Considered one of the most important gatherings of the hacker and security community in Europe, the event once again delivered on its promise: high-ca …
While investment companies invest heavily in digital security, our real-world assessments reveal that physical security often lags behind. Drawing fro …
Swiss Post Cybersecurity detected and analyzed an infostealer campaign. The attackers use Clickfix for initial access and DonutLoader for shellcode de …
An X-ray image disappears. Laboratory software goes haywire. A medication dispenser suddenly dispenses double the dose. What sounds like a movie scena …
The Art of Physical Intrusion Physical intrusion is an essential yet often overlooked component in the ever-evolving field of cybersecurity. While cyb …
Strong Impulses for Incident Response A key highlight was the ransomware incident response training, which was very practical. Despite our well-establ …
Aarau and Morges, 21.5.2025. Swiss Post Cybersecurity AG has just successfully concluded its series of security conferences in three parts of the coun …
Overview The Network and Information Systems Directive2 (NIS2) is an updated legal framework designed to improve cybersecurity in the European Union. …
Use Case Testing Preparation The first step is to analyze which types of logs exist and which could be used to detect the suspicious behavior. How is …