A curated list of annual cyber security reports - Centralized annual cybersecurity analysis and industry surveys
Definition: The cybersecurity landscape is constantly evolving, making it hard for CIOs, CISOs, and security leaders to keep up. They're flooded with annual reports from research consultancies, industry working groups, non-profits, and government agencies, and sifting through marketing material to find actionable insights is a major challenge. This list aims to cut through the noise by providing a vendor-neutral resource for the latest security trends, tools, and partnerships. It curates information from trusted sources, making it easier for security leaders to make informed decisions.
Disclaimer: The reports in this collection are limited to content which does not require a paid subscription, membership, or service contract. There are a variety of different business models and drivers that would cause information to be put behind a paywall, I would like to respect those companies and individuals. Consult the original authors for licensing of any report content.
Limitations: This is not a collection of project based information such as white papers, intelligence reports, technical specifications, or standards. I welcome all user submitted uploads or report requests, but we should draw a box around this awesome list. All reports will be sourced from the original author when possible and uploaded to Hybrid Analysis for an additional level of confidence, the result link will be included in the PDF commit notes. All PDF reports will also be converted to Markdown using AI, leveraging the AI Prompt found in this repository.
Acknowledgement: I would like to give recognition for other works that inspired this collection. Richard Stiennon and his annual analysis of the cybersecurity industry is significantly more comprehensive than this repository and deserves recognition. Additionally, Rick Howard's cyber cannon list of must-read books is an invaluable resource, catering to both leadership and practitioner levels within the field.
Annual Report Counts:
Reports have been classified into two categories by the source of data:
- Analysis: Reports generated from quantifying and qualifying intelligence from sensor networks or services.
- Survey: Reports generated from observations and feedback from surveys or consulting engagements.
The reports listed below are the most recent iteration, while past versions are stored in their corresponding yearly folders. After three years, if a source has not updated a report it will no longer be featured in the ReadMe.md file but will still be accessible within the repository directory corresponding to its respective year.
Reports will be classified by a header that describes their primary content or emphasis. While each report may discuss multiple topics, this categorization will help organize them. Under this header they will be sorted alphabetically.
- ASD - Cyber Threat Report (2024) - Insights into Australia’s evolving cyber threat landscape, attack trends, and defense strategies.
- BD - Product Security Annual Report (2023) - Highlights cybersecurity threats in healthcare, addressing the growing sophistication and frequency of cyberattacks through transparency, collaboration, and adherence to high security standards.
- Blackpoint - Annual Threat Report (2024) - Analyzes current cyber threats, attack techniques, and emerging trends, providing actionable intelligence for organizations to enhance their security posture.
- CheckPoint - Cybersecurity Report (2024) - Examines global cybersecurity trends, offering insights into attack vectors, threat actor tactics, and strategies for improving organizational cyber resilience.
- Cisco - Talos Year In Review (2023) - Provides a comprehensive analysis of cyber threats and attack trends observed by Cisco's threat intelligence team throughout the year.
- CrowdStrike - Threat Hunting Report (2024) - Provides comprehensive insights into over 245 advanced persistent threats (APTs) and adversary tactics through global threat monitoring and analysis.
- CrowdStrike - Global Threat Report (2024) - Analyzes global cyber threats, offering insights into adversary tactics, emerging attack trends, and strategies for improving cyber defense.
- DeepInstinct - Threat Landscape Report (2023) - Examines evolving cyber threats, offering insights into attack techniques, malware trends, and strategies for enhancing organizational cybersecurity.
- ENISA - Threat Landscape Report (2023) - An annual summary of key cybersecurity threats, trends, and attack techniques. It examines threat actors, motivations, impacts, and suggests mitigation strategies.
- Ensign - Cyber Threat Landscape Report (2024) - Analysis of key cyber threats across Asia, focusing on Singapore, Malaysia, Indonesia, South Korea, Australia, and Greater China.
