{"id":992327,"date":"2025-11-03T00:45:45","date_gmt":"2025-11-02T21:45:45","guid":{"rendered":"https:\/\/gpss.ro\/threat-intelligence\/threat-landscape-report-2024-a-year-in-review\/"},"modified":"2025-11-03T00:45:45","modified_gmt":"2025-11-02T21:45:45","slug":"threat-landscape-report-2024-a-year-in-review","status":"publish","type":"threat_intelligence","link":"https:\/\/delve.ro\/ro\/threat-intelligence\/threat-landscape-report-2024-a-year-in-review\/","title":{"rendered":"Threat Landscape Report 2024 &#8211; A Year In Review"},"content":{"rendered":"<div class=\"gpss-language-switcher\" style=\"margin-bottom: 20px; padding: 15px; background: #f0f9ff; border-left: 4px solid #3b82f6; border-radius: 8px;\">\n            <div style=\"display: flex; align-items: center; justify-content: space-between; flex-wrap: wrap; gap: 10px;\">\n                <div style=\"display: flex; align-items: center; gap: 10px;\">\n                    <span style=\"font-weight: 600; color: #1e40af;\">\ud83c\udf0d Limb\u0103 \/ Language:<\/span>\n                    <button onclick=\"switchLanguage('en')\" id=\"btn-lang-en\" class=\"lang-btn lang-btn-active\" style=\"padding: 8px 16px; background: #3b82f6; color: white; border: none; border-radius: 6px; cursor: pointer; font-weight: 600; transition: all 0.3s;\">\n                        \ud83c\uddec\ud83c\udde7 English (Original)\n                    <\/button>\n                    <button onclick=\"switchLanguage('ro')\" id=\"btn-lang-ro\" class=\"lang-btn\" style=\"padding: 8px 16px; background: #e5e7eb; color: #374151; border: none; border-radius: 6px; cursor: pointer; font-weight: 600; transition: all 0.3s;\">\n                        \ud83c\uddf7\ud83c\uddf4 Rom\u00e2n\u0103\n                    <\/button>\n                <\/div>\n                <small style=\"color: #6b7280; font-style: italic;\">Traducere automat\u0103 \/ Automatic translation<\/small>\n            <\/div>\n        <\/div>\n\n        <div id=\"content-en\" class=\"lang-content\" style=\"display: block;\">\n            <div class=\"article-content\"><p>CERT-EU\u2019s annual Threat Landscape Report 2024 is out!<\/p><p>This past year, cyberattacks followed global events like clockwork: elections, conflicts, international summits... If it made headlines, it likely attracted threat actors.<\/p><p>Some key takeaways from our <a rel=\"noopener\" target=\"_blank\" href=\"https:\/\/www.cert.europa.eu\/publications\/threat-intelligence\/tlr2024\/pdf\">Threat Landscape Report 2024<\/a>:<\/p><ul><li>We tracked 110 threat actors active in the vicinity of Union entities. Our constituents had critical exposure to 20 of them.<\/li><li>44% of the malicious activities of interest we analysed were linked to cyberespionage and\/or prepositioning.<\/li><li>Union entities experienced 15 significant incidents. Five of them involved zero-day vulnerabilities.<\/li><li>Notable recurring techniques included ORBs, AitM, LoL, and API abuse.<\/li><li>Attackers have a soft spot for good supply-chain compromises.<\/li><li>Service providers took a hit: telecoms, cybersecurity firms, and remote access providers were prime targets.<\/li><li>In our vicinity, defence, transport, and tech were the most targeted sectors.<\/li><\/ul><p>The full report is packed with insights, trends, and hard lessons from 2024. Stay informed. Stay secure. And maybe even install that software patch you\u2019ve been ignoring?