Aktuelles, Experten - geschrieben von cp am Sonntag, Mai 11, 2025 17:27 - noch keine Kommentare
Cross-border cyberthreats require international solutions
Semi-annual report from the Federal Office for Cybersecurity (BACS) shows how cybercriminals operate internationally and which channels they use to spread their attacks.
[datensicherheit.de, 05/11/2025] The latest semi-annual report from the National Cyber Security Centre (NCSC) outlines how cybercriminals operate internationally and the methods they use for their attacks. In light of these global cyberthreats and our ever-growing dependence on global software, international cooperation is becoming increasingly important. To strengthen cybersecurity in Switzerland, a reporting obligation for cyberattacks on critical infrastructure came into force on 1 April. This was developed in close alignment with international standards and EU directives.
BACS as the first point of contact for the population in Switzerland in the event of cyber incidents
As the general public’s first point of contact when cyberincidents occur, the NCSC began accepting voluntary incident reports via an online reporting form in 2020. Analysis of the incoming reports reveals how cybercriminals operate internationally and how they use new methods and deceptive strategies to propagate their attacks. The latest NCSC semi-annual report examines these developments and outlines the national and international cyberthreat landscape in the second half of 2024.
Cyberthreats in the second half of 2024
In the second half of 2024, the NCSC received 28,165 reports of cyberincidents, slightly fewer than in the first half of the year. Over 2024 as a whole, however, the number rose by 13,574 to a total of 62,954 reports. The fluctuations are mainly due to a large wave of fake calls claiming to come from public authorities. The ratio of reports from the general public to reports from companies, associations and authorities remained stable, at 90% and 10% respectively. Among companies, there was a sharp increase in the number of CEO fraud reports (2023: 487 / 2024: 719). The categories of fraud, phishing and spam still received the most reports, including a threefold increase in the number of fraudulent lottery reports in the second half of 2024.
Familiar attack methods are being modernised
In addition to conventional email and SMS attacks, Rich Communication Services (RCS) and iMessage are increasingly being used to bypass the established SMS filters used by the major providers. Telephone calls from supposed bank employees and fraudulent QR codes stuck on parking meters are also some of the latest scams. Another method fraudsters use is to flood their victims’ email accounts with spam messages. They then offer to help with this problem via digital communication platforms, and in so doing, compromise their victims’ security. Scammers also impersonate well-known Swiss companies so that they can spread malware. In its weekly reviews published on Tuesdays, the NCSC examines these strategies in detail and issues advice on how to respond to them.
Increasing risk due to global digital dependencies
CrowdStrike’s failed software update in the second half of 2024 was a stark reminder of the consequences of global digital dependencies. Around 8.5 million computer systems crashed, with the estimated economic damage amounting to several billion US dollars. The latest developments in the US Common Vulnerabilities and Exposures Program (CVE) also highlight the risks of unilateral international dependencies. These events emphasise the urgent need for greater international cooperation on cybersecurity.
To reduce the negative impact of these dependencies, Switzerland has stepped up its cooperation and bilateral discussions with European and international partners with a view to improving joint early warning systems and sharing information on current threats more quickly.
New reporting obligation harmonised with international standards
The reporting obligation for cyberattacks on critical infrastructure came into force on 1 April. This new regulation was developed in close alignment with international standards and EU directives to ensure cross-border compatibility and information sharing. Operators of critical infrastructure such as energy and drinking water suppliers, transport companies and cantonal and local administrations must now report certain cyberattacks to the NCSC within 24 hours. For the first six months (until 1 October), there will be no sanctions for failure to report an incident.
Further information on the topic:
Bundesamt für Cybersicherheit BACS, 06.05.2025
Halbjahresbericht 2024/II (Juli – Dezember), Cybersicherheit – Lage in der Schweiz und international
datensicherheit.de, 25.02.2025
Dragos: Starker Anstieg von OT/ICS-Cyberbedrohungen
Aktuelles, Experten - Jan. 15, 2026 0:56 - noch keine Kommentare
Geister-Fabriken: Dark Factories zur Erhaltung industrieller Wertschöpfung in Deutschland
weitere Beiträge in Experten
- Gruppenchats: Deutsche durchschnittlich in fünf Messengern präsent
- Vom Schlachtfeld bis zum Serverraum: Neuerscheinung zu Europas Rolle im Cyberkrieg
- Internationale Datentransfers unverzichtbar: Unternehmen benötigen Rechtssicherheit
- Registrierung bei ELEFAND: Krisen- und Katastrophenvorsorge bei Auslandsaufenthalten
- DATEV-Datenpanne: Probe-Lohnabrechnungen landeten bei falschen Empfängern
Aktuelles, Branche, Studien - Jan. 13, 2026 0:58 - noch keine Kommentare
Grey-Swan-Risiken: Kaspersky skizziert acht plausible Szenarien mit potenziell hohem Cyberrisiko
weitere Beiträge in Branche
- Cloud-Migration und Identity Security: Digitale Transformation, Benutzerfreundlichkeit und Sicherheit sind vereinbar
- Bitdefender-Rat an Unternehmen: 2026 von Reaktion zur Prävention wechseln
- Cybersicherheit und Digitale Souveränität: Wie Europa die Kontrolle zurückgewinnen kann
- Zur erfolgreichen Digitalen Transformation muss 2026 IT-Sicherheit endlich Chefsache werden
- Ransomware-Angriffe auf Unternehmen: Zwischen den Jahren lauern viele Gefahren
Aktuelles, A, Experten, Service, Wichtige Adressen - Jan. 13, 2026 1:08 - noch keine Kommentare
Registrierung bei ELEFAND: Krisen- und Katastrophenvorsorge bei Auslandsaufenthalten
weitere Beiträge in Service
- DigiCert-Umfrage: Manuelle Zertifikatsprozesse führen zu Ausfällen, Compliance-Fehlern und hohen Verlusten im Unternehmen
- Threat Hunting: Bedeutung und Wertschätzung steigt
- Umfrage: 71 Prozent der IT-Entscheidungsträger besorgt über Mehrfachnutzung von Passwörtern
- Fast die Hälfte der Unternehmen ohne geeignete Sicherheitsrichtlinien für Remote-Arbeit
- Umfrage: Bedeutung der Konsolidierung von IT-Sicherheitslösungen



Kommentieren