- Expel - Annual Threat Report (2024) - Provides an overview of cyber threats and attack trends observed by Expel's security operations team throughout the year.
- FBI - Internet Crime Report (2023) - Examines cybercrime complaints to protect the public, track trends, support investigations, and promote awareness of internet-facilitated crimes.
- Flashpoint - Global Threat Intelligence Report (2024) - A comprehensive analysis of global cyber threats, providing insights into threat actor motivations, tactics, and emerging attack trends.
- Flashpoint - Midyear Cyber Threat Index (2024) - Provides a snapshot of current cyber threat trends, offering insights into evolving attack patterns and threat actor activities.
- Fortinet - Global Threat Landscape Report (2023) - Analyzes global cyber threats and attack trends, offering insights into emerging vulnerabilities, malware variants, and strategies for improving organizational cybersecurity.
- Google Cloud - Threat Horizons Report (2024) - Offers insights on cloud security risks and practical advice for businesses using cloud services, based on Google's research and expert knowledge.
- IBM - X-Force Threat Intelligence Index (2024) - Provides a comprehensive analysis of global cyber threats, offering insights into attack trends, threat actor tactics, and industry-specific vulnerabilities.
- Mandiant - MTrends Special Report (2024) - Offers insights into advanced persistent threats, emerging attack techniques, and strategies for improving organizational cyber defense.
- Microsoft - Digital Defense Report (2024) - Analyzes global cybersecurity trends, offering insights into threat actor tactics, emerging vulnerabilities, and strategies for improving digital defense.
- NCC Group - Threat Monitor Report (2023) - Provides an analysis of current cyber threats, offering insights into attack trends, vulnerabilities, and strategies for improving organizational cybersecurity.
- Rapid7 - Mid-Year Threat Review (2023) - Provides a snapshot of current cyber threats and attack trends, offering insights into emerging vulnerabilities and mitigation strategies.
- Rapid7 - Attack Intelligence Report (2024) - Analyzes attack patterns and techniques, offering insights into adversary tactics and strategies for improving organizational cyber defense.
- RedCanary - Threat Detection Report (2024) - Examines current attack techniques and detection strategies, offering insights into improving organizational threat detection capabilities.
- Secureworks - State of the Threat (2024) - Provides a detailed analysis of the evolving cybersecurity landscape based on global intelligence gathering and incident response data.
- SonicWall - Cyber Threat Report (2024) - Examines global cyber threats, offering insights into malware trends, attack vectors, and strategies for improving organizational cybersecurity.
- Sophos - Threat Report (2024) - Provides an analysis of current cyber threats and attack trends, offering insights into emerging vulnerabilities and strategies for improving cyber defense.
- Trellix - Advanced Threat Research Report (2024) - Provides highlights insights, intelligence, and guidance gleaned from multiple sources of critical data on cybersecurity threats.
- TrendMicro - Annual Cybersecurity Threat Report (2023) - Analysis of global cyber threats, examining attack trends, emerging vulnerabilities, and strategies for enhancing organizational security posture.
- Upstream - Global Automotive Cybersecurity Report (2024) - Analysis of over 1,468 automotive cybersecurity incidents, monitoring trends across open, deep, and dark web forums to help safeguard the Smart Mobility ecosystem against emerging threats.
- US Department of Defense - OSINT Strategy 2024–2028 (2024) - This strategy outlines the Department of Defense's approach to open-source intelligence (OSINT) as a vital resource for decision-makers and warfighters, emphasizing OSINT's role in enhancing situational awareness and operational effectiveness.
- WatchGuard - Threat Report (2024) - Provides an analysis of current cyber threats and attack trends, offering insights into network security challenges and strategies for improving organizational cybersecurity.
- White House - Cybersecurity Posture of the United States (2024) - Evaluates the U.S. cybersecurity posture, covering federal agency resilience against cyber threats, policy effectiveness, and readiness to counter emerging security risks affecting national interests.
- Escape - State of API Exposure (2024)
Analyzes API security across Fortune 1000 and CAC 40 companies, uncovering 30,000 exposed APIs and 100,000 API issues, emphasizing risks in large organizations. - RunZero - RunZero Research Report (2024) - Examines a broad range of organizational and network security issues through an innovative asset-centric approach, with a focus on "dark matter" in networks, segmentation issues, and unusual asset detection.
- Sonatype - 2024 in Open Source Malware Threat Report (2024)
Reports a 156% year-over-year increase in malicious open source packages, highlighting the growing threat of intentionally crafted malware in software supply chain attacks. - Synopsys - Open Source Risk Analysis Report (2024) - Examines security risks associated with open-source software components, offering insights into vulnerability trends and mitigation strategies.
- Veracode - State of Software Security (2024) - Examines trends in application security, offering insights into common vulnerabilities, secure development practices, and strategies for improving software security throughout the development lifecycle.
- Beyond Trust - Microsoft Vulnerability Report (2024) - Analyzes vulnerabilities in Microsoft products, offering insights into security trends and potential areas of concern for organizations relying on Microsoft technologies.
- Edgescan - Vulnerability Statistics Report (2024) Analyzes data from thousands of security assessments and penetration tests on millions of global assets to provide insights into the current state of full-stack security.
- Flexera - Annual Vulnerability Review (2023) - Provides a comprehensive analysis of global software vulnerabilities, offering insights into trends, severity, and impact across various software products and vendors.
- Nucleus - State of Vulnerability Management (2023) - Examines the current state of vulnerability management practices, highlighting challenges, trends, and best practices in identifying and addressing security vulnerabilities.
- Qualys - TruRisk Threat Research Report (2023) - Provides an in-depth analysis of vulnerabilities and threats, offering insights into risk assessment and prioritization strategies.
- Synack - State of Vulnerabilities Report (2024) This report looks at five industries (healthcare, financial services, U.S. federal government, technology and manufacturing) and their most common vulnerabilities to see how they stack up against each other.
- Synopsys - Software Vulnerability Snapshot (2023) - A snapshot of software vulnerability trends, highlighting common weaknesses, emerging threats, and strategies for improving software security.
- Trustwave - Financial Services Risk Radar Report (2024) Highlights the unique threat landscape facing the financial services sector, focusing on notable trends and the growing risk of insider threats. This report provides key insights into the cybersecurity challenges specific to this industry.
- Guidepoint - GRIT Ransomware Annual Report (2023) - A comprehensive analysis of ransomware trends, attack techniques, and mitigation strategies, providing valuable insights for organizations to enhance their ransomware resilience.
- PaloAlto - Unit 42 Ransomware Extortion Report (2023) - Examines current ransomware and extortion trends, offering insights into attacker tactics, ransom demands, and strategies for improving organizational resilience against ransomware attacks.
- Veeam - Ransomware Trends Report (2024) - Provides an overview of current ransomware attack patterns, data recovery challenges, and strategies for improving organizational ransomware preparedness and resilience.
- Zscaler - ThreatLabz State of Ransomware Report (2024) - A comprehensive analysis of global ransomware trends, examining attack techniques, ransom demands, and strategies for preventing and mitigating ransomware attacks.
- IBM - Cost of a Data Breach Report (2024) - Provides IT, risk management and security leaders with timely, quantifiable evidence to guide them in their strategic decision-making. This research studied 604 organizations impacted by data breaches between March 2023 and February 2024.
- Verizon - Data Breach Investigations Report (2024) - Analyzes global data breaches, offering insights into attack patterns, threat actor motivations, and strategies for improving organizational data security and incident response.
- Identity Theft Resource Center - Annual Data Breach Report (2023) - A review of 18,800+ data breaches since 2005, impacting 12 billion victims and exposing 19.8 billion records, focusing on root causes and compromised data types.
- AICD - Directors Introduction to AI (2024) - Provides an overview of artificial intelligence tailored for directors, highlighting its strategic implications, governance considerations, and best practices for AI implementation in organizations.
