LatestAnalysis7 May 20267 min read
The CISO Game in Chiasso: What a Simulated Cyber Crisis Teaches That No Presentation Ever Could
A first-person account of the Supply Chain & Third Party Risk event in Chiasso — the second CISO gathering in Ticino in as many weeks — centred on an interactive crisis simulation that put 50 security leaders around the table to make real decisions under pressure.
by Marco ScaritoRead article →
Best Practices3 May 202611 min read
Hardening Microsoft 365 for Swiss Organisations: A Practical Security Checklist
A practical M365 hardening checklist for Swiss organisations covering Conditional Access, Entra ID Secure Score, Exchange Online protection, audit logging, and data residency.
by Marco ScaritoRead article →
Incident Report3 May 20268 min read
NCSC Week 19: Business Email Compromise Wave Hits Swiss SMEs — CHF 2.3M in Confirmed Losses
The NCSC Week 19 alert documents a BEC campaign targeting Swiss SMEs in manufacturing and logistics, with CHF 2.3M in confirmed wire transfer losses.
by Marco ScaritoRead article →
Threat Intel3 May 20269 min read
QR Code Phishing Targeting Swiss Microsoft 365 Tenants: An Adversary-in-the-Middle Campaign
A quishing campaign targeting Swiss Microsoft 365 tenants uses AiTM proxy infrastructure to bypass MFA and steal session tokens, with links to Eastern European APT activity.
by Marco ScaritoRead article →
Analysis28 April 202612 min read
Claude Mythos and Project Glasswing: Separating Fact from Hype on the AI Model Too Dangerous to Release
Anthropic's Claude Mythos can autonomously find zero-day vulnerabilities. A confirmed unauthorised access incident has already occurred. Swiss security teams need facts, not hype.
by Marco ScaritoRead article →
Threat Intel28 April 20268 min read
Microsoft Patch Tuesday April 2026: 165 CVEs, One Actively Exploited SharePoint Zero-Day
Microsoft's April 2026 Patch Tuesday fixed 165 CVEs including an actively exploited SharePoint zero-day (CVE-2026-32201) and a wormable Windows TCP/IP RCE. Triage guidance for Swiss IT teams.
by Marco ScaritoRead article →
Regulation28 April 20269 min read
Switzerland's Cyber Products Law: What the Federal Council's Draft Bill Means for Swiss Tech Companies
Switzerland's Federal Council is drafting a new cyber products law by autumn 2026, mirroring the EU Cyber Resilience Act. What Swiss manufacturers, importers, and software vendors must prepare for now.
by Marco ScaritoRead article →
Analysis14 April 202611 min read
AI Security at the Crossroads: 10 Takeaways from the Swiss Cyber AI Conference
Ten takeaways from the Swiss Cyber AI Conference — identity, least privilege for AI agents, poisoned agents, voice biometric deprecation, and the F1 security paradigm.
by Marco ScaritoRead article →
Regulation7 April 202611 min read
The EU Cyber Resilience Act's First Deadline Is in Five Months — Are Swiss Manufacturers Ready?
The EU Cyber Resilience Act's first mandatory deadline — vulnerability and incident reporting obligations — takes effect on 11 September 2026. Swiss manufacturers exporting digital products to the EU have five months to build compliant processes.
by Marco ScaritoRead article →
Threat Intel7 April 20268 min read
Fortinet FortiClient EMS Under Active Attack: Two Zero-Days, One Patch Window, and What Swiss Enterprises Must Do Now
Two critical zero-days in Fortinet FortiClient EMS — CVE-2026-35616 and CVE-2026-21643, both CVSS 9.1 — are being actively exploited in the wild. Swiss enterprises using FortiClient EMS must apply the emergency hotfix immediately.
by Marco ScaritoRead article →
Best Practices7 April 202610 min read
Patching Is Not Enough: Building a Vulnerability Management Programme That Holds Up to FINMA and ISA Scrutiny
Three critical zero-days in five weeks — Cisco FMC, Fortinet EMS twice — expose a common failure: organisations patch reactively but lack a structured vulnerability management programme. Here is what FINMA and the ISA now expect, and how to build it.
by Marco ScaritoRead article →
Analysis6 April 202610 min read
When the Safety-First AI Lab Ships Its Own Source Code to npm: Lessons from the Claude Code Leak
A source map misconfiguration in Claude Code v2.1.88 exposed Anthropic's internal codebase — 1,906 files and 44 hidden feature flags — via npm.
