3b0b5541036c222a49b9ad37b6889a2afcb5311a5?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/35a481bbc04bbd90e91bdfa3b0b5541036c222a49b9ad37b6889a2afcb5311a5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/35a481bbc04bbd90e91bdfa3b0b5541036c222a49b9ad37b6889a2afcb5311a5?s=96&d=mm&r=g\",\"caption\":\"BECA 2 CDE\"},\"sameAs\":[\"http:\\\/\\\/www.cdealmeria.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The cybersecurity threat landscape | CDE Almer\u00eda - Centro de Documentaci\u00f3n Europea - Universidad de Almer\u00eda","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cde.ual.es\/en\/the-cybersecurity-threat-landscape\/","og_locale":"en_US","og_type":"article","og_title":"The cybersecurity threat landscape | CDE Almer\u00eda - Centro de Documentaci\u00f3n Europea - Universidad de Almer\u00eda","og_description":"The cybersecurity threat landscape has grown in terms of sophistication of attacks, complexity and impact.\u00a0Such a trend is spurred by an ever-growing online presence, the transitioning of traditional infrastructures to online solutions, advanced interconnectivity and the exploitation of new features of emerging technologies. &nbsp; Without surprise,\u00a0supply-chains attacks rank highly among prime threats\u00a0because of the significant [&hellip;]","og_url":"https:\/\/www.cde.ual.es\/en\/the-cybersecurity-threat-landscape\/","og_site_name":"CDE Almer\u00eda - Centro de Documentaci\u00f3n Europea - Universidad de Almer\u00eda","article_publisher":"https:\/\/www.facebook.com\/cdeuniversidadalmeria\/","article_published_time":"2021-11-03T02:00:22+00:00","og_image":[{"width":1920,"height":1280,"url":"https:\/\/www.cde.ual.es\/wp-content\/uploads\/2021\/11\/ciberseguridad.jpg","type":"image\/jpeg"}],"author":"BECA 2 CDE","twitter_card":"summary_large_image","twitter_creator":"@cdeualmeria","twitter_site":"@cdeualmeria","twitter_misc":{"Written by":"BECA 2 CDE","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cde.ual.es\/en\/the-cybersecurity-threat-landscape\/#article","isPartOf":{"@id":"https:\/\/www.cde.ual.es\/en\/the-cybersecurity-threat-landscape\/"},"author":{"name":"BECA 2 CDE","@id":"https:\/\/www.cde.ual.es\/#\/schema\/person\/ee46ebc19edfa19598c02cff83335acc"},"headline":"The cybersecurity threat landscape","datePublished":"2021-11-03T02:00:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cde.ual.es\/en\/the-cybersecurity-threat-landscape\/"},"wordCount":618,"commentCount":0,"publisher":{"@id":"https:\/\/www.cde.ual.es\/#organization"},"image":{"@id":"https:\/\/www.cde.ual.es\/en\/the-cybersecurity-threat-landscape\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cde.ual.es\/wp-content\/uploads\/2021\/11\/ciberseguridad.jpg","keywords":["Cibersecurity","EU"],"articleSection":["Cybersecurity","Defence &amp; Security","EU News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.cde.ual.es\/en\/the-cybersecurity-threat-landscape\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.cde.ual.es\/en\/the-cybersecurity-threat-landscape\/","url":"https:\/\/www.cde.ual.es\/en\/the-cybersecurity-threat-landscape\/","name":"The cybersecurity threat landscape | CDE Almer\u00eda - Centro de Documentaci\u00f3n Europea - Universidad de Almer\u00eda","isPartOf":{"@id":"https:\/\/www.cde.ual.es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cde.ual.es\/en\/the-cybersecurity-threat-landscape\/#primaryimage"},"image":{"@id":"https:\/\/www.cde.ual.es\/en\/the-cybersecurity-threat-landscape\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cde.ual.es\/wp-content\/uploads\/2021\/11\/ciberseguridad.jpg","datePublished":"2021-11-03T02:00:22+00:00","breadcrumb":{"@id":"https:\/\/www.cde.ual.es\/en\/the-cybersecurity-threat-landscape\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cde.ual.es\/en\/the