{"id":27524,"date":"2020-10-29T08:21:00","date_gmt":"2020-10-29T07:21:00","guid":{"rendered":"https:\/\/perseus.de\/enisa-cyber-threats-are-becoming-increasingly-sophisticated-and-targeted\/"},"modified":"2026-03-30T16:49:13","modified_gmt":"2026-03-30T14:49:13","slug":"enisa-cyber-threats-are-becoming-increasingly-sophisticated-and-targeted","status":"publish","type":"post","link":"https:\/\/perseus.de\/en\/enisa-cyber-threats-are-becoming-increasingly-sophisticated-and-targeted\/","title":{"rendered":"ENISA: Cyber threats are becoming increasingly sophisticated and targeted"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"27524\" class=\"elementor elementor-27524 elementor-23394\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2ba0588 e-flex e-con-boxed e-con e-parent\" data-id=\"2ba0588\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6459d3d elementor-widget elementor-widget-image\" data-id=\"6459d3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"730\" height=\"412\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2020\/10\/Blog-Header-Enisa.png\" class=\"attachment-medium_large size-medium_large wp-image-27523\" alt=\"Blog Header Enisa Cyber Threats\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2020\/10\/Blog-Header-Enisa.png 730w, https:\/\/perseus.de\/wp-content\/uploads\/2020\/10\/Blog-Header-Enisa-300x169.png 300w\" sizes=\"(max-width: 730px) 100vw, 730px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image source: ENISA<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d37e4d1 e-flex e-con-boxed e-con e-parent\" data-id=\"d37e4d1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7d8390f e-con-full e-flex e-con e-child\" data-id=\"7d8390f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-dd7fbca e-con-full e-flex e-con e-child\" data-id=\"dd7fbca\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c59320c elementor-widget elementor-widget-text-editor\" data-id=\"c59320c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h6>23.10.2020<\/h6>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-adc6696 elementor-widget elementor-widget-heading\" data-id=\"adc6696\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">ENISA: Cyber threats are becoming increasingly sophisticated and targeted<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cc33fd4 elementor-widget elementor-widget-text-editor\" data-id=\"cc33fd4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cybersecurity | Cyberattacks | Protection<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7f70183 e-con-full e-flex e-con e-child\" data-id=\"7f70183\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3210710 elementor-widget elementor-widget-text-editor\" data-id=\"3210710\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>For the eighth time, the European Union Agency for Cybersecurity (ENISA) provides an overview of the current threat situation from cyber attacks and malware in its report &#8220;Threat Landscape 2020&#8221;. The outlook: frightening <\/strong><\/p><p><strong>The list of horrors: These 15 cyber threats are the most common<\/strong><\/p><ul><li>Malware<\/li><li>Web-based Attacks<\/li><li>Phishing<\/li><li>Web Application Attacks<\/li><li>SPAM<\/li><li>Distributed Denial of Service (DDoS)<\/li><li>Identity Theft<\/li><li>Data Breach<\/li><li>Insider Threat<\/li><li>Botnets<\/li><li>Physical Manipulation, Damage, Theft and Loss<\/li><li>Information Leakage<\/li><li>Ransomware<\/li><li>Cyber Espionage<\/li><li>Cryptojacking<\/li><\/ul><p> <\/p><p><strong>Here are the key takeaways from ENISA&#8217;s Threat Landscape report:<\/strong><\/p><ul><li>While malware is still listed as the No. 1 threat, threats from phishing, identity theft or extortionate malware are catching up strongly.<\/li><li>The main motive of the attackers remains personal enrichment.<\/li><li>Many cybersecurity incidents still go unnoticed or are only discovered after a long time \u2013 on average, only after six (!) months.<\/li><li>More and more attackers are using social media to further increase the efficiency of their attacks.<\/li><li>Attacks by state-controlled actors to obtain high-quality data and even state secrets continue to increase.<\/li><li>As digital technologies continue to diversify, the number of potential vulnerabilities in virtual and physical environments is increasing.<\/li><li>The pandemic has further fueled attacks on home offices, shops, administrations and critical infrastructure.<ul><li>During the pandemic, cybercriminals have been shown to develop their skills, adapt quickly and target relevant victim groups in a more targeted manner.<\/li><li>From copycats of popular brand websites to fraudulent services that never deliver the goods, the number of fake online shopping websites and fraudulent online retailers has reportedly increased during the COVID-19 pandemic<\/li><li>The number of incidents of cyberbullying and sextorsion also increased with the COVID-19 pandemic. The use of smartphones and social media platforms makes younger generations particularly vulnerable to these types of threats <\/li><li>The number of phishing victims in the EU continues to rise, with malicious actors using the topic of COVID-19 to lure them in. COVID-19-themed attacks include messages with malicious file attachments and messages with malicious links that redirect users to phishing websites or malware downloads <\/li><\/ul><\/li><\/ul><p> <\/p><p>ENISA&#8217;s &#8220;Threat Landscape&#8221; report makes it clear that there is still a long way to go to achieve a more secure digital environment. This is mainly due to the weakening of existing cyber security measures due to changes in work and infrastructure patterns as a result of the COVID-19 pandemic. This has led to an increase in personalized cyberattacks by cybercriminals using more advanced methods and techniques.  <\/p><p>And this will be with us at least as long as the pandemic itself. The end is open. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4d84bbc e-flex e-con-boxed e-con e-parent\" data-id=\"4d84bbc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-05a335d elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"05a335d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Image source: ENISA 23.10.2020 ENISA: Cyber threats are becoming increasingly sophisticated and targeted Cybersecurity | Cyberattacks | Protection For the eighth time, the European Union Agency for Cybersecurity (ENISA) provides an overview of the current threat situation from cyber attacks and malware in its report &#8220;Threat Landscape 2020&#8221;. The outlook: frightening The list of horrors: [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":27523,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[60],"tags":[],"class_list":["post-27524","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>ENISA: Cyber threats are becoming increasingly sophisticated and targeted - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/en\/enisa-cyber-threats-are-becoming-increasingly-sophisticated-and-targeted\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ENISA: Cyber threats are becoming increasingly sophisticated and targeted - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"Image source: ENISA 23.10.2020 ENISA: Cyber threats are becoming increasingly sophisticated and targeted Cybersecurity | Cyberattacks | Protection For the eighth time, the European Union Agency for Cybersecurity (ENISA) provides an overview of the current threat situation from cyber attacks and malware in its report &#8220;Threat Landscape 2020&#8221;. The outlook: frightening The list of horrors: [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/en\/enisa-cyber-threats-are-becoming-increasingly-sophisticated-and-targeted\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-29T07:21:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-30T14:49:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2020\/10\/Blog-Header-Enisa.png\" \/>\n\t<meta property=\"og:image:width\" content=\"730\" \/>\n\t<meta property=\"og:image:height\" content=\"412\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Anastasia Pamoukis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anastasia Pamoukis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/enisa-cyber-threats-are-becoming-increasingly-sophisticated-and-targeted\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/enisa-cyber-threats-are-becoming-increasingly-sophisticated-and-targeted\\\/\"},\"author\":{\"name\":\"Anastasia Pamoukis\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/6c87a2feea6439d0ead16c8f0f07e40b\"},\"headline\":\"ENISA: Cyber threats are becoming increasingly sophisticated and targeted\",\"datePublished\":\"2020-10-29T07:21:00+00:00\",\"dateModified\":\"2026-03-30T14:49:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/enisa-cyber-threats-are-becoming-increasingly-sophisticated-and-targeted\\\/\"},\"wordCount\":442,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/enisa-cyber-threats-are-becoming-increasingly-sophisticated-and-targeted\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/Blog-Header-Enisa.png\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/enisa-cyber-threats-are-becoming-increasingly-sophisticated-and-targeted\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/enisa-cyber-threats-are-becoming-increasingly-sophisticated-and-targeted\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/enisa-cyber-threats-are-becoming-increasingly-sophisticated-and-targeted\\\/\",\"name\":\"ENISA: Cyber threats are becoming increasingly sophisticated and targeted - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/enisa-cyber-threats-are-becoming-increasingly-sophisticated-and-targeted\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/enisa-cyber-threats-are-becoming-increasingly-sophisticated-and-targeted\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/Blog-Header-Enisa.png\",\"datePublished\":\"2020-10-29T07:21:00+00:00\",\"dateModified\":\"2026-03-30T14:49:13+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/enisa-cyber-threats-are-becoming-increasingly-sophisticated-and-targeted\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/enisa-cyber-threats-are-becoming-increasingly-sophisticated-and-targeted\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/enisa-cyber-threats-are-becoming-increasingly-sophisticated-and-targeted\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/Blog-Header-Enisa.