Centro de Documentação da PJ | ||||
| ENISA ENISA threat landscape 2025 [Recurso eletrónico] / ENISA.- [Attiki] : European Union Agency for Cybersecurity (ENISA), 2025.- 1 CD-ROM ; 12 cm Ficheiro de 4,80 MB em formato PDF (87 p.). ISBN 978-92-9204-723-8 CRIME INFORMÁTICO, CRIME VIA INTERNET, SEGURANÇA INFORMÁTICA, PIRATARIA INFORMÁTICA, PROTECÇÃO E SEGURANÇA DE DADOS, RELATÓRIO 1. Executive summary. 2. Methodology. 3. Threat landscape overview. 4. General key trends. 4.1. Phishing remains a primary initial intrusion vector. 4.2. Increasingly targeted cyber dependencies. 4.3. Continuous targeting of mobile devices. 4.4. Threat groups converging. 4.5. Predictable use of AI. 5. Sectorial analysis. 5.1. Public administration. 5.2. Transport. 5.3. Digital infrastructure and services. 5.4. Finance. 5.5. Manufacturing. 6. Cybercrime. 6.1. Key cybercrime threats. 6.2. Cybercrime sectorial impact. 6.3. Cybercrime geographical impact. 6.4. Key cybercrime trends. 7. State-aligned activities. 7.1. Key state-aligned threats. 7.2. Key state-aligned trends. 8. Foreign information manipulation and interference. 8.1. Key fimi threats. 8.2. Key fimi trends. 9. Hacktivism. 9.1. Key hacktivism threats. 9.2. Hacktivism geographical targeting. 9.3. Hacktivism sectorial targeting. 9.4. Key hacktivism trends. 10. TTPS & vulnerabilities. 10.1. Observed Tactics, Techniques & Procedures (TTPS). 10.2. Vulnerabilities. 10.3. Recommendations. 10.4. System hardening. 10.5. Access & privilegie. 10.6. Network protections. 10.7. Monitoring. 10.8. Resilience. 11. Outlook & conclusion. 12. Appendix. 12.1. Tactics, Techniques & Procedures (TTPS). 12.2. Vulnerabilities. 12.3. Lexicon. |