Matthias Kettemann recently intervened on behalf of EuRepoC to the UN Open-Ended Working Group on Information and Communication Technologies (OEWG).
Research Paper: The EU’s Application of the Cyber Diplomacy Toolbox
The first paper examining the application of the EU’s Cyber Diplomacy Toolbox (CDT) by EU institutions over the past six years.
Major Cyber Incident
Through exploiting SolarWinds software as a point of entry in 2019, APT29 was able to steal data and identities from several EU institutions, nine US government agencies, and around 100 private sector companies from around the world. Linda Liang and Mika Kerttunen reveal how this unprecedented, highly complex cyber espionage campaign was carried out.
EuRepoC Articles
Concise and to-the-point publications analysing current issues on cybersecurity and cyber conflict
Advanced Persistent Threat Profiles
Standardised profiles analysing the conflict activities and attribution processes linked to the most potent APT groups
Database of Cyber Incidents
Continuously updated and fully open-access database of cyber incidents with over 60 variables coded by our experts
About us
The European Repository of Cyber Incidents (EuRepoC) is an independent research consortium dedicated to providing evidence-based scientific analysis of cyber incidents for a better understanding of the current cyber threat environment. Its resources include user-specific, reliable data based on an interdisciplinary perspective.
MORE ABOUT US >
Our database
We provide a comprehensive, inter-disciplinary and continuously updated database of cyber incidents worldwide:
● Covering incidents from the year 2000 to the present
● ~3,000 articles from 220 sources scanned and curated daily
● Each cyber incident is coded across 60 variables by our experts
EXPLORE OUR DATA >
Explore our cyber trackers
Latest news
The EuRepoC team has posted a new APT Profile on our website: Conti/Wizard Spider.
In her Spotlight Article, "Turning the tables on the attackers: how to hack the hackers’ supply chains," Kerstin Zettl-Schabath discusses options to disrupt cybercrime services.