Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home News

Switzerland 24 Hours Cyberattack Reporting

March 11, 2025
Reading Time: 2 mins read
in News

Switzerland’s National Cybersecurity Centre (NCSC) has introduced a new rule that requires critical infrastructure organizations to report any cyberattacks within 24 hours of discovery. This mandate will go into effect on April 1, 2025, and applies to organizations that provide essential services such as utilities, transportation, and local government functions. The requirement specifically targets attacks that affect critical operations, including those that manipulate, encrypt, or exfiltrate data, as well as those that involve malware or unauthorized access to systems. The aim is to improve the country’s response time to cybersecurity threats and reduce the impact of such incidents.

The NCSC explained that the introduction of this rule was a response to the increasing number of cyberattacks targeting vital infrastructure.

By ensuring that these attacks are reported swiftly, Switzerland can take immediate action to mitigate the damage and prevent further harm. The reporting process will be handled via an online form or email, with no registration required. The first report must be submitted within 24 hours, followed by a more detailed follow-up report within 14 days. This approach will provide authorities with the necessary information to assess the threat and coordinate a response.

The new requirement covers a broad range of critical service providers, including energy and water suppliers, transport companies, and local government organizations. These entities will be held accountable for reporting cyberattacks, helping the authorities identify patterns and vulnerabilities across the country’s infrastructure. A leniency period will be in place until October 1, 2025, giving organizations time to adapt to the new rules. However, after this period, organizations that fail to comply will face penalties of up to CHF 100,000 ($114,000).

This financial incentive aims to ensure that the rule is taken seriously and that incidents are reported in a timely manner.

This new law aligns with the European Union’s NIS Directive, which sets cybersecurity standards for operators of essential services. By adopting similar regulations, Switzerland is enhancing its cybersecurity framework and contributing to a coordinated response across Europe. The NCSC views this as a milestone in strengthening the nation’s cybersecurity resilience, making it better prepared to handle cyber threats and protecting the critical infrastructure that supports everyday life. The new reporting requirement is seen as a proactive step to ensure the country remains secure in the face of growing cyber risks.

Reference:

  • Switzerland Mandates 24-Hour Cyberattack Reporting for Critical Infrastructure
Tags: Cyber NewsCyber News 2025Cyber threatsMarch 2025
ADVERTISEMENT

Related Posts

Arsen Launches AI Vishing Sim for Large-Scale Voice Phishing

Danish Agency Ditches Microsoft for Digital Independence

June 16, 2025
Arsen Launches AI Vishing Sim for Large-Scale Voice Phishing

Arsen Launches AI Vishing Sim for Large-Scale Voice Phishing

June 16, 2025
Arsen Launches AI Vishing Sim for Large-Scale Voice Phishing

Kali Linux 2025.2 Released with New Tools

June 16, 2025
Securonix Buys ThreatQuotient For AI SecOps

WhatsApp Backs Apple In UK Encryption Case

June 13, 2025
Securonix Buys ThreatQuotient For AI SecOps

New NIST Guide Helps Implement Zero Trust

June 13, 2025
Securonix Buys ThreatQuotient For AI SecOps

Securonix Buys ThreatQuotient For AI SecOps

June 13, 2025

Latest Alerts

PyPI Malware Steals AWS, CI/CD, macOS Data

IBM Backup Service Flaw Allows Elevated Access

Image Hiding in DNS TXT Records

Old Discord Links Now Lead To Malware

VexTrio TDS Uses Adtech To Spread Malware

Simple Typo Breaks AI Safety Via TokenBreak

Subscribe to our newsletter

    Latest Incidents

    Canada WestJet Airline Contains Cyberattack

    Hackers Leak 10K VirtualMacOSX Customer Data

    Washington Post Investigates Cyberattack on Emails

    Cyberattack On Brussels Parliament Continues

    Swedish Broadcaster SVT Hit By DDoS

    Major Google Cloud Outage Disrupts Web

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial