EU Prepares for Transnational Cyberattacks

[Critical Infrastructure Security](https://www.govinfosecurity.com/critical-infrastructure-security-c-525) , [Security Operations](https://www.govinfosecurity.com/security-operations-c-444)EU Prepares for Transnational Cyberattacks==========================================Cyber Blueprint Spells Out Measures to Coordinate Against Disruptive Hacks [Akshaya Asokan](https://www.govinfosecurity.com/authors/akshaya-asokan-i-2924) ([asokan_akshaya](https://www.twitter.com/asokan_akshaya)) • June 6, 2025 [](https://www.bankinfosecurity.com/eu-prepares-for-transnational-cyberattacks-a-28613#disqus_thread) * * * * * [Credit Eligible](/premium/pricing ‘As a BankInfoSecurity.com annual member, this content can be used toward your membership credits and transcript tracking.’)* [](/premium/pricing ‘As a BankInfoSecurity.com annual member, this content can be used toward your membership credits and transcript tracking.’)* Get Permission* ![EU Prepares for Transnational Cyberattacks](https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/eu-prepares-for-transnational-cyberattacks-showcase_image-4-a-28613.jpg) Image: Viacheslav Lopatin/ShutterstockEurope is girding for a possibility of a transnational cybersecurity incident through recommendations outlining a continental response for transnational cybersecurity threats.**See Also:** [OnDemand: Customer Details Leaked: Attacker Abused Login API Flaw](https://www.govinfosecurity.com/webinars/ondemand-customer-details-leaked-attacker-abused-login-api-flaw-w-5808?rf=RAM_SeeAlso)The Council of the European Union on Friday [approved](https://www.consilium.europa.eu/en/press/press-releases/2025/06/06/eu-adopts-blueprint-to-better-manage-european-cyber-crises-and-incidents/) a crisis management initiative that [seeks](https://digital-strategy.ec.europa.eu/en/library/cyber-blueprint-draft-council-recommendation) to improve ‘the EU’s overall preparedness for multi-dimensional hybrid threats.’
The EU Cyber Blueprint ‘serves as a practical tool for member states and EU bodies to work together to prepare for and respond to a cyber crisis that could affect our critical infrastructure and public security,’ said Henna Virkkunen, executive vice-president of the European Commission for technology sovereignty.
The development comes as the EU faces heightened cyber risk from nation-state hackers, particularly from Russian and Chinese hackers amid escalating geopolitical tensions (see: [*Russian Intelligence Hackers Stalk Western Logistics Firms*](/russian-intelligence-hackers-stalk-western-logistics-firms-a-28449)).Microsoft on Wednesday [warned](https://blogs.microsoft.com/on-the-issues/2025/06/04/microsoft-launches-new-european-security-program/) that European critical infrastructure continues to face ‘persistent’ and ‘prolific’ threats from Russian and Chinese hackers, with the highest number of hacks recorded in Germany, the United Kingdom and France.The Dutch government and Microsoft in May disclosed a hacking campaign by a novel Russian hacking group that it warned are targeting European and NATO allies (see: [*NATO Countries Targeted By New Russian Espionage Group*](/nato-countries-targeted-by-new-russian-espionage-group-a-28492)).The Cyber Blueprint recommends that the national computer incident response teams coordinate with the European cyber crisis liaison organization network, EU-CyCLONe to identify cyber incidents that could escalate to trans-national disruptive hacks. It encourages organizations to share information on incidents, tactics and actively exploited vulnerabilities to prevent and deter such hacks.The operations of CIRTs and EU-CyCLONe will be monitored by ENISA, the Europan Union Agency for Cybersecurity. The initiative will help in ‘strengthening’ the EU’s ‘cooperative efforts’ to tackle threats facing its critical infrastructure, said ENISA Director Juhan Lepassaar.Recommendations made by the EU Cyber Blueprint align with the Network and Information Systems Directive 2 that came into force October last year. The regulation mandates prompt incident reporting for IT service providers across a range of sectors such as energy, transport, healthcare and finance (see: [*Most EU Nations to Miss Upcoming NIS2 Deadline*](/most-eu-nations-to-miss-upcoming-nis2-deadline-a-26526)). ![Akshaya Asokan](https://6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/akshaya-asokan-largeImage-5-a-2924.jpg) #### [Akshaya Asokan](https://www.govinfosecurity.com/authors/akshaya-asokan-i-2924)*Senior Correspondent, ISMG* Asokan is a U.K.-based senior correspondent for Information Security Media Group’s global news desk. She previously worked with IDG and other publications, reporting on developments in technology, minority rights and education.