<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Swiss Security Insights</title>
    <link>https://swisssecurityinsights.ch/</link>
    <description>Independent cybersecurity analysis for Swiss CISOs, IT managers, and compliance officers.</description>
    <language>en-ch</language>
    <managingEditor>editor@swisssecurityinsights.ch (Marco Scarito)</managingEditor>
    <lastBuildDate>Thu, 07 May 2026 00:00:00 +0000</lastBuildDate>
    <ttl>120</ttl>
    <atom:link href="https://swisssecurityinsights.ch/feed.xml" rel="self" type="application/rss+xml"/>

    <item>
      <title>The CISO Game in Chiasso: What a Simulated Cyber Crisis Teaches That No Presentation Ever Could</title>
      <link>https://swisssecurityinsights.ch/articles/ciso-game-chiasso-supply-chain-third-party-risk-2026.php</link>
      <description>A first-person account of the Supply Chain &amp; Third Party Risk event in Chiasso — the second CISO gathering in Ticino in as many weeks — centred on an interactive crisis simulation that put 50 security leaders around the table to make real decisions under pressure.</description>
      <pubDate>Thu, 07 May 2026 00:00:00 +0000</pubDate>
      <category>Analysis</category>
      <guid isPermaLink="true">https://swisssecurityinsights.ch/articles/ciso-game-chiasso-supply-chain-third-party-risk-2026.php</guid>
    </item>

    <item>
      <title>Hardening Microsoft 365 for Swiss Organisations: A Practical Security Checklist</title>
      <link>https://swisssecurityinsights.ch/articles/hardening-microsoft-365-swiss-organisations-checklist-2026.php</link>
      <description>A practical M365 hardening checklist for Swiss organisations covering Conditional Access, Entra ID Secure Score, Exchange Online protection, audit logging, and data residency.</description>
      <pubDate>Sun, 03 May 2026 00:00:00 +0000</pubDate>
      <category>Best Practices</category>
      <guid isPermaLink="true">https://swisssecurityinsights.ch/articles/hardening-microsoft-365-swiss-organisations-checklist-2026.php</guid>
    </item>

    <item>
      <title>NCSC Week 19: Business Email Compromise Wave Hits Swiss SMEs — CHF 2.3M in Confirmed Losses</title>
      <link>https://swisssecurityinsights.ch/articles/ncsc-week19-bec-swiss-sme-wire-fraud-2026.php</link>
      <description>The NCSC Week 19 alert documents a BEC campaign targeting Swiss SMEs in manufacturing and logistics, with CHF 2.3M in confirmed wire transfer losses.</description>
      <pubDate>Sun, 03 May 2026 00:00:00 +0000</pubDate>
      <category>Incident Report</category>
      <guid isPermaLink="true">https://swisssecurityinsights.ch/articles/ncsc-week19-bec-swiss-sme-wire-fraud-2026.php</guid>
    </item>

    <item>
      <title>QR Code Phishing Targeting Swiss Microsoft 365 Tenants: An Adversary-in-the-Middle Campaign</title>
      <link>https://swisssecurityinsights.ch/articles/qr-code-quishing-swiss-m365-apt-2026.php</link>
      <description>A quishing campaign targeting Swiss Microsoft 365 tenants uses AiTM proxy infrastructure to bypass MFA and steal session tokens, with links to Eastern European APT activity.</description>
      <pubDate>Sun, 03 May 2026 00:00:00 +0000</pubDate>
      <category>Threat Intel</category>
      <guid isPermaLink="true">https://swisssecurityinsights.ch/articles/qr-code-quishing-swiss-m365-apt-2026.php</guid>
    </item>

    <item>
      <title>Claude Mythos and Project Glasswing: Separating Fact from Hype on the AI Model Too Dangerous to Release</title>
      <link>https://swisssecurityinsights.ch/articles/claude-mythos-cybersecurity-risks-project-glasswing-2026.php</link>
      <description>Anthropic's Claude Mythos can autonomously find zero-day vulnerabilities. A confirmed unauthorised access incident has already occurred. Swiss security teams need facts, not hype.</description>
      <pubDate>Tue, 28 Apr 2026 00:00:00 +0000</pubDate>
      <category>Analysis</category>
      <guid isPermaLink="true">https://swisssecurityinsights.ch/articles/claude-mythos-cybersecurity-risks-project-glasswing-2026.php</guid>
    </item>

    <item>
      <title>Microsoft Patch Tuesday April 2026: 165 CVEs, One Actively Exploited SharePoint Zero-Day</title>
      <link>https://swisssecurityinsights.ch/articles/microsoft-patch-tuesday-april-2026-sharepoint-zero-day.php</link>
      <description>Microsoft's April 2026 Patch Tuesday fixed 165 CVEs including an actively exploited SharePoint zero-day (CVE-2026-32201) and a wormable Windows TCP/IP RCE. Triage guidance for Swiss IT teams.</description>
      <pubDate>Tue, 28 Apr 2026 00:00:00 +0000</pubDate>
      <category>Threat Intel</category>
      <guid isPermaLink="true">https://swisssecurityinsights.ch/articles/microsoft-patch-tuesday-april-2026-sharepoint-zero-day.php</guid>
    </item>

