{
    "file_item": {
        "filepath": "threat-intelligence",
        "filename": "TLP-CLEAR-CERT-EU-TLR-2024-v1.pdf"
    },
    "title": "Threat Landscape Report 2024 - A Year In Review",
    "publish_date": "25-02-2025 15:00:00",
    "description": "Threat Landscape Report 2024 - A Year In Review",
    "url_title": "tlr2024",
    "content_markdown": "CERT-EU\u2019s annual Threat Landscape Report 2024 is out!\n\nThis past year, cyberattacks followed global events like clockwork: elections, conflicts, international summits... If it made headlines, it likely attracted threat actors.\n\nSome key takeaways from our [Threat Landscape Report 2024](https://www.cert.europa.eu/publications/threat-intelligence/tlr2024/pdf):\n\n- We tracked 110 threat actors active in the vicinity of Union entities. Our constituents had critical exposure to 20 of them.\n- 44% of the malicious activities of interest we analysed were linked to cyberespionage and/or prepositioning.\n- Union entities experienced 15 significant incidents. Five of them involved zero-day vulnerabilities.\n- Notable recurring techniques included ORBs, AitM, LoL, and API abuse.\n- Attackers have a soft spot for good supply-chain compromises.\n- Service providers took a hit: telecoms, cybersecurity firms, and remote access providers were prime targets.\n- In our vicinity, defence, transport, and tech were the most targeted sectors.\n\nThe full report is packed with insights, trends, and hard lessons from 2024. Stay informed. Stay secure. And maybe even install that software patch you\u2019ve been ignoring?\n\n[Read the full report](https://www.cert.europa.eu/publications/threat-intelligence/tlr2024/pdf).",
    "content_html": "<p>CERT-EU\u2019s annual Threat Landscape Report 2024 is out!</p><p>This past year, cyberattacks followed global events like clockwork: elections, conflicts, international summits... If it made headlines, it likely attracted threat actors.</p><p>Some key takeaways from our <a rel=\"noopener\" target=\"_blank\" href=\"https://www.cert.europa.eu/publications/threat-intelligence/tlr2024/pdf\">Threat Landscape Report 2024</a>:</p><ul><li>We tracked 110 threat actors active in the vicinity of Union entities. Our constituents had critical exposure to 20 of them.</li><li>44% of the malicious activities of interest we analysed were linked to cyberespionage and/or prepositioning.</li><li>Union entities experienced 15 significant incidents. Five of them involved zero-day vulnerabilities.</li><li>Notable recurring techniques included ORBs, AitM, LoL, and API abuse.</li><li>Attackers have a soft spot for good supply-chain compromises.</li><li>Service providers took a hit: telecoms, cybersecurity firms, and remote access providers were prime targets.</li><li>In our vicinity, defence, transport, and tech were the most targeted sectors.</li></ul><p>The full report is packed with insights, trends, and hard lessons from 2024. Stay informed. Stay secure. And maybe even install that software patch you\u2019ve been ignoring?</p><p><a rel=\"noopener\" target=\"_blank\" href=\"https://www.cert.europa.eu/publications/threat-intelligence/tlr2024/pdf\">Read the full report</a>.</p>",
    "licence": {
        "title": "Creative Commons Attribution 4.0 International (CC-BY 4.0)",
        "link": "https://creativecommons.org/licenses/by/4.0/",
        "restrictions": "https://cert.europa.eu/legal-notice",
        "author": "The Cybersecurity Service for the Union institutions, bodies, offices and agencies"
    }
}