{"id":1730,"date":"2025-10-10T16:26:53","date_gmt":"2025-10-10T15:26:53","guid":{"rendered":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/?p=1730"},"modified":"2025-10-10T18:42:35","modified_gmt":"2025-10-10T17:42:35","slug":"panorama-de-ameacas-ciberneticas-europeias-principais-tendencias-do-enisa-threat-landscape-2025-eng","status":"publish","type":"post","link":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/en\/panorama-de-ameacas-ciberneticas-europeias-principais-tendencias-do-enisa-threat-landscape-2025-eng\/","title":{"rendered":"Article: European Cyber Threat Landscape \u2014 Key Trends from the ENISA Threat Landscape 2025"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"1730\" class=\"elementor elementor-1730\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7afe31e1 e-flex e-con-boxed e-con e-parent\" data-id=\"7afe31e1\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-230e82c5 e-con-full e-flex e-con e-child\" data-id=\"230e82c5\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-68c72aa9 elementor-widget elementor-widget-heading\" data-id=\"68c72aa9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Article: European Cyber Threat Landscape \u2014 Key Trends from the ENISA Threat Landscape 2025<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4443416b elementor-widget elementor-widget-image\" data-id=\"4443416b\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"566\" src=\"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/Enisa-Threat-Landscape-2025.jpg\" class=\"attachment-large size-large wp-image-1620\" alt=\"\" srcset=\"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/Enisa-Threat-Landscape-2025.jpg 979w, https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/Enisa-Threat-Landscape-2025-300x212.jpg 300w, https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/Enisa-Threat-Landscape-2025-768x544.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-58ebbf42 elementor-widget elementor-widget-text-editor\" data-id=\"58ebbf42\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"94\" data-end=\"540\"><strong data-start=\"94\" data-end=\"110\">Introduction<\/strong><br data-start=\"110\" data-end=\"113\" \/>The report <em data-start=\"124\" data-end=\"153\">ENISA Threat Landscape 2025<\/em> provides a comprehensive analysis of the cyber threat landscape in the European Union between July 1, 2024, and June 30, 2025. Drawing on thousands of reported incidents across multiple countries, the document identifies emerging attack vectors, threat actors, attack techniques, and strategic recommendations to strengthen digital resilience in both public and private organizations.<\/p><p data-start=\"542\" data-end=\"570\"><strong data-start=\"542\" data-end=\"568\">Key Threats and Trends<\/strong><\/p><p data-start=\"572\" data-end=\"838\"><strong data-start=\"572\" data-end=\"607\">Phishing and Social Engineering<\/strong><br data-start=\"607\" data-end=\"610\" \/>Phishing remains the dominant initial intrusion vector. More sophisticated campaigns employ persuasive techniques, well-crafted messages, and the use of artificial intelligence to make fraudulent emails increasingly realistic.<\/p><p data-start=\"840\" data-end=\"1051\"><strong data-start=\"840\" data-end=\"875\">Exploitation of Vulnerabilities<\/strong><br data-start=\"875\" data-end=\"878\" \/>Attacks exploiting known vulnerabilities continue at a large scale, making it critical for organizations to maintain up-to-date patches and visibility into security flaws.<\/p><p data-start=\"1053\" data-end=\"1244\"><strong data-start=\"1053\" data-end=\"1086\">DDoS and Availability Attacks<\/strong><br data-start=\"1086\" data-end=\"1089\" \/>Threats targeting system availability (DDoS) remain prominent, particularly in the context of geopolitical conflicts, impacting critical infrastructures.