<\/p><p><a rel=\"noopener\" target=\"_blank\" href=\"https:\/\/www.cert.europa.eu\/publications\/threat-intelligence\/tlr2024\/pdf\">Read the full report<\/a>.<\/p><\/div>\n        <\/div>\n\n        <div id=\"content-ro\" class=\"lang-content\" style=\"display: none;\">\n            <div class=\"article-content\"><?xml encoding=\"UTF-8\"><p>Raportul anual 2024 al peisajului amenin&#539;&#259;rilor CERT-EU este lansat!<\/p><p>Anul trecut, atacurile cibernetice au urmat evenimente globale cum ar fi mecanismul de ceas: alegeri, conflicte, summituri interna&#539;ionale... Dac&#259; au f&#259;cut titluri, probabil c&#259; au atras actori amenin&#539;&#259;ri.<\/p><p>C&acirc;teva concluzii cheie de la<a rel=\"noopener\" target=\"_blank\" href=\"https:\/\/www.cert.europa.eu\/publications\/threat-intelligence\/tlr2024\/pdf\">Raportul peisajului amenin&#539;&#259;rilor 2024<\/a>:<\/p><ul><li>Am urm&#259;rit 110 actori ai amenin&#539;&#259;rilor care activeaz&#259; &icirc;n vecin&#259;tatea entit&#259;&#539;ilor Uniunii. Aleg&#259;torii no&#537;tri au avut o expunere critic&#259; la 20 dintre ei.<\/li><li>44% dintre activit&#259;&#539;ile r&#259;u inten&#539;ionate de interes pe care le-am analizat au fost legate de spionaj cibernetic &#537;i\/sau prepozi&#539;ionare.<\/li><li>Entit&#259;&#539;ile Uniunii au suferit 15 incidente semnificative. Cinci dintre ele implicau vulnerabilit&#259;&#539;i zero-day.<\/li><li>Tehnicile recurente notabile au inclus ORB-uri, AitM, LoL &#537;i abuzul API.<\/li><li>Atacatorii au un punct slab pentru compromisuri bune ale lan&#539;ului de aprovizionare.<\/li><li>Furnizorii de servicii au fost loviti: telecomunica&#539;iile, firmele de securitate cibernetic&#259; &#537;i furnizorii de acces la distan&#539;&#259; au fost &#539;inte principale.<\/li><li>&Icirc;n vecin&#259;tatea noastr&#259;, ap&#259;rarea, transportul &#537;i tehnologia au fost sectoarele cele mai vizate.<\/li><\/ul><p>Raportul complet este plin de perspective, tendin&#539;e &#537;i lec&#539;ii grele din 2024. Fi&#539;i informat. R&#259;m&acirc;i &icirc;n siguran&#539;&#259;. &#536;i poate chiar instala&#539;i acel patch software pe care l-a&#539;i ignorat?<\/p><p><a rel=\"noopener\" target=\"_blank\" href=\"https:\/\/www.cert.europa.eu\/publications\/threat-intelligence\/tlr2024\/pdf\">Citi&#539;i raportul complet<\/a>.<\/p><\/div>\n        <\/div>\n\n        <script>\n        function switchLanguage(lang) {\n            \/\/ Ascunde ambele versiuni\n            document.getElementById(\"content-ro\").style.display = \"none\";\n            document.getElementById(\"content-en\").style.display = \"none\";\n\n            \/\/ Reseteaz\u0103 stilurile butoanelor\n            document.querySelectorAll(\".lang-btn\").forEach(function(btn) {\n                btn.style.background = \"#e5e7eb\";\n                btn.style.color = \"#374151\";\n                btn.classList.remove(\"lang-btn-active\");\n            });\n\n            \/\/ Afi\u0219eaz\u0103 versiunea selectat\u0103\n            if (lang === \"ro\") {\n                document.getElementById(\"content-ro\").style.display = \"block\";\n                document.getElementById(\"btn-lang-ro\").style.background = \"#3b82f6\";\n                document.getElementById(\"btn-lang-ro\").style.color = \"white\";\n                document.getElementById(\"btn-lang-ro\").classList.add(\"lang-btn-active\");\n            } else {\n                document.getElementById(\"content-en\").style.display = \"block\";\n                