{"id":48469,"date":"2022-09-15T14:13:06","date_gmt":"2022-09-15T14:13:06","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/33845\/EU-Proposes-Rules-Targeting-Smart-Devices-With-Cybersecurity-Risks.html"},"modified":"2022-09-15T14:13:06","modified_gmt":"2022-09-15T14:13:06","slug":"eu-proposes-rules-targeting-smart-devices-with-cybersecurity-risks","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/eu-proposes-rules-targeting-smart-devices-with-cybersecurity-risks\/","title":{"rendered":"EU Proposes Rules Targeting Smart Devices With Cybersecurity Risks"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.reuters.com\/resizer\/nrWuK0nVIcUlDqzmmwX038mmrM8=\/1200x628\/smart\/filters:quality(80)\/cloudfront-us-east-2.images.arcpublishing.com\/reuters\/VPVEZHXGMNIFDDAGBF7EMCUZXU.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<div readability=\"35\">\n<p data-testid=\"primary-image-caption\" id=\"primary-image-caption\" class=\"text__text__1FZLe text__medium-grey__3A_RT text__regular__2N1Xr text__small__1kGq2 body__base__22dCE body__caption__3L8vY article-body__primary-image-caption__WHVnb\">Broken Ethernet cable is seen in front of binary code and words &#8220;cyber security&#8221; in this illustration taken March 8, 2022. REUTERS\/Dado Ruvic\/Illustration\/File Photo<\/p>\n<div class=\"registration-prompt__container__2jf5K column article-body__aside-registration-prompt__2ivER\" readability=\"32\">\n<p><h6 data-testid=\"Heading\" class=\"text__text__1FZLe text__white__3r45t text__medium__1kbOh text__heading_6__1qUJ5 heading__base__2T28j heading__heading_6__RtD9P registration-prompt__heading__3fq-h\">Register now for FREE unlimited access to Reuters.com<\/h6>\n<p><button data-testid=\"Button\" class=\"button__button__2Ecqi button__secondary__18moI button__round__1nYLA text-button__container__3q3zX registration-prompt__button-text__3kTtQ\" type=\"button\"><span class=\"button__container__3sgvk\"><span data-testid=\"Text\" class=\"text__text__1FZLe text__inherit-color__3208F text__bold__2-8Kc text__default__UPMUu text-button__medium__113uZ\">Register<\/span><\/span><\/button><\/p>\n<\/div>\n<\/div>\n<div readability=\"84.701224489796\">\n<p data-testid=\"paragraph-0\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__2p5pI\">BRUSSELS, Sept 15 (Reuters) &#8211; From laptops to fridges to mobile apps, smart devices connected to the internet will have to be assessed for their cybersecurity risks under draft European Union rules announced on Thursday, amid concerns about a spate of cyber attacks.<\/p>\n<p data-testid=\"paragraph-1\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__2p5pI\">Companies face fines of as much as 15 million euros ($15 million) or up to 2.5% of their total global turnover if they fail to comply with the European Commission&#8217;s proposed law known as the Cyber Resilience Act, which will require manufacturers to fix any problems that are identified.<\/p>\n<p data-testid=\"paragraph-2\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__2p5pI\">Companies could save as much as 290 billion euros annually in cyber incidents versus compliance costs of about 29 billion euros, the EU executive said.<\/p>\n<div class=\"registration-prompt__container__2jf5K registration-prompt__inline__2WDU- article-body__element__2p5pI article-body__inline-registration-prompt__1-N9W\" readability=\"32\">\n<p><h5 data-testid=\"Heading\" class=\"text__text__1FZLe text__white__3r45t text__medium__1kbOh text__heading_5__2krbj heading__base__2T28j heading__heading_5__2A2g- registration-prompt__heading__3fq-h\">Register now for FREE unlimited access to Reuters.com<\/h5>\n<p><button data-testid=\"Button\" class=\"button__button__2Ecqi button__secondary__18moI button__round__1nYLA text-button__container__3q3zX registration-prompt__button-text__3kTtQ\" type=\"button\"><span class=\"button__container__3sgvk\"><span data-testid=\"Text\" class=\"text__text__1FZLe text__inherit-color__3208F text__bold__2-8Kc text__default__UPMUu text-button__medium__113uZ\">Register<\/span><\/span><\/button><\/p>\n<\/div>\n<p data-testid=\"paragraph-3\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__2p5pI\">A series of high-profile incidents of hackers damaging businesses and demanding huge ransoms in recent years have heightened concerns about vulnerabilities in operating systems, network equipment and software.<\/p>\n<p data-testid=\"paragraph-4\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__2p5pI\">&#8220;It (the Act) will put the responsibility where it belongs, with those that place the products on the market,&#8221; EU digital chief Margrethe Vestager said in a statement.<\/p>\n<p data-testid=\"paragraph-5\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__2p5pI\">Manufacturers will have to assess the cybersecurity risks of their products and take appropriate action to fix problems for a period of five years or during the expected lifetime of the product.<\/p>\n<p data-testid=\"paragraph-6\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__2p5pI\">The companies will have to notify EU cybersecurity agency ENISA of any incidents within 24 hours of becoming aware of them, and take measures to resolve them.<\/p>\n<p data-testid=\"paragraph-7\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__2p5pI\">Importers and distributors will have to verify that products conform with EU rules.<\/p>\n<p data-testid=\"paragraph-8\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__2p5pI\">The Computer &amp; Communications Industry Association (CCIA Europe) warned that the resulting red tape from the approval process could hamper the roll-out of new technologies and services in Europe.<\/p>\n<p data-testid=\"paragraph-9\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__2p5pI\">&#8220;Instead the new rules should recognise globally-accepted standards and facilitate cooperation with trusted trade partners to avoid duplicate requirements,&#8221; Public Policy Director Alexandre Roure said.<\/p>\n<p data-testid=\"paragraph-10\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__2p5pI\">If companies do not comply with the EU&#8217;s rules, national surveillance authorities can prohibit or restrict a product from being made available to their national markets.<\/p>\n<p data-testid=\"paragraph-11\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__2p5pI\">The draft rules will need to be agreed with EU countries and EU lawmakers before they can become law.<\/p>\n<p data-testid=\"paragraph-12\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__2p5pI\">($1 = 1.0013 euros)<\/p>\n<div class=\"registration-prompt__container__2jf5K registration-prompt__inline__2WDU- article-body__element__2p5pI\" readability=\"32\">\n<p><h5 data-testid=\"Heading\" class=\"text__text__1FZLe text__white__3r45t text__medium__1kbOh text__heading_5__2krbj heading__base__2T28j heading__heading_5__2A2g- registration-prompt__heading__3fq-h\">Register now for FREE unlimited access to Reuters.com<\/h5>\n<p><button data-testid=\"Button\" class=\"button__button__2Ecqi button__secondary__18moI button__round__1nYLA text-button__container__3q3zX registration-prompt__button-text__3kTtQ\" type=\"button\"><span class=\"button__container__3sgvk\"><span data-testid=\"Text\" class=\"text__text__1FZLe text__inherit-color__3208F text__bold__2-8Kc text__default__UPMUu text-button__medium__113uZ\">Register<\/span><\/span><\/button><\/p>\n<\/div>\n<p><span data-testid=\"Text\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__default__UPMUu sign-off__text__PU3Aj\">Reporting by Foo Yun Chee; editing by Philip Blenkinsop and Elaine Hardcastle<\/span><\/p>\n<p data-testid=\"Body\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__2p5pI\">Our Standards: <a data-testid=\"Link\" href=\"https:\/\/www.thomsonreuters.com\/en\/about-us\/trust-principles.html\" target=\"_blank\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__medium__1kbOh text__large__nEccO link__underline_default__2prE_\" rel=\"noopener\">The Thomson Reuters Trust Principles.<\/a><\/p>\n<\/div>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/33845\/EU-Proposes-Rules-Targeting-Smart-Devices-With-Cybersecurity-Risks.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":48470,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[10196],"class_list":["post-48469","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinegovernmentflaw"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>EU Proposes Rules Targeting Smart Devices With Cybersecurity Risks 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/eu-proposes-rules-targeting-smart-devices-with-cybersecurity-risks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"EU Proposes Rules Targeting Smart Devices With Cybersecurity Risks 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/eu-proposes-rules-targeting-smart-devices-with-cybersecurity-risks\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-15T14:13:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.reuters.com\/resizer\/nrWuK0nVIcUlDqzmmwX038mmrM8=\/1200x628\/smart\/filters:quality(80)\/cloudfront-us-east-2.images.arcpublishing.com\/reuters\/VPVEZHXGMNIFDDAGBF7EMCUZXU.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/eu-proposes-rules-targeting-smart-devices-with-cybersecurity-risks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/eu-proposes-rules-targeting-smart-devices-with-cybersecurity-risks\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"EU Proposes Rules Targeting Smart Devices With Cybersecurity Risks\",\"datePublished\":\"2022-09-15T14:13:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/eu-proposes-rules-targeting-smart-devices-with-cybersecurity-risks\\\/\"},\"wordCount\":426,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/eu-proposes-rules-targeting-smart-devices-with-cybersecurity-risks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/eu-proposes-rules-targeting-smart-devices-with-cybersecurity-risks.jpg\",\"keywords\":[\"headline,government,flaw\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/eu-proposes-rules-targeting-smart-devices-with-cybersecurity-risks\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/eu-proposes-rules-targeting-smart-devices-with-cybersecurity-risks\\\/\",\"name\":\"EU Proposes Rules Targeting Smart Devices With Cybersecurity Risks 