-cybersecurity-threat-landscape\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cde.ual.es\/en\/the-cybersecurity-threat-landscape\/#primaryimage","url":"https:\/\/www.cde.ual.es\/wp-content\/uploads\/2021\/11\/ciberseguridad.jpg","contentUrl":"https:\/\/www.cde.ual.es\/wp-content\/uploads\/2021\/11\/ciberseguridad.jpg","width":1920,"height":1280},{"@type":"BreadcrumbList","@id":"https:\/\/www.cde.ual.es\/en\/the-cybersecurity-threat-landscape\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/www.cde.ual.es\/en\/"},{"@type":"ListItem","position":2,"name":"EU News","item":"https:\/\/www.cde.ual.es\/en\/category\/eu-news\/"},{"@type":"ListItem","position":3,"name":"Defence &amp; Security","item":"https:\/\/www.cde.ual.es\/en\/category\/eu-news\/defence-security\/"},{"@type":"ListItem","position":4,"name":"Cybersecurity","item":"https:\/\/www.cde.ual.es\/en\/category\/eu-news\/defence-security\/cybersec\/"},{"@type":"ListItem","position":5,"name":"The cybersecurity threat landscape"}]},{"@type":"WebSite","@id":"https:\/\/www.cde.ual.es\/#website","url":"https:\/\/www.cde.ual.es\/","name":"CDE Almer\u00eda - Centro de Documentaci\u00f3n Europea - Universidad de Almer\u00eda","description":"Centro de Documentaci\u00f3n Europea de la Universidad de Almer\u00eda","publisher":{"@id":"https:\/\/www.cde.ual.es\/#organization"},"alternateName":"CDE Almer\u00eda","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cde.ual.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cde.ual.es\/#organization","name":"Centro de Documentaci\u00f3n Europea de Almer\u00eda","url":"https:\/\/www.cde.ual.es\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cde.ual.es\/#\/schema\/logo\/image\/","url":"https:\/\/www.cde.ual.es\/wp-content\/uploads\/2025\/07\/cde-logo-3.png","contentUrl":"https:\/\/www.cde.ual.es\/wp-content\/uploads\/2025\/07\/cde-logo-3.png","width":1400,"height":300,"caption":"Centro de Documentaci\u00f3n Europea de Almer\u00eda"},"image":{"@id":"https:\/\/www.cde.ual.es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/cdeuniversidadalmeria\/","https:\/\/x.com\/cdeualmeria","https:\/\/www.tiktok.com\/@cdealmeria","https:\/\/www.instagram.com\/cdealmeria\/","https:\/\/www.linkedin.com\/in\/cde-almera-812b26a9\/"]},{"@type":"Person","@id":"https:\/\/www.cde.ual.es\/#\/schema\/person\/ee46ebc19edfa19598c02cff83335acc","name":"BECA 2 CDE","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/35a481bbc04bbd90e91bdfa3b0b5541036c222a49b9ad37b6889a2afcb5311a5?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/35a481bbc04bbd90e91bdfa3b0b5541036c222a49b9ad37b6889a2afcb5311a5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/35a481bbc04bbd90e91bdfa3b0b5541036c222a49b9ad37b6889a2afcb5311a5?s=96&d=mm&r=g","caption":"BECA 2 CDE"},"sameAs":["http:\/\/www.cdealmeria.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.cde.ual.es\/en\/wp-json\/wp\/v2\/posts\/84385","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cde.ual.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cde.ual.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cde.ual.es\/en\/wp-json\/wp\/v2\/users\/101011"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cde.ual.es\/en\/wp-json\/wp\/v2\/comments?post=84385"}],"version-history":[{"count":0,"href":"https:\/\/www.cde.ual.es\/en\/wp-json\/wp\/v2\/posts\/84385\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cde.ual.es\/en\/wp-json\/wp\/v2\/media\/84386"}],"wp:attachment":[{"href":"https:\/\/www.cde.ual.es\/en\/wp-json\/wp\/v2\/media?parent=84385"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cde.ual.es\/en\/wp-json\/wp\/v2\/categories?post=84385"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cde.ual.es\/en\/wp-json\/wp\/v2\/tags?post=84385"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}