Swiss Post Cybersecurity detected and analyzed an infostealer campaign. The attackers use Clickfix for initial access and DonutLoader for shellcode de …
An X-ray image disappears. Laboratory software goes haywire. A medication dispenser suddenly dispenses double the dose. What sounds like a movie scena …
The Art of Physical Intrusion Physical intrusion is an essential yet often overlooked component in the ever-evolving field of cybersecurity. While cyb …
Strong Impulses for Incident Response A key highlight was the ransomware incident response training, which was very practical. Despite our well-establ …
Aarau and Morges, 21.5.2025. Swiss Post Cybersecurity AG has just successfully concluded its series of security conferences in three parts of the coun …
Overview The Network and Information Systems Directive2 (NIS2) is an updated legal framework designed to improve cybersecurity in the European Union. …
Use Case Testing Preparation The first step is to analyze which types of logs exist and which could be used to detect the suspicious behavior. How is …
Information security and privacy Many companies are currently unsure whether their IT security measures and any existing ISMS already meet data protec …
The Privacy Impact Assessment (PIA) should begin as early as possible in a project, be it a new project or the conversion of an infrastructure - prefe …
Vulnerability versus configuration management Nowadays, IT professionals are inundated with reports of vulnerabilities. In most cases, these are produ …