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/eu-proposes-rules-targeting-smart-devices-with-cybersecurity-risks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/eu-proposes-rules-targeting-smart-devices-with-cybersecurity-risks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/eu-proposes-rules-targeting-smart-devices-with-cybersecurity-risks.jpg\",\"datePublished\":\"2022-09-15T14:13:06+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/eu-proposes-rules-targeting-smart-devices-with-cybersecurity-risks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/eu-proposes-rules-targeting-smart-devices-with-cybersecurity-risks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/eu-proposes-rules-targeting-smart-devices-with-cybersecurity-risks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/eu-proposes-rules-targeting-smart-devices-with-cybersecurity-risks.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/eu-proposes-rules-targeting-smart-devices-with-cybersecurity-risks.jpg\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/eu-proposes-rules-targeting-smart-devices-with-cybersecurity-risks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,government,flaw\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinegovernmentflaw\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"EU Proposes Rules Targeting Smart Devices With Cybersecurity Risks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"EU Proposes Rules Targeting Smart Devices With Cybersecurity Risks 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/eu-proposes-rules-targeting-smart-devices-with-cybersecurity-risks\/","og_locale":"en_US","og_type":"article","og_title":"EU Proposes Rules Targeting Smart Devices With Cybersecurity Risks 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/eu-proposes-rules-targeting-smart-devices-with-cybersecurity-risks\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-09-15T14:13:06+00:00","og_image":[{"url":"https:\/\/www.reuters.com\/resizer\/nrWuK0nVIcUlDqzmmwX038mmrM8=\/1200x628\/smart\/filters:quality(80)\/cloudfront-us-east-2.images.arcpublishing.com\/reuters\/VPVEZHXGMNIFDDAGBF7EMCUZXU.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/eu-proposes-rules-targeting-smart-devices-with-cybersecurity-risks\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/eu-proposes-rules-targeting-smart-devices-with-cybersecurity-risks\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"EU Proposes Rules Targeting Smart Devices With Cybersecurity Risks","datePublished":"2022-09-15T14:13:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/eu-proposes-rules-targeting-smart-devices-with-cybersecurity-risks\/"},"wordCount":426,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/eu-proposes-rules-targeting-smart-devices-with-cybersecurity-risks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/09\/eu-proposes-rules-targeting-smart-devices-with-cybersecurity-risks.jpg","keywords":["headline,government,flaw"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/eu-proposes-rules-targeting-smart-devices-with-cybersecurity-risks\/","url":"https:\/\/www.threatshub.org\/blog\/eu-proposes-rules-targeting-smart-devices-with-cybersecurity-risks\/","name":"EU Proposes Rules Targeting Smart Devices With Cybersecurity Risks 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/eu-proposes-rules-targeting-smart-devices-with-cybersecurity-risks\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/eu-proposes-rules-targeting-smart-devices-with-cybersecurity-risks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/09\/eu-proposes-rules-targeting-smart-devices-with-cybersecurity-risks.jpg","datePublished":"2022-09-15T14:13:06+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/eu-proposes-rules-targeting-smart-devices-with-cybersecurity-risks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/eu-proposes-rules-targeting-smart-devices-with-cybersecurity-risks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/eu-proposes-rules-targeting-smart-devices-with-cybersecurity-risks\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/09\/eu-proposes-rules-targeting-smart-devices-with-cybersecurity-risks.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/09\/eu-proposes-rules-targeting-smart-devices-with-cybersecurity-risks.jpg","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/eu-proposes-rules-targeting-smart-devices-with-cybersecurity-risks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,government,flaw","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinegovernmentflaw\/"},{"@type":"ListItem","position":3,"name":"EU Proposes Rules Targeting Smart Devices With Cybersecurity Risks"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48469","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=48469"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48469\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/48470"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=48469"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=48469"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=48469"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}