- IBM - X-Force Cloud Threat Landscape Report (2024) - Focuses on threats specific to cloud environments, offering insights into cloud security challenges and strategies for securing cloud infrastructure.
- Okta - The State of Secure Identity (2023) - Drawing on billions of authentications, this report explores trends and methods of common identity attacks, the role of AI in identity security, and unique attack patterns across industries, regions, and company sizes.
- Zimperium - Global Mobile Threat Report (2024) Highlights a growing trend of attackers prioritizing mobile devices as a primary target, focusing on threats like phishing and "mishing" (mobile phishing) covering the enterprise mobile footprint, global threat landscape, and specific industries targeted by these attacks.
- Zscaler - ThreatLabz AI Security Report (2024) - Examines the intersection of artificial intelligence and cybersecurity, offering insights into AI-powered threats, defensive applications of AI, and strategies for securing AI systems and models.
- Accenture - State of Cybersecurity Resilience (2023) - Provides insights into the state of cybersecurity resilience across various industries, highlighting key trends and challenges faced by organizations.
- Aon - Intangible vs. Tangible Risk Report (2024) - Analyzes cyber and enterprise risk management trends from a survey of over 2,300 respondents across global regions, providing insights into the evolving landscape of tangible and intangible risks.
- Deloitte - Future of Cyber Survey (2023) -Explores the future of cybersecurity, providing insights into emerging trends, technologies, and strategies across different sectors.
- FERMA - Global Risk Manager Survey Report (2024) - Analysis of global risk management practices across 77 countries and six regional associations.
- ISC2 - Cyberthreat Defense Report (2024) - Examines the current state of cyberthreat defense, including emerging threats and defense strategies across various industries.
- KnowBe4 - Cybersecurity Culture Report (2024) - Explores the state of cybersecurity culture in organizations, highlighting trends and best practices across different sectors.
- Kong - API Security Perspectives (2025) Outlines the growing threat of AI-enhanced attacks on APIs and emphasizes the need for robust API security measures and the rising risks associated with these new types of threats.
- Norton - Cyber Safety Insights Report (2023) - Provides insights into consumer cyber safety trends and challenges across various industries.
- Proofpoint - Voice of the CISO Report (2024) - Insights into the perspectives and challenges faced by Chief Information Security Officers across different sectors.
- PwC - Global Digital Trust Insights (2024) - Examines global trends in digital trust and cybersecurity across various industries.
- SANS - SANS Cyber Threat Intelligence Survey (2023) - Provides insights into the current state of cyber threat intelligence across different sectors.
- Splunk - State of Security (2024) - Provides an overview of the current state of security, including trends and challenges across different sectors.
- USTelecom - Cybersecurity Culture (2023) - Examines the state of cybersecurity culture in the telecommunications industry and related sectors.
- Vanta - State of Trust Report (2024) - Explores the growing challenges in building and maintaining trust for organizations, focusing on security risks, compliance burdens, and the increasing third-party vendor risks.
- Verizon - Mobile Security Index (2024) - Provides insights into mobile security trends and challenges across various industries.
- World Economic Forum - Global Cybersecurity Outlook (2024) - A global perspective on cybersecurity trends and challenges across different sectors.
- ArmorCode - State of Application Security (2023) - Examines the current landscape of application security, including emerging threats, best practices, and industry-wide trends.
- BlackDuck - Global State of DevSecOps (2024) - Provides insights into the global state of DevSecOps practices and trends across different sectors.
- Checkmarx - Future of Application Security (2024) - Reveals how key stakeholders are responding to the challenges in Application Security from a broad range of industries globally.
- Checkmarx - State of Software Supply Chain Security (2024) - Provides insights into current trends in supply chain threats across industries such as banking and finance, insurance, software, technology, engineering, manufacturing, industrial, and public sector.