<\/p><p data-start=\"1246\" data-end=\"1477\"><strong data-start=\"1246\" data-end=\"1303\">Supply Chain Attacks and Abuse of Legitimate Services<\/strong><br data-start=\"1303\" data-end=\"1306\" \/>Attacks targeting supply chains and the misuse of legitimate services continue to grow, representing significant risk to organizations relying on interconnected systems.<\/p><p data-start=\"1479\" data-end=\"1801\"><strong data-start=\"1479\" data-end=\"1537\">Convergence of Threat Actors and Advanced Technologies<\/strong><br data-start=\"1537\" data-end=\"1540\" \/>The report highlights that hacktivist groups and nation-state actors are increasingly sharing techniques and tools. Artificial intelligence, while mostly used to optimize existing attacks, poses a growing risk as a vector for automated or manipulated attacks.<\/p><p data-start=\"1803\" data-end=\"2129\"><strong data-start=\"1803\" data-end=\"1848\">Relevance for Local Public Administration<\/strong><br data-start=\"1848\" data-end=\"1851\" \/>The public sector, including municipalities and local entities, is frequently targeted due to the volume of sensitive data they manage. A successful incident can compromise not only individual data but also interdependent service chains. Key guidance from the report includes:<\/p><ul data-start=\"2131\" data-end=\"2403\"><li data-start=\"2131\" data-end=\"2193\"><p data-start=\"2133\" data-end=\"2193\">Implement adaptive phishing and anomaly detection systems.<\/p><\/li><li data-start=\"2194\" data-end=\"2253\"><p data-start=\"2196\" data-end=\"2253\">Prioritize vulnerability management and timely updates.<\/p><\/li><li data-start=\"2254\" data-end=\"2342\"><p data-start=\"2256\" data-end=\"2342\">Use traffic filters and protections to mitigate abuse of legitimate infrastructures.<\/p><\/li><li data-start=\"2343\" data-end=\"2403\"><p data-start=\"2345\" data-end=\"2403\">Continuously train public employees in secure practices.<\/p><\/li><\/ul><p data-start=\"2405\" data-end=\"2436\"><strong data-start=\"2405\" data-end=\"2434\">Strategic Recommendations<\/strong><\/p><ul data-start=\"2438\" data-end=\"2801\"><li data-start=\"2438\" data-end=\"2544\"><p data-start=\"2440\" data-end=\"2544\">Integrate security solutions with contextual intelligence (sender data, reputation, network behavior).<\/p><\/li><li data-start=\"2545\" data-end=\"2636\"><p data-start=\"2547\" data-end=\"2636\">Adopt hybrid approaches: endpoint protection + network security + real-time monitoring.<\/p><\/li><li data-start=\"2637\" data-end=\"2716\"><p data-start=\"2639\" data-end=\"2716\">Implement automated incident response strategies to reduce mitigation time.<\/p><\/li><li data-start=\"2717\" data-end=\"2801\"><p data-start=\"2719\" data-end=\"2801\">Promote a security culture through training, simulations, and ongoing awareness.<\/p><\/li><\/ul><p data-start=\"2803\" data-end=\"2839\"><strong data-start=\"2803\" data-end=\"2837\">References and Further Reading<\/strong><\/p><ul data-start=\"2841\" data-end=\"2966\"><li data-start=\"2841\" data-end=\"2912\"><p data-start=\"2843\" data-end=\"2912\"><a href=\"https:\/\/www.enisa.europa.eu\/sites\/default\/files\/2025-10\/ENISA%20Threat%20Landscape%202025_0.pdf\">ENISA Cybersecurity Threat Landscape Methodology 2025 (methodology)<\/a><\/p><\/li><li data-start=\"2913\" data-end=\"2966\"><p data-start=\"2915\" data-end=\"2966\"><a href=\"https:\/\/www.enisa.europa.eu\/sites\/default\/files\/2025-10\/ENISA%20Threat%20Landscape%202025%20Booklet.pdf\">ENISA Threat Landscape Methodology 2025 (booklet)<\/a><\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4ef03234 hfe-post-info-layout-inline elementor-widget elementor-widget-post-info-widget\" data-id=\"4ef03234\" data-element_type=\"widget\" data-widget_type=\"post-info-widget.