{"id":1574,"date":"2025-10-08T15:51:14","date_gmt":"2025-10-08T14:51:14","guid":{"rendered":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/?p=1574"},"modified":"2025-10-10T16:18:29","modified_gmt":"2025-10-10T15:18:29","slug":"elementor-1574","status":"publish","type":"post","link":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/elementor-1574\/","title":{"rendered":"Panorama de Amea\u00e7as Cibern\u00e9ticas Europeias \u2014 Principais Tend\u00eancias do ENISA Threat Landscape 2025-PT"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"1574\" class=\"elementor elementor-1574\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7afe31e1 e-flex e-con-boxed e-con e-parent\" data-id=\"7afe31e1\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-230e82c5 e-con-full e-flex e-con e-child\" data-id=\"230e82c5\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-68c72aa9 elementor-widget elementor-widget-heading\" data-id=\"68c72aa9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Artigo: Panorama de Amea\u00e7as Cibern\u00e9ticas Europeias \u2014 Principais Tend\u00eancias do ENISA Threat Landscape 2025<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4443416b elementor-widget elementor-widget-image\" data-id=\"4443416b\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"566\" src=\"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/Enisa-Threat-Landscape-2025.jpg\" class=\"attachment-large size-large wp-image-1620\" alt=\"\" srcset=\"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/Enisa-Threat-Landscape-2025.jpg 979w, https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/Enisa-Threat-Landscape-2025-300x212.jpg 300w, https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/Enisa-Threat-Landscape-2025-768x544.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-58ebbf42 elementor-widget elementor-widget-text-editor\" data-id=\"58ebbf42\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h5 data-start=\"226\" data-end=\"670\"><strong>Introdu\u00e7\u00e3o<\/strong><\/h5>\n<p data-start=\"1396\" data-end=\"1626\">O relat\u00f3rio \u201cENISA Threat Landscape 2025\u201d mobiliza uma an\u00e1lise abrangente do panorama de amea\u00e7as cibern\u00e9ticas na Uni\u00e3o Europeia durante o per\u00edodo de 1 de julho de 2024 a 30 de junho de 2025. Recolhendo milhares de incidentes reportados em m\u00faltiplos pa\u00edses, o documento identifica vetores emergentes, atores, t\u00e9cnicas de ataque, e recomenda\u00e7\u00f5es estrat\u00e9gicas para refor\u00e7ar a resili\u00eancia digital nas entidades p\u00fablicas e privadas.<\/p>\n\n<h5 data-start=\"1396\" data-end=\"1626\"><strong>Principais Amea\u00e7as e Tend\u00eancias<\/strong><\/h5>\n<ol>\n \t<li data-start=\"1396\" data-end=\"1626\"><strong>Phishing e Engenharia Social\u00a0 <\/strong>O phishing mant\u00e9m-se como vetor dominante de intrus\u00e3o inicial \u2014 campanhas mais sofisticadas recorrem a t\u00e9cnicas de persuas\u00e3o, mensagens bem elaboradas e uso de intelig\u00eancia artificial para tornar os e-mails fraudulentos mais realistas.<\/li>\n \t<li data-start=\"1396\" data-end=\"1626\"><strong>Explora\u00e7\u00e3o de Vulnerabilidades<\/strong><\/br><\/li><p>Ataques explorando vulnerabilidades conhecidas continuam a ser usados em grande escala, sendo cr\u00edtico para organiza\u00e7\u00f5es manter patches atualizados e visibilidade de vulnerabilidades.<\/p>\n \t<li data-start=\"1396\" data-end=\"1626\"><strong>Ataques DDoS e Disponibilidade<\/strong><\/li><p>Amea\u00e7as que visam a indisponibilidade de sistemas (DDoS) permanecem entre as principais categorias, especialmente em contextos de conflito geopol\u00edtico, afetando infraestruturas cr\u00edticas.