- Cycode - State of Application Security Posture Management (2025)
Examines application security challenges and strategies from the perspectives of CISOs, AppSec Directors, and DevSecOps managers across the UK, US, and Germany. - Synopsys - SANS 2023 DevSecOps Survey (2023) - Examines the current state of DevSecOps practices across various industries.
- Snyk - State of Open Source Security (2023) - Examines the current state of open source security, including trends and challenges across various industries.
- Fortinet - Cloud Security Report (2024) - Examines the state of cloud security, highlighting key challenges, trends, and best practices for organizations across various industries.
- ISC2 - Cloud Security Report (2024) - Provides insights into cloud security challenges, trends, and strategies across different sectors.
- Mend - State of Supply Chain Threats (2023) - Examines the current state of supply chain threats and vulnerabilities across different sectors.
- PaloAlto - State of Cloud Native Security Report (2024) - Examines the current state of cloud-native security, including trends, challenges, and best practices across different sectors.
- Sonatype - State of Cloud Security Report (2024) - Provides insights into the state of cloud security and software supply chain management across different sectors.
- Sophos - State of Cloud Security Report (2023) - Examines the current state of cybersecurity, including trends and challenges faced by organizations across various industries.
- Google - Cybersecurity Forecast 2025 (2025) - Insights from Google Cloud leaders on emerging cybersecurity trends.
- Astrix - State of Non Human Identity (2024) - Highlights growing concerns over non-human identities as attack vectors, limited automation and visibility into API and third-party connections, and an increasing investment in NHI security.
- ConductorOne - Identity Security Outlook Report (2024)
Highlights how increasing technological and organizational complexity are driving new identity risks. - CyberArk - Identity Security Threat Landscape Report (2024)
Examines the impact of cyberattacks on identity, including cyber debt, GenAI, machine identities, and third- and fourth-party risks. - IDS Alliance - 2024 Trends in Securing Digital Identities (2024) - Provides insights into current plans, historical trends, and approaches to cybersecurity and identity management.
- Omada - State of Identity Governance (2024)
Highlights the modernization of identity governance driven by digital transformation and hybrid workforces, emphasizing SaaS-based solutions, analytics, and automation for scalable and secure identity management. - ManageEngine - Identity Security Survey (2024)
Explores global identity security readiness across industries and roles, examining the rising tide of AI-driven phishing, social engineering, and credential theft.
- Bugcrowd - The Total Economic Impact Of Bugcrowd Managed Bug Bounty (2024) - Analyzes the economic benefits and impacts of Bugcrowd's managed bug bounty programs, supported by data-driven insights from Forrester.
- Cobalt - State of Pentesting (2024) - Offers an overview of the current state of penetration testing, including trends, challenges, and best practices across various industries.
- Fortra - Penetration Testing Report (2024) - Provides insights into the current landscape of penetration testing, including common vulnerabilities and industry-specific challenges.
- HackerOne - Hacker Powered Security Report (2024) - Explores the state of hacker-powered security, including trends in bug bounty programs and vulnerability disclosure across industries.
- Cisco - Data Privacy Benchmark Study (2024) - Provides insights into data privacy trends, challenges, and breaches across various industries.
- Code42 - Annual Data Exposure Report (2024)
Highlights insider threat risks and trends based on insights from over 700 security professionals. - Immuta - State of Data Security Report (2024) - Examines the current state of data security, including challenges, trends, and best practices across various industries.
- Proofpoint - Data Loss Landscape (2024) - Provides an overview of the data loss landscape, including trends and challenges faced by organizations across various industries.
- Proofpoint - Global Email Security Market Report (2024) - Benchmarks 21 top email security vendors, highlighting growth opportunities and market trends.
- Cyberreason - Ransomware The True Cost to Business (2024) - Examines the true cost of ransomware attacks on businesses across different sectors.
- Fortinet - Global Ransomware Report (2023) - Provides a global overview of ransomware trends and impacts across various industries.