    <item>
      <title>Switzerland's Cyber Products Law: What the Federal Council's Draft Bill Means for Swiss Tech Companies</title>
      <link>https://swisssecurityinsights.ch/articles/switzerland-cyber-products-law-federal-council-2026.php</link>
      <description>Switzerland's Federal Council is drafting a new cyber products law by autumn 2026, mirroring the EU Cyber Resilience Act. What Swiss manufacturers, importers, and software vendors must prepare for now.</description>
      <pubDate>Tue, 28 Apr 2026 00:00:00 +0000</pubDate>
      <category>Regulation</category>
      <guid isPermaLink="true">https://swisssecurityinsights.ch/articles/switzerland-cyber-products-law-federal-council-2026.php</guid>
    </item>

    <item>
      <title>AI Security at the Crossroads: 10 Takeaways from the Swiss Cyber AI Conference</title>
      <link>https://swisssecurityinsights.ch/articles/swiss-cyber-ai-conference-takeaways-2026.php</link>
      <description>Ten takeaways from the Swiss Cyber AI Conference — identity, least privilege for AI agents, poisoned agents, voice biometric deprecation, and the F1 security paradigm.</description>
      <pubDate>Tue, 14 Apr 2026 00:00:00 +0000</pubDate>
      <category>Analysis</category>
      <guid isPermaLink="true">https://swisssecurityinsights.ch/articles/swiss-cyber-ai-conference-takeaways-2026.php</guid>
    </item>

    <item>
      <title>The EU Cyber Resilience Act's First Deadline Is in Five Months — Are Swiss Manufacturers Ready?</title>
      <link>https://swisssecurityinsights.ch/articles/eu-cyber-resilience-act-september-2026-deadline-swiss-manufacturers.php</link>
      <description>The EU Cyber Resilience Act's first mandatory deadline — vulnerability and incident reporting obligations — takes effect on 11 September 2026. Swiss manufacturers exporting digital products to the EU have five months to build compliant processes.</description>
      <pubDate>Tue, 07 Apr 2026 00:00:00 +0000</pubDate>
      <category>Regulation</category>
      <guid isPermaLink="true">https://swisssecurityinsights.ch/articles/eu-cyber-resilience-act-september-2026-deadline-swiss-manufacturers.php</guid>
    </item>

    <item>
      <title>Fortinet FortiClient EMS Under Active Attack: Two Zero-Days, One Patch Window, and What Swiss Enterprises Must Do Now</title>
      <link>https://swisssecurityinsights.ch/articles/fortinet-forticlient-ems-cve-2026-35616-zero-day-swiss-enterprises.php</link>
      <description>Two critical zero-days in Fortinet FortiClient EMS — CVE-2026-35616 and CVE-2026-21643, both CVSS 9.1 — are being actively exploited in the wild. Swiss enterprises using FortiClient EMS must apply the emergency hotfix immediately.</description>
      <pubDate>Tue, 07 Apr 2026 00:00:00 +0000</pubDate>
      <category>Threat Intel</category>
      <guid isPermaLink="true">https://swisssecurityinsights.ch/articles/fortinet-forticlient-ems-cve-2026-35616-zero-day-swiss-enterprises.php</guid>
    </item>

    <item>
      <title>Patching Is Not Enough: Building a Vulnerability Management Programme That Holds Up to FINMA and ISA Scrutiny</title>
      <link>https://swisssecurityinsights.ch/articles/vulnerability-management-programme-finma-isa-swiss-financial-sector.php</link>
      <description>Three critical zero-days in five weeks — Cisco FMC, Fortinet EMS twice — expose a common failure: organisations patch reactively but lack a structured vulnerability management programme. Here is what FINMA and the ISA now expect, and how to build it.</description>
      <pubDate>Tue, 07 Apr 2026 00:00:00 +0000</pubDate>
      <category>Best Practices</category>
      <guid isPermaLink="true">https://swisssecurityinsights.ch/articles/vulnerability-management-programme-finma-isa-swiss-financial-sector.php</guid>
    </item>

    <item>
      <title>When the Safety-First AI Lab Ships Its Own Source Code to npm: Lessons from the Claude Code Leak</title>
      <link>https://swisssecurityinsights.ch/articles/claude-code-source-leak-ai-supply-chain-lessons-2026.php</link>
      <description>A source map misconfiguration in Claude Code v2.1.88 exposed Anthropic's internal codebase — 1,906 files and 44 hidden feature flags — via npm.</description>
      <pubDate>Mon, 06 Apr 2026 00:00:00 +0000</pubDate>
      <category>Analysis</category>
      <guid isPermaLink="true">https://swisssecurityinsights.ch/articles/claude-code-source-leak-ai-supply-chain-lessons-2026.php</guid>
    </item>