<\/p>\n \t<li data-start=\"1396\" data-end=\"1626\"><strong>Ataques em Cadeias de Suprimentos e Abuso de Servi\u00e7os Leg\u00edtimos<\/strong><\/li><p>Amea\u00e7as que visam a indisponibilidade de sistemas (DDoS) permanecem entre as principais categorias, especialmente em contextos de conflito geopol\u00edtico, afetando infraestruturas cr\u00edticas.<\/p>\n \t<li data-start=\"1396\" data-end=\"1626\"><strong>\u00a0Converg\u00eancia entre Atores e Tecnologias Avan\u00e7adas\u00a0<\/strong><\/li><p>O relat\u00f3rio indica que grupos hacktivistas e estados-nacionais est\u00e3o a compartilhar t\u00e9cnicas e ferramentas. A intelig\u00eancia artificial, embora usada principalmente para otimizar ataques j\u00e1 existentes, revela um risco crescente como vetor de ataques automatizados ou manipulados.<\/p>\n<\/ol>\n<h5 data-start=\"226\" data-end=\"670\"><strong>Relev\u00e2ncia para a Administra\u00e7\u00e3o P\u00fablica Local<\/strong><\/h5>\nO setor p\u00fablico \u2014 incluindo c\u00e2maras municipais e entidades locais \u2014 aparece frequentemente como alvo preferencial, dado o volume de dados sens\u00edveis que gerem. Um incidente bem-sucedido pode comprometer n\u00e3o apenas dados individuais, mas tamb\u00e9m cadeias de servi\u00e7o interdependentes. Nesse contexto, os insights do relat\u00f3rio orientam para:\n<ul>\n \t<li>ado\u00e7\u00e3o de sistemas de dete\u00e7\u00e3o de phishing e anomalias adaptativos;<\/li>\n \t<li>prioriza\u00e7\u00e3o de atualiza\u00e7\u00e3o e gerenciamento de vulnerabilidades;<\/li>\n \t<li>uso de filtros e prote\u00e7\u00e3o de tr\u00e1fego para mitigar abusos de infraestruturas leg\u00edtimas;<\/li>\n \t<li>capacita\u00e7\u00e3o cont\u00ednua dos funcion\u00e1rios p\u00fablicos quanto a pr\u00e1ticas seguras.<\/li>\n<\/ul>\n<h5 data-start=\"226\" data-end=\"670\"><strong>Recomenda\u00e7\u00f5es Estrat\u00e9gias<\/strong><\/h5>\nIntegrar solu\u00e7\u00f5es de seguran\u00e7a com intelig\u00eancia contextual (dados de remetente, reputa\u00e7\u00e3o, comportamento de rede).\n<ul>\n \t<li>Escolher abordagens h\u00edbridas: prote\u00e7\u00e3o de endpoint + prote\u00e7\u00e3o de rede + monitoriza\u00e7\u00e3o em tempo real.<\/li>\n \t<li>Articular estrat\u00e9gias de resposta autom\u00e1tica a incidentes para reduzir o tempo de mitiga\u00e7\u00e3o.<\/li>\n \t<li>Promover cultura de seguran\u00e7a: treino, simula\u00e7\u00f5es, consciencializa\u00e7\u00e3o constante.<\/li>\n<\/ul>\n&nbsp;\n<h5 data-start=\"226\" data-end=\"670\"><strong>Refer\u00eancias e Leitura Adicionais<\/strong><\/h5>\n<ul>\n \t<li><a href=\"https:\/\/www.enisa.europa.eu\/sites\/default\/files\/2025-10\/ENISA%20Threat%20Landscape%202025_0.pdf\">ENISA Cybersecurity Threat Landscape Methodology 2025 (metodologia)<\/a><\/li>\n \t<li><a href=\"https:\/\/www.enisa.europa.eu\/sites\/default\/files\/2025-10\/ENISA%20Threat%20Landscape%202025%20Booklet.pdf\">ENISA Threat Landscape Methodology 2025 (booklet)<\/a><\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4ef03234 hfe-post-info-layout-inline elementor-widget elementor-widget-post-info-widget\" data-id=\"4ef03234\" data-element_type=\"widget\" data-widget_type=\"post-info-widget.