- Sophos - State of Ransomware (2024) - Examines ransomware attack methods, likelihood, and business impacts based on insights from 5,000 IT and cybersecurity leaders across 14 countries.
- Spycloud - Ransomware Defense Report (2024) - Examines malware and ransomware defense strategies and trends across different sectors.
- HiddenLayer - AI Threat Report (2024) - Provides insights into the AI threat landscape across various industries.
- Snyk - AI Generated Code Security Report (2023) - Examines the security implications of AI-generated code across different sectors.
Annual reports are the result of a collaborative effort, combining research from both paid and non-profit sources, drawn from within the organization and the broader cybersecurity community. These reports rely on the contributions of various organizations that help shape the field by setting standards, offering certifications, conducting research, and influencing policy.
The categories below highlight the diverse roles these organizations play in building cybersecurity programs and advancing best practices. By exploring these groups, readers can gain insight into the ecosystem that underpins the development of annual reports and drives progress in the industry.
Research Consulting: These are organizations that offer paid research services, market analysis, and consulting in the field of information technology and cybersecurity.
Standards and Certifications: Organizations involved in setting cybersecurity standards, providing certifications, and creating frameworks for best practices.
Threat Intelligence and Incident Response: Organizations focused on sharing threat intelligence, coordinating cyber incident responses, and combating cyber threats.
Policy and Advocacy: Institutions shaping cybersecurity policies, regulations, and public awareness on a national or international scale.
Working Groups: These are collaborative organizations or professional associations that conduct research, share information, and develop best practices in cybersecurity.
Government and Non-profits: This category includes government agencies and non-profit organizations dedicated to cybersecurity research, policy development, and public awareness.
- 451 Research - A technology research and advisory firm specializing in emerging technology segments including cybersecurity market analysis and trends.
- ABI Research - A technology market intelligence company providing strategic guidance on transformative technologies, including cybersecurity and digital security.
- Forrester Research - An advisory company that offers paid research, consulting, and event services specialized in market research for information technology.
- Frost & Sullivan - A consulting firm offering market research and analysis in cybersecurity, with particular focus on emerging technologies and market opportunities.
- Gartner - A technology research and consulting firm which offers private paid consulting as well as executive programs and conferences.
- GigaOm - A research firm offering practical, hands-on, practitioner-driven research for businesses.
- International Data Corporation (IDC) - A global provider of market intelligence and advisory services.
- KuppingerCole - A global analyst company specializing in information security, identity & access management, and risk management.
- Omdia - A global technology research powerhouse focusing on cybersecurity market analysis and digital transformation.
- American Institute of CPAs - The AICPA SOC2 is a framework for managing and safeguarding customer data based on five trust service criteria: Security, Availability, Processing Integrity, Confidentiality, and Privacy.
- The Information Security Forum (ISF) - A global, independent organization dedicated to benchmarking and sharing best practices in information security.
- The International Organization for Standardization (ISO) - An international organizational body composed of representatives which conduct closed research for creation of standards.
- The Information Systems Audit and Control Association (ISACA) - An international professional association focused on IT governance, which conducts research for and on behalf of the members.
- The International Information System Security Certification Consortium (ISC)² - An American not-for-profit organization which conducts research for consumers of their cybersecurity training and certifications.
- SANS Institute - A private U.S. for-profit company which conducts research for consumers of their cybersecurity training and certifications.
- Trusted Computing Group (TCG) - Develops and promotes open standards for hardware-enabled security.
- The Anti-Phishing Working Group (APWG) - A global coalition focused on unifying the global response to cybercrime.
- The Cyber Threat Alliance (CTA) - An industry-driven group of cybersecurity organizations that share threat intelligence and conduct collaborative research to combat cyber threats.
- The Forum of Incident Response and Security Teams (FIRST) - Provides platforms, means and tools for incident responders to always find the right partner and to collaborate efficiently.
- The Global Cyber Alliance (GCA) - An international, cross-sector effort dedicated to reducing cyber risk.