document.getElementById(\"btn-lang-en\").style.background = \"#3b82f6\";\n                document.getElementById(\"btn-lang-en\").style.color = \"white\";\n                document.getElementById(\"btn-lang-en\").classList.add(\"lang-btn-active\");\n            }\n\n            \/\/ Salveaz\u0103 preferin\u021ba \u00een localStorage\n            localStorage.setItem(\"gpss_preferred_language\", lang);\n        }\n\n        \/\/ Restaureaz\u0103 preferin\u021ba utilizatorului la \u00eenc\u0103rcare\n        document.addEventListener(\"DOMContentLoaded\", function() {\n            var preferredLang = localStorage.getItem(\"gpss_preferred_language\") || \"ro\";\n            switchLanguage(preferredLang);\n        });\n\n        \/\/ Hover effects pentru butoane\n        document.querySelectorAll(\".lang-btn\").forEach(function(btn) {\n            btn.addEventListener(\"mouseenter\", function() {\n                if (!this.classList.contains(\"lang-btn-active\")) {\n                    this.style.background = \"#bfdbfe\";\n                    this.style.color = \"#1e40af\";\n                }\n            });\n            btn.addEventListener(\"mouseleave\", function() {\n                if (!this.classList.contains(\"lang-btn-active\")) {\n                    this.style.background = \"#e5e7eb\";\n                    this.style.color = \"#374151\";\n                }\n            });\n        });\n        <\/script>\n\n        <style>\n        .lang-btn:hover {\n            transform: translateY(-2px);\n            box-shadow: 0 4px 12px rgba(59, 130, 246, 0.3);\n        }\n        .lang-btn-active {\n            box-shadow: 0 4px 12px rgba(59, 130, 246, 0.4);\n        }\n        <\/style>","protected":false},"excerpt":{"rendered":"<p>\ud83c\udf0d Limb\u0103 \/ Language: \ud83c\uddec\ud83c\udde7 English (Original) \ud83c\uddf7\ud83c\uddf4 Rom\u00e2n\u0103 Traducere automat\u0103 \/ Automatic translation CERT-EU\u2019s annual Threat Landscape Report 2024 is out!This past year, cyberattacks followed global events like clockwork: elections, conflicts, international summits&#8230; If it made headlines, it likely attracted threat actors.Some key takeaways from our Threat Landscape Report 2024:We tracked 110 threat actors [&hellip;]<\/p>\n","protected":false},"featured_media":0,"template":"","meta":{"footnotes":""},"ti_category":[198],"ti_source":[172],"ti_severity":[187],"class_list":["post-992327","threat_intelligence","type-threat_intelligence","status-publish","hentry","ti_category-threat-actor","ti_source-cert-eu","ti_severity-critical"],"_links":{"self":[{"href":"https:\/\/delve.ro\/ro\/wp-json\/wp\/v2\/threat-intelligence\/992327","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/delve.ro\/ro\/wp-json\/wp\/v2\/threat-intelligence"}],"about":[{"href":"https:\/\/delve.ro\/ro\/wp-json\/wp\/v2\/types\/threat_intelligence"}],"version-history":[{"count":0,"href":"https:\/\/delve.ro\/ro\/wp-json\/wp\/v2\/threat-intelligence\/992327\/revisions"}],"wp:attachment":[{"href":"https:\/\/delve.ro\/ro\/wp-json\/wp\/v2\/media?parent=992327"}],"wp:term":[{"taxonomy":"ti_category","embeddable":true,"href":"https:\/\/delve.ro\/ro\/wp-json\/wp\/v2\/ti_category?post=992327"},{"taxonomy":"ti_source","embeddable":true,"href":"https:\/\/delve.ro\/ro\/wp-json\/wp\/v2\/ti_source?post=992327"},{"taxonomy":"ti_severity","embeddable":true,"href":"https:\/\/delve.ro\/ro\/wp-json\/wp\/v2\/ti_severity?post=992327"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}