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"hfe-post-info-inline hfe-post-info-items hfe-post-info\">\n\t\t\t\t\t<li class=\"hfe-post-info-item elementor-repeater-item-8b908e1 hfe-post-info-inline-item\" itemprop=\"datePublished\"> \n\t\t\t\t\t\t\t<a href=\"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/2025\/10\/08\/\">\n\t\t\t\n\t\t\t\t\t\t<span class=\"hfe-post-info-icon\">\n\t\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-calendar-alt\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M148 288h-40c-6.6 0-12-5.4-12-12v-40c0-6.6 5.4-12 12-12h40c6.6 0 12 5.4 12 12v40c0 6.6-5.4 12-12 12zm108-12v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm96 0v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm-96 96v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm-96 0v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm192 0v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm96-260v352c0 26.5-21.5 48-48 48H48c-26.5 0-48-21.5-48-48V112c0-26.5 21.5-48 48-48h48V12c0-6.6 5.4-12 12-12h40c6.6 0 12 5.4 12 12v52h128V12c0-6.6 5.4-12 12-12h40c6.6 0 12 5.4 12 12v52h48c26.5 0 48 21.5 48 48zm-48 346V160H48v298c0 3.3 2.7 6 6 6h340c3.3 0 6-2.7 6-6z\"><\/path><\/svg>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<span class=\"hfe-post-info-text hfe-post-info__item hfe-post-info__item--type-date\">\n\t\t\t\n\t\t\t\t\t\t\tOctober 8, 2025\t\t\t\t\t<\/span>\n\t\t\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/li>\n\t\t\t\t<li class=\"hfe-post-info-item elementor-repeater-item-1c60f84 hfe-post-info-inline-item\" itemprop=\"author\"> \n\t\t\t\t\t\t\t<a href=\"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/author\/ricardo\/\">\n\t\t\t\n\t\t\t\t\t\t<span class=\"hfe-post-info-icon\">\n\t\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-user-circle\" viewBox=\"0 0 496 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M248 104c-53 0-96 43-96 96s43 96 96 96 96-43 96-96-43-96-96-96zm0 144c-26.5 0-48-21.5-48-48s21.5-48 48-48 48 21.5 48 48-21.5 48-48 48zm0-240C111 8 0 119 0 256s111 248 248 248 248-111 248-248S385 8 248 8zm0 448c-49.7 0-95.1-18.3-130.1-48.4 14.9-23 40.4-38.6 69.6-39.5 20.8 6.4 40.6 9.6 60.5 9.6s39.7-3.1 60.5-9.6c29.2 1 54.7 16.5 69.6 39.5-35 30.1-80.4 48.4-130.1 48.4zm162.7-84.1c-24.4-31.4-62.1-51.9-105.1-51.9-10.2 0-26 9.6-57.6 9.6-31.5 0-47.4-9.6-57.6-9.6-42.9 0-80.6 20.5-105.1 51.9C61.9 339.2 48 299.2 48 256c0-110.3 89.7-200 200-200s200 89.7 200 200c0 43.2-13.9 83.2-37.3 115.9z\"><\/path><\/svg>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<span class=\"hfe-post-info-text hfe-post-info__item hfe-post-info__item--type-author\">\n\t\t\t\n\t\t\t\t\t\t\tRicardo\t\t\t\t\t<\/span>\n\t\t\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/li>\n\t\t\t\t<li class=\"hfe-post-info-item elementor-repeater-item-1739910 hfe-post-info-inline-item\"> \n\t\t\t\n\t\t\t\t\t\t<span class=\"hfe-post-info-icon\">\n\t\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-clock\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8zm0 448c-110.5 0-200-89.5-200-200S145.5 56 256 56s200 89.5 200 200-89.5 200-200 200zm61.8-104.4l-84.9-61.7c-3.1-2.3-4.9-5.9-4.9-9.7V116c0-6.6 5.4-12 12-12h32c6.6 0 12 5.4 12 12v141.7l66.8 48.6c5.4 3.9 6.5 11.4 2.6 16.8L334.6 349c-3.9 5.3-11.4 6.5-16.8 2.6z\"><\/path><\/svg>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<span class=\"hfe-post-info-text hfe-post-info__item hfe-post-info__item--type-time\">\n\t\t\t\n\t\t\t\t\t\t\t15:51\t\t\t\t\t<\/span>\n\t\t\n\t\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2eb91fa5 elementor-widget elementor-widget-wordpress-popular-posts-ewidget\" data-id=\"2eb91fa5\" data-element_type=\"widget\" data-widget_type=\"wordpress-popular-posts-ewidget.default\">\n\t\t\t\t\t<div class=\"wpp-shortcode\"><script type=\"application\/json\" data-id=\"wpp-shortcode-inline-js\">{\"title\":\"\",\"limit\":\"10\",\"offset\":0,\"range\":\"last24hours\",\"time_quantity\":24,\"time_unit\":\"hour\",\"freshness\":false,\"order_by\":\"views\",\"post_type\":\"post\",\"pid\":\"\",\"exclude\":\"\",\"cat\":\"\",\"taxonomy\":\"category\",\"term_id\":\"\",\"author\":\"\",\"shorten_title\":{\"active\":false,\"length\":0,\"words\":false},\"post-excerpt\":{\"active\":false,\"length\":0,\"keep_format\":false,\"words\":false},\"thumbnail\":{\"active\":false,\"build\":\"manual\",\"width\":0,\"height\":0},\"rating\":false,\"stats_tag\":{\"comment_count\":false,\"views\":\"1\",\"author\":false,\"date\":{\"active\":false,\"format\":\"F