by Marco ScaritoRead article →
Analysis6 April 20269 min read
NCSC Semi-Annual Report H2 2025: What the First Mandatory Critical Infrastructure Data Tells Us
On 30 March 2026, the NCSC published its H2 2025 report — the first to integrate mandatory infrastructure notifications with voluntary reports.
by Marco ScaritoRead article →
Threat Intel6 April 20268 min read
The npm Trust Problem: How the Claude Code Leak and the Axios RAT Created a Supply Chain Emergency
Between 00:21 and 03:29 UTC on 31 March 2026, malicious axios versions with a Trojan went live on npm. DevSecOps lessons for Swiss engineering teams.
by Marco ScaritoRead article →
Threat Intel30 March 20269 min read
AI Agent Vulnerabilities in the Enterprise: LangChain, LangGraph and the Expanding Attack Surface
Three vulnerabilities disclosed in LangChain and LangGraph expose filesystem data, secrets, and conversation history in enterprise AI deployments.
by Marco ScaritoRead article →
Incident Report30 March 20268 min read
Identity Fraud with a Swiss Face: The NCSC's Warning on Fake Company Job Scams
The NCSC's Week 12 alert documents a new tactic: cloning registered Swiss companies to post fraudulent job ads and harvest applicants' data.
by Marco ScaritoRead article →
Best Practices30 March 202610 min read
Zero Trust Beyond the Buzzword: Why Microsegmentation Is the Control Swiss Enterprises Keep Skipping
Most Zero Trust implementations stop at identity, skipping microsegmentation — the control that limits damage once an attacker is inside.
by Marco ScaritoRead article →
Analysis28 March 20267 min read
The Scammers Are Evolving? No — We Are Not
A phishing email spoofing Microsoft via 'rnicrosoft.com' went viral. The technique is 20 years old. The surprise is that it still works.
by Marco ScaritoRead article →
Threat Intel23 March 20269 min read
AI-Driven Fraud in Switzerland: Deepfakes, Voice Cloning, and the New Social Engineering Threat
In January 2026, a Swiss entrepreneur transferred several million francs after calls from an entirely AI-generated voice.
by Marco ScaritoRead article →
Threat Intel23 March 20269 min read
Zero-Day Before the Patch: How Interlock Ransomware Exploited Cisco FMC for 36 Days Undetected
Amazon's threat intelligence team confirmed that Interlock ransomware began exploiting CVE-2026-20131 on 26 January 2026.
by Marco ScaritoRead article →
Regulation23 March 202610 min read
Digital Omnibus Enters Trilogue: What Swiss Compliance Teams Must Do Before the Final Text Lands
EU Digital Omnibus heads into trilogue: what Swiss compliance teams should do now on GDPR, AI Act, NIS2, and DORA before the final text lands.
by Marco ScaritoRead article →
Regulation23 March 202610 min read
The EU Digital Omnibus: What Swiss Organisations Must Understand Now
On 19 November 2025, the European Commission published the Digital Omnibus.
by Marco ScaritoRead article →
Analysis23 March 20268 min read
NCSC Annual Report 2025: Key Takeaways for Swiss Security Teams
The NCSC published its 2025 Annual Report on 16 February 2026. 64,733 incident reports, 222 mandatory notifications.
by Marco ScaritoRead article →
Incident Report23 March 20268 min read
The HTML Invoice Trap: Anatomy of the Phishing Campaign Targeting Swiss Companies Right Now
The NCSC's Week 11 alert covers a live campaign hitting Swiss companies: fake invoice ZIPs with HTML credential stealers and CAPTCHA evasion.
by Marco ScaritoRead article →
Threat Intel15 March 20258 min read
Ransomware Attacks on Swiss SMEs: A Growing Threat in 2025
New data from NCSC reveals a 34% increase in ransomware incidents targeting Swiss SMEs in 2025.
by Marco ScaritoRead article →
Regulation12 March 20256 min read
nDSG Compliance in 2025: What Swiss Companies Still Get Wrong
The revised nDSG is now in force. Persistent blind spots: incomplete records of processing activities.
by Marco ScaritoRead article →
Incident Report8 March 202510 min read
Spear Phishing in Swiss Finance: Anatomy of a 2025 Campaign
A spear phishing campaign targeting Swiss wealth managers used impersonated correspondence from Swiss financial regulators.
by Marco ScaritoRead article →