[](https://twitter.com/asokan_akshaya) [](mailto:aasokan@ismg.io) ![NHS Ransomware Attack: Healthcare Industry Infrastructures Are Critical](https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/what-makes-healthcare-vulnerable-to-ransomware-showcase_image-10-a-25428.jpg) ##### [NHS Ransomware Attack: Healthcare Industry Infrastructures Are Critical](https://www.govinfosecurity.com/nhs-ransomware-attack-healthcare-industry-infrastructures-are-critical-a-25547?rf=RAM_Resources)![Elastic Security in action: public sector](https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/elastic-security-in-action-public-sector-pdf-1-w-13690.jpg) [whitepaper](https://www.govinfosecurity.com/whitepapers/elastic-security-in-action-public-sector-w-13690?rf=RAM_Resources)##### [Elastic Security in action: public sector](https://www.govinfosecurity.com/whitepapers/elastic-security-in-action-public-sector-w-13690?rf=RAM_Resources)![OnDemand | Cyber Resiliency: The Building Blocks for transforming Australia’s Enterprise Security and Risk Management](https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/live-webinar-cyber-resiliency-building-blocks-australias-enterprise-security-risk-management-landingPageImage-6-w-5461.jpg) ##### [OnDemand -| Cyber Resiliency: The Building Blocks for transforming Australia’s Enterprise Security and Risk Management](https://www.govinfosecurity.com/webinars/ondemand-cyber-resiliency-building-blocks-for-transforming-australias-w-5461?rf=RAM_Resources)![OnDemand – XDR: Five Factors to Keep in Mind for Better Implementation](https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/live-webinar-i-putting-x-in-edr-vmware-carbon-black-landingPageImage-9-w-4907.jpg) ##### [OnDemand – XDR: Five Factors to Keep in Mind for Better Implementation](https://www.govinfosecurity.com/webinars/ondemand-xdr-five-factors-to-keep-in-mind-for-better-implementation-w-4907?rf=RAM_Resources)![The #1 Cybersecurity Strategy – And Why to Use It in 2023](https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/combating-attackers-complexity-via-product-consolidation-showcase_image-10-a-21833.jpg) ##### [The #1 Cybersecurity Strategy – And Why to Use It in 2023](https://www.govinfosecurity.com/1-cybersecurity-strategy-to-use-in-2023-a-21833?rf=RAM_Resources)![](https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/us-supreme-court-grants-doge-unfettered-access-to-ssa-systems-showcase_image-8-a-28614.jpg) [Data Privacy](https://www.govinfosecurity.com/data-privacy-c-151)##### [US Supreme Court Grants DOGE Unfettered Access to SSA Systems](https://www.govinfosecurity.com/us-supreme-court-grants-doge-unfettered-access-to-ssa-systems-a-28614)![](https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/eu-prepares-for-transnational-cyberattacks-showcase_image-4-a-28613.jpg) [Critical Infrastructure Security](https://www.govinfosecurity.com/critical-infrastructure-security-c-525)##### [EU Prepares for Transnational Cyberattacks](https://www.govinfosecurity.com/eu-prepares-for-transnational-cyberattacks-a-28613)![](https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/da-sleep-center-worker-installed-secret-camera-in-bathrooms-showcase_image-7-a-28611.jpg) [Data Privacy](https://www.govinfosecurity.com/data-privacy-c-151)##### [DA: Sleep Center Worker Installed Secret Camera in Bathrooms](https://www.govinfosecurity.com/da-sleep-center-worker-installed-secret-camera-in-bathrooms-a-28611)![](https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/there-will-be-pain-cisa-cuts-spark-bipartisan-concerns-showcase_image-10-a-28610.jpg) [Cybersecurity Spending](https://www.govinfosecurity.com/cybersecurity-spending-c-664)##### [‘There Will Be Pain’: CISA Cuts Spark Bipartisan Concerns](https://www.govinfosecurity.com/there-will-be-pain-cisa-cuts-spark-bipartisan-concerns-a-28610)![](https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/editors-panel-infosecurity-europe-conference-2025-wrap-up-image_large-10-a-28609.jpg) [Artificial Intelligence -& Machine Learning](https://www.govinfosecurity.com/artificial-intelligence-machine-learning-c-469)##### [ISMG Editors: Infosecurity Europe Conference 2025 Wrap-Up](https://www.govinfosecurity.com/ismg-editors-infosecurity-europe-conference-2025-wrap-up-a-28609)[Overview](https://www.govinfosecurity.com/webinars/risk-management-framework-learn-from-nist-w-255) * Twitter* Facebook* LinkedIn* * * From heightened risks to increased regulations, senior leaders at all levels are pressured to improve their organizations’ risk management capabilities. But no one is showing them how – until now.Learn the fundamentals of developing a risk management program from the man who wrote the book on the topic: Ron Ross, computer scientist for the National Institute of Standards and Technology. In an exclusive presentation, Ross, lead author of NIST Special Publication 800-37 – the bible of risk assessment and management – will share his unique insights on how to:* Understand the current cyber threats to all public and private sector organizations;* Develop a multi-tiered risk management approach built upon governance, processes and information systems;* Implement NIST’s risk management framework, from defining risks to selecting, implementing and monitoring information security controls.Presented By————![Ron Ross](https://6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/ron-ross-smallImage-a-558.jpg) [Presented By](/authors/ron-ross-i-558)—————————————#### [Ron Ross](/authors/ron-ross-i-558)*Sr. Computer Scientist -& Information Security Researcher, National Institute of Standards and Technology (NIST)*

Related Tags:
NAICS: 517 – Telecommunications

NAICS: 541 – Professional

Scientific

Technical Services

NAICS: 221 – Utilities

NAICS: 518 – Computing Infrastructure Providers

Data Processing

Web Hosting

Related Services

NAICS: 92 – Public Administration

NAICS: 22 – Utilities

NAICS: 926 – Administration Of Economic Programs

NAICS: 51 – Information

Blog: GovInfoSecurity

Associated Indicators:
null