j, Y\"},\"category\":false,\"taxonomy\":{\"active\":false,\"name\":\"category\"}},\"markup\":{\"custom_html\":true,\"wpp-start\":\"&lt;ul class=&quot;wpp-list&quot;&gt;\",\"wpp-end\":\"&lt;\\\/ul&gt;\",\"title-start\":\"&lt;h2&gt;\",\"title-end\":\"&lt;\\\/h2&gt;\",\"post-html\":\"&lt;li class=&quot;{current_class}&quot;&gt;{thumb} {title} &lt;span class=&quot;wpp-meta post-stats&quot;&gt;{stats}&lt;\\\/span&gt;&lt;p class=&quot;wpp-excerpt&quot;&gt;{excerpt}&lt;\\\/p&gt;&lt;\\\/li&gt;\"},\"theme\":{\"name\":\"\"}}<\/script><div class=\"wpp-shortcode-placeholder\"><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6e4502d4 e-con-full e-flex e-con e-child\" data-id=\"6e4502d4\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5e093eb2 elementor-widget elementor-widget-sidebar\" data-id=\"5e093eb2\" data-element_type=\"widget\" data-widget_type=\"sidebar.default\">\n\t\t\t\t\t<div class=\"popular-posts\"><h2>Publica\u00e7\u00f5es<\/h2><script type=\"application\/json\" data-id=\"wpp-block-inline-js\">{\"title\":\"Publica\\u00e7\\u00f5es\",\"limit\":\"10\",\"offset\":0,\"range\":\"all\",\"time_quantity\":\"24\",\"time_unit\":\"hour\",\"freshness\":false,\"order_by\":\"views\",\"post_type\":\"post\",\"pid\":\"\",\"exclude\":\"\",\"taxonomy\":\"category\",\"term_id\":\"\",\"author\":\"\",\"shorten_title\":{\"active\":true,\"length\":\"25\",\"words\":false},\"post-excerpt\":{\"active\":false,\"length\":0,\"keep_format\":false,\"words\":false},\"thumbnail\":{\"active\":true,\"width\":\"75\",\"height\":\"75\",\"build\":\"manual\",\"size\":\"\"},\"rating\":false,\"stats_tag\":{\"comment_count\":false,\"views\":true,\"author\":false,\"date\":{\"active\":false,\"format\":\"F j, Y\"},\"taxonomy\":{\"active\":false,\"name\":\"category\"}},\"markup\":{\"custom_html\":false,\"wpp-start\":\"<ul class=\\\"wpp-list\\\">\",\"wpp-end\":\"<\\\/ul>\",\"title-start\":\"<h2>\",\"title-end\":\"<\\\/h2>\",\"post-html\":\"<li class=\\\"{current_class}\\\">{thumb} {title} <span class=\\\"wpp-meta post-stats\\\">{stats}<\\\/span><\\\/li>\"},\"theme\":{\"name\":\"\"}}<\/script><div class=\"wpp-widget-block-placeholder\"><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Artigo: Panorama de Amea\u00e7as Cibern\u00e9ticas Europeias \u2014 Principais Tend\u00eancias do ENISA Threat Landscape 2025 Introdu\u00e7\u00e3o O relat\u00f3rio \u201cENISA Threat Landscape 2025\u201d mobiliza uma an\u00e1lise abrangente do panorama de amea\u00e7as cibern\u00e9ticas na Uni\u00e3o Europeia durante o per\u00edodo de 1 de julho de 2024 a 30 de junho de 2025. Recolhendo milhares de incidentes reportados em m\u00faltiplos [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[31],"tags":[],"class_list":["post-1574","post","type-post","status-publish","format-standard","hentry","category-publications"],"_links":{"self":[{"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/posts\/1574","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/comments?post=1574"}],"version-history":[{"count":39,"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/posts\/1574\/revisions"}],"predecessor-version":[{"id":1724,"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/posts\/1574\/revisions\/1724"}],"wp:attachment":[{"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/media?parent=1574"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/categories?post=1574"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/tags?post=1574"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}