- The Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) - Focuses on operational issues of Internet abuse including botnets, malware, spam, viruses, and mobile messaging abuse.
- Ponemon Institute - Considered the pre-eminent research center dedicated to privacy, data protection and information security policy.
- The Rand Corporation - An American not-for-profit organization which conducts research and analysis on various aspects of cybersecurity and cyber policy focused on national security.
- Center for Strategic and International Studies (CSIS) - Technology Policy Program - A think tank with a Technology Policy Program that conducts research and provides insights into technology and cybersecurity policies.
- Electronic Frontier Foundation (EFF) - A non-profit organization defending civil liberties in the digital world, including privacy and cybersecurity issues.
- The Internet Security Alliance (ISA) - A multi-sector trade association focused on thought leadership, policy advocacy, and standards development for cybersecurity.
- World Economic Forum (Centre for Cybersecurity) - A global initiative that brings together stakeholders from industry, government, and academia to improve cybersecurity globally and secure the digital economy.
- The Cloud Security Alliance (CSA) - Promotes best practices for providing security assurance within cloud computing.
- The Internet Engineering Task Force (IETF) - Develops and promotes internet standards, including those related to security.
- The Open Web Application Security Project (OWASP) - A professional community that produces research concerning web application security, made freely available to the online community.
- Industrial Control Systems Joint Working Group (ICSJWG) - Facilitates information sharing and collaboration for cybersecurity in industrial control systems.
- The Open Source Security Foundation (OpenSSF) - A cross-industry collaboration to improve the security of open source software.
- Web Application Security Consortium (WASC) - An international group of experts, industry practitioners, and organizational representatives who produce security standards and research.
- Australian Cyber Security Centre (ACSC) - Provides cyber security advice and support to Australian businesses and individuals.
- Canadian Centre for Cyber Security - Canada's national authority on cybersecurity.
- Center for Internet Security (CIS) - An American non-profit organization that provides cybersecurity solutions and best practices.
- Cybersecurity and Infrastructure Security Agency (CISA) - A U.S. government agency responsible for enhancing the security and resilience of the nation's critical infrastructure.
- Cybersecurity Forum Initiative (CSFI) - An American non-profit organization that promotes cybersecurity awareness and research.
- Cyber Peace Institute - A non-profit organization focused on reducing the impact of cyberattacks on civilians and promoting peace in cyberspace by supporting international cooperation and collective action.
- European Union Agency for Cybersecurity (ENISA) - A European Union agency that contributes to EU cybersecurity policy, enhances trust in digital services, and supports incident response capabilities across Europe.
- Europol - European Cybercrime Centre (EC3) - A strategic alliance focused on combating cybercrime within the European Union.
- German Federal Office for Information Security (BSI) - Germany's national cyber security authority providing IT security services and guidance.
- Internet Security Research Group (ISRG) - A non-profit organization focused on reducing financial, technological, and educational barriers to secure communication over the Internet.
- Japan National Center of Incident Readiness and Strategy for Cybersecurity (NISC) - Japan's central organization for national cybersecurity strategy and incident response.
- Korean Internet & Security Agency (KISA) - South Korea's government agency dedicated to promoting cybersecurity and a safer internet environment.
- MITRE Corporation - An American not-for-profit organization which conducts research and development supporting various U.S. government agencies.
- National Cyber Security Centre (NCSC) - The UK's technical authority for cyber incidents.
- National Cyber Security Centre - Netherlands (NCSC-NL) - The Dutch national cyber security center providing guidance and incident response.
- National Institute of Standards and Technology (NIST) - A U.S. agency that develops cybersecurity standards and guidelines.
- Norwegian National Security Authority (NSM) - Norway's expert body for information and object security, providing guidance and incident response capabilities.
- Singapore Cyber Security Agency (CSA) - Singapore's national agency overseeing cybersecurity strategy and development.
Please refer to the guidelines at CONTRIBUTING.md for details.