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/Blog-Header-Enisa.png\",\"width\":730,\"height\":412,\"caption\":\"Blog Header Enisa Cyber Threats\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/enisa-cyber-threats-are-becoming-increasingly-sophisticated-and-targeted\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ENISA: Cyber threats are becoming increasingly sophisticated and targeted\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/6c87a2feea6439d0ead16c8f0f07e40b\",\"name\":\"Anastasia Pamoukis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g\",\"caption\":\"Anastasia Pamoukis\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\"],\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/author\\\/anastasia-pamoukis\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ENISA: Cyber threats are becoming increasingly sophisticated and targeted - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/en\/enisa-cyber-threats-are-becoming-increasingly-sophisticated-and-targeted\/","og_locale":"en_US","og_type":"article","og_title":"ENISA: Cyber threats are becoming increasingly sophisticated and targeted - Perseus Technologies","og_description":"Image source: ENISA 23.10.2020 ENISA: Cyber threats are becoming increasingly sophisticated and targeted Cybersecurity | Cyberattacks | Protection For the eighth time, the European Union Agency for Cybersecurity (ENISA) provides an overview of the current threat situation from cyber attacks and malware in its report &#8220;Threat Landscape 2020&#8221;. The outlook: frightening The list of horrors: [&hellip;]","og_url":"https:\/\/perseus.de\/en\/enisa-cyber-threats-are-becoming-increasingly-sophisticated-and-targeted\/","og_site_name":"Perseus Technologies","article_published_time":"2020-10-29T07:21:00+00:00","article_modified_time":"2026-03-30T14:49:13+00:00","og_image":[{"width":730,"height":412,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2020\/10\/Blog-Header-Enisa.png","type":"image\/png"}],"author":"Anastasia Pamoukis","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Anastasia Pamoukis","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/en\/enisa-cyber-threats-are-becoming-increasingly-sophisticated-and-targeted\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/en\/enisa-cyber-threats-are-becoming-increasingly-sophisticated-and-targeted\/"},"author":{"name":"Anastasia Pamoukis","@id":"https:\/\/perseus.de\/#\/schema\/person\/6c87a2feea6439d0ead16c8f0f07e40b"},"headline":"ENISA: Cyber threats are becoming increasingly sophisticated and targeted","datePublished":"2020-10-29T07:21:00+00:00","dateModified":"2026-03-30T14:49:13+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/en\/enisa-cyber-threats-are-becoming-increasingly-sophisticated-and-targeted\/"},"wordCount":442,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/en\/enisa-cyber-threats-are-becoming-increasingly-sophisticated-and-targeted\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2020\/10\/Blog-Header-Enisa.png","articleSection":["Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/en\/enisa-cyber-threats-are-becoming-increasingly-sophisticated-and-targeted\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/en\/enisa-cyber-threats-are-becoming-increasingly-sophisticated-and-targeted\/","url":"https:\/\/perseus.de\/en\/enisa-cyber-threats-are-becoming-increasingly-sophisticated-and-targeted\/","name":"ENISA: Cyber threats are becoming increasingly sophisticated and targeted - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/en\/enisa-cyber-threats-are-becoming-increasingly-sophisticated-and-targeted\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/en\/enisa-cyber-threats-are-becoming-increasingly-sophisticated-and-targeted\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2020\/10\/Blog-Header-Enisa.png","datePublished":"2020-10-29T07:21:00+00:00","dateModified":"2026-03-30T14:49:13+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/en\/enisa-cyber-threats-are-becoming-increasingly-sophisticated-and-targeted\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/en\/enisa-cyber-threats-are-becoming-increasingly-sophisticated-and-targeted\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/en\/enisa-cyber-threats-are-becoming-increasingly-sophisticated-and-targeted\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2020\/10\/Blog-Header-Enisa.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2020\/10\/Blog-Header-Enisa.png","width":730,"height":412,"caption":"Blog Header Enisa Cyber Threats"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/en\/enisa-cyber-threats-are-becoming-increasingly-sophisticated-and-targeted\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"ENISA: Cyber threats are becoming increasingly sophisticated and targeted"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/6c87a2feea6439d0ead16c8f0f07e40b","name":"Anastasia Pamoukis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g","caption":"Anastasia Pamoukis"},"sameAs":["https:\/\/perseus.de"],"url":"https:\/\/perseus.de\/en\/author\/anastasia-pamoukis\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/27524","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/comments?post=27524"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/27524\/revisions"}],"predecessor-version":[{"id":27525,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/27524\/revisions\/27525"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/media\/27523"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/media?parent=27524"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/categories?post=27524"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/tags?post=27524"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}