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"hfe-post-info-inline hfe-post-info-items hfe-post-info\">\n\t\t\t\t\t<li class=\"hfe-post-info-item elementor-repeater-item-8b908e1 hfe-post-info-inline-item\" itemprop=\"datePublished\"> \n\t\t\t\t\t\t\t<a href=\"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/2025\/10\/10\/\">\n\t\t\t\n\t\t\t\t\t\t<span class=\"hfe-post-info-icon\">\n\t\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-calendar-alt\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M148 288h-40c-6.6 0-12-5.4-12-12v-40c0-6.6 5.4-12 12-12h40c6.6 0 12 5.4 12 12v40c0 6.6-5.4 12-12 12zm108-12v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm96 0v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm-96 96v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm-96 0v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm192 0v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm96-260v352c0 26.5-21.5 48-48 48H48c-26.5 0-48-21.5-48-48V112c0-26.5 21.5-48 48-48h48V12c0-6.6 5.4-12 12-12h40c6.6 0 12 5.4 12 12v52h128V12c0-6.6 5.4-12 12-12h40c6.6 0 12 5.4 12 12v52h48c26.5 0 48 21.5 48 48zm-48 346V160H48v298c0 3.3 2.7 6 6 6h340c3.3 0 6-2.7 6-6z\"><\/path><\/svg>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<span class=\"hfe-post-info-text hfe-post-info__item hfe-post-info__item--type-date\">\n\t\t\t\n\t\t\t\t\t\t\tOctober 10, 2025\t\t\t\t\t<\/span>\n\t\t\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/li>\n\t\t\t\t<li class=\"hfe-post-info-item elementor-repeater-item-1c60f84 hfe-post-info-inline-item\" itemprop=\"author\"> \n\t\t\t\t\t\t\t<a href=\"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/author\/ricardo\/\">\n\t\t\t\n\t\t\t\t\t\t<span class=\"hfe-post-info-icon\">\n\t\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-user-circle\" viewBox=\"0 0 496 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M248 104c-53 0-96 43-96 96s43 96 96 96 96-43 96-96-43-96-96-96zm0 144c-26.5 0-48-21.5-48-48s21.5-48 48-48 48 21.5 48 48-21.5 48-48 48zm0-240C111 8 0 119 0 256s111 248 248 248 248-111 248-248S385 8 248 8zm0 448c-49.7 0-95.1-18.3-130.1-48.4 14.9-23 40.4-38.6 69.6-39.5 20.8 6.4 40.6 9.6 60.5 9.6s39.7-3.1 60.5-9.6c29.2 1 54.7 16.5 69.6 39.5-35 30.1-80.4 48.4-130.1 48.4zm162.7-84.1c-24.4-31.4-62.1-51.9-105.1-51.9-10.2 0-26 9.6-57.6 9.6-31.5 0-47.4-9.6-57.6-9.6-42.9 0-80.6 20.5-105.1 51.9C61.9 339.2 48 299.2 48 256c0-110.3 89.7-200 200-200s200 89.7 200 200c0 43.2-13.9 83.2-37.3 115.9z\"><\/path><\/svg>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<span class=\"hfe-post-info-text hfe-post-info__item hfe-post-info__item--type-author\">\n\t\t\t\n\t\t\t\t\t\t\tRicardo\t\t\t\t\t<\/span>\n\t\t\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/li>\n\t\t\t\t<li class=\"hfe-post-info-item elementor-repeater-item-1739910 hfe-post-info-inline-item\"> \n\t\t\t\n\t\t\t\t\t\t<span class=\"hfe-post-info-icon\">\n\t\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-clock\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8zm0 448c-110.5 0-200-89.5-200-200S145.5 56 256 56s200 89.5 200 200-89.5 200-200 200zm61.8-104.4l-84.9-61.7c-3.1-2.3-4.9-5.9-4.9-9.7V116c0-6.6 5.4-12 12-12h32c6.6 0 12 5.4 12 12v141.7l66.8 48.6c5.4 3.9 6.5 11.4 2.6 16.8L334.6 349c-3.9 5.3-11.4 6.5-16.8 2.6z\"><\/path><\/svg>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<span class=\"hfe-post-info-text hfe-post-info__item hfe-post-info__item--type-time\">\n\t\t\t\n\t\t\t\t\t\t\t16:26\t\t\t\t\t<\/span>\n\t\t\n\t\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2eb91fa5 elementor-widget elementor-widget-wordpress-popular-posts-ewidget\" data-id=\"2eb91fa5\" data-element_type=\"widget\" data-widget_type=\"wordpress-popular-posts-ewidget.default\">\n\t\t\t\t\t<div class=\"wpp-shortcode\"><script