    <item>
      <title>NCSC Semi-Annual Report H2 2025: What the First Mandatory Critical Infrastructure Data Tells Us</title>
      <link>https://swisssecurityinsights.ch/articles/ncsc-semi-annual-report-h2-2025-switzerland.php</link>
      <description>On 30 March 2026, the NCSC published its H2 2025 report — the first to integrate mandatory infrastructure notifications with voluntary reports.</description>
      <pubDate>Mon, 06 Apr 2026 00:00:00 +0000</pubDate>
      <category>Analysis</category>
      <guid isPermaLink="true">https://swisssecurityinsights.ch/articles/ncsc-semi-annual-report-h2-2025-switzerland.php</guid>
    </item>

    <item>
      <title>The npm Trust Problem: How the Claude Code Leak and the Axios RAT Created a Supply Chain Emergency</title>
      <link>https://swisssecurityinsights.ch/articles/npm-supply-chain-attack-axios-claude-code-devSecOps-2026.php</link>
      <description></description>
      <pubDate>Mon, 06 Apr 2026 00:00:00 +0000</pubDate>
      <category>Threat Intel</category>
      <guid isPermaLink="true">https://swisssecurityinsights.ch/articles/npm-supply-chain-attack-axios-claude-code-devSecOps-2026.php</guid>
    </item>

    <item>
      <title>AI Agent Vulnerabilities in the Enterprise: LangChain, LangGraph and the Expanding Attack Surface</title>
      <link>https://swisssecurityinsights.ch/articles/langchain-langgraph-ai-agent-vulnerabilities-2026.php</link>
      <description>Three vulnerabilities disclosed in LangChain and LangGraph expose filesystem data, secrets, and conversation history in enterprise AI deployments.</description>
      <pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate>
      <category>Threat Intel</category>
      <guid isPermaLink="true">https://swisssecurityinsights.ch/articles/langchain-langgraph-ai-agent-vulnerabilities-2026.php</guid>
    </item>

    <item>
      <title>Identity Fraud with a Swiss Face: The NCSC's Warning on Fake Company Job Scams</title>
      <link>https://swisssecurityinsights.ch/articles/ncsc-fake-swiss-company-job-scams-2026.php</link>
      <description>The NCSC's Week 12 alert documents a new tactic: cloning registered Swiss companies to post fraudulent job ads and harvest applicants' data.</description>
      <pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate>
      <category>Incident Report</category>
      <guid isPermaLink="true">https://swisssecurityinsights.ch/articles/ncsc-fake-swiss-company-job-scams-2026.php</guid>
    </item>

    <item>
      <title>Zero Trust Beyond the Buzzword: Why Microsegmentation Is the Control Swiss Enterprises Keep Skipping</title>
      <link>https://swisssecurityinsights.ch/articles/zero-trust-microsegmentation-swiss-enterprises-2026.php</link>
      <description>Most Zero Trust implementations stop at identity, skipping microsegmentation — the control that limits damage once an attacker is inside.</description>
      <pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate>
      <category>Best Practices</category>
      <guid isPermaLink="true">https://swisssecurityinsights.ch/articles/zero-trust-microsegmentation-swiss-enterprises-2026.php</guid>
    </item>

    <item>
      <title>The Scammers Are Evolving? No — We Are Not</title>
      <link>https://swisssecurityinsights.ch/articles/homograph-lookalike-domain-phishing-not-new.php</link>
      <description>A phishing email spoofing Microsoft via 'rnicrosoft.com' went viral. The technique is 20 years old. The surprise is that it still works.</description>
      <pubDate>Sat, 28 Mar 2026 00:00:00 +0000</pubDate>
      <category>Analysis</category>
      <guid isPermaLink="true">https://swisssecurityinsights.ch/articles/homograph-lookalike-domain-phishing-not-new.php</guid>
    </item>

    <item>
      <title>AI-Driven Fraud in Switzerland: Deepfakes, Voice Cloning, and the New Social Engineering Threat</title>
      <link>https://swisssecurityinsights.ch/articles/ai-fraud-deepfakes-switzerland-2026.php</link>
      <description>In January 2026, a Swiss entrepreneur transferred several million francs after calls from an entirely AI-generated voice.</description>
      <pubDate>Mon, 23 Mar 2026 00:00:00 +0000</pubDate>
      <category>Threat Intel</category>
      <guid isPermaLink="true">https://swisssecurityinsights.ch/articles/ai-fraud-deepfakes-switzerland-2026.php</guid>
    </item>

    <item>
      <title>Zero-Day Before the Patch: How Interlock Ransomware Exploited Cisco FMC for 36 Days Undetected</title>
      <link>https://swisssecurityinsights.ch/articles/cisco-fmc-cve-2026-20131-interlock-ransomware-zero-day.php</link>
      <description>Amazon's threat intelligence team confirmed that Interlock ransomware began exploiting CVE-2026-20131 on 26 January 2026.</description>
      <pubDate>Mon, 23 Mar 2026 00:00:00 +0000</pubDate>
      <category>Threat Intel</category>
      <guid isPermaLink="true">https://swisssecurityinsights.ch/articles/cisco-fmc-cve-2026-20131-interlock-ransomware-zero-day.php</guid>
    </item>

  </channel>
</rss>