type=\"application\/json\" data-id=\"wpp-shortcode-inline-js\">{\"title\":\"\",\"limit\":\"10\",\"offset\":0,\"range\":\"last24hours\",\"time_quantity\":24,\"time_unit\":\"hour\",\"freshness\":false,\"order_by\":\"views\",\"post_type\":\"post\",\"pid\":\"\",\"exclude\":\"\",\"cat\":\"\",\"taxonomy\":\"category\",\"term_id\":\"\",\"author\":\"\",\"shorten_title\":{\"active\":false,\"length\":0,\"words\":false},\"post-excerpt\":{\"active\":false,\"length\":0,\"keep_format\":false,\"words\":false},\"thumbnail\":{\"active\":false,\"build\":\"manual\",\"width\":0,\"height\":0},\"rating\":false,\"stats_tag\":{\"comment_count\":false,\"views\":\"1\",\"author\":false,\"date\":{\"active\":false,\"format\":\"F j, Y\"},\"category\":false,\"taxonomy\":{\"active\":false,\"name\":\"category\"}},\"markup\":{\"custom_html\":true,\"wpp-start\":\"&lt;ul class=&quot;wpp-list&quot;&gt;\",\"wpp-end\":\"&lt;\\\/ul&gt;\",\"title-start\":\"&lt;h2&gt;\",\"title-end\":\"&lt;\\\/h2&gt;\",\"post-html\":\"&lt;li class=&quot;{current_class}&quot;&gt;{thumb} {title} &lt;span class=&quot;wpp-meta post-stats&quot;&gt;{stats}&lt;\\\/span&gt;&lt;p class=&quot;wpp-excerpt&quot;&gt;{excerpt}&lt;\\\/p&gt;&lt;\\\/li&gt;\"},\"theme\":{\"name\":\"\"}}<\/script><div class=\"wpp-shortcode-placeholder\"><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6e4502d4 e-con-full e-flex e-con e-child\" data-id=\"6e4502d4\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5e093eb2 elementor-widget elementor-widget-sidebar\" data-id=\"5e093eb2\" data-element_type=\"widget\" data-widget_type=\"sidebar.default\">\n\t\t\t\t\t<div class=\"popular-posts\"><h2>Publica\u00e7\u00f5es<\/h2><script type=\"application\/json\" data-id=\"wpp-block-inline-js\">{\"title\":\"Publica\\u00e7\\u00f5es\",\"limit\":\"10\",\"offset\":0,\"range\":\"all\",\"time_quantity\":\"24\",\"time_unit\":\"hour\",\"freshness\":false,\"order_by\":\"views\",\"post_type\":\"post\",\"pid\":\"\",\"exclude\":\"\",\"taxonomy\":\"category\",\"term_id\":\"\",\"author\":\"\",\"shorten_title\":{\"active\":true,\"length\":\"25\",\"words\":false},\"post-excerpt\":{\"active\":false,\"length\":0,\"keep_format\":false,\"words\":false},\"thumbnail\":{\"active\":true,\"width\":\"75\",\"height\":\"75\",\"build\":\"manual\",\"size\":\"\"},\"rating\":false,\"stats_tag\":{\"comment_count\":false,\"views\":true,\"author\":false,\"date\":{\"active\":false,\"format\":\"F j, Y\"},\"taxonomy\":{\"active\":false,\"name\":\"category\"}},\"markup\":{\"custom_html\":false,\"wpp-start\":\"<ul class=\\\"wpp-list\\\">\",\"wpp-end\":\"<\\\/ul>\",\"title-start\":\"<h2>\",\"title-end\":\"<\\\/h2>\",\"post-html\":\"<li class=\\\"{current_class}\\\">{thumb} {title} <span class=\\\"wpp-meta post-stats\\\">{stats}<\\\/span><\\\/li>\"},\"theme\":{\"name\":\"\"}}<\/script><div class=\"wpp-widget-block-placeholder\"><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Article: European Cyber Threat Landscape \u2014 Key Trends from the ENISA Threat Landscape 2025 IntroductionThe report ENISA Threat Landscape 2025 provides a comprehensive analysis of the cyber threat landscape in the European Union between July 1, 2024, and June 30, 2025. Drawing on thousands of reported incidents across multiple countries, the document identifies emerging attack [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[35],"tags":[],"class_list":["post-1730","post","type-post","status-publish","format-standard","hentry","category-publications-en"],"_links":{"self":[{"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/posts\/1730","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/comments?post=1730"}],"version-history":[{"count":5,"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/posts\/1730\/revisions"}],"predecessor-version":[{"id":1843,"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/posts\/1730\/revisions\/1843"}],"wp:attachment":[{"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/media?parent=1730"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/categories?post=1730"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/tags?post=1730"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}