[{"data":1,"prerenderedAt":393},["Reactive",2],{"menuQuery_en":3,"settingsQuery_en":187,"routerQuery_/insights/working-secure-swiss-internet_en":193,"viewQueryInsight_en":292},{"data":4,"loading":185,"networkStatus":186},{"menu":5,"footer_menu_col1":101,"footer_menu_col2":119,"footer_menu_external_links":139,"footer_menu_meta":167},{"__typename":6,"name":7,"items":8},"Menu","Main Navigation",[9,46,51,56,61,66],{"__typename":10,"title":11,"url":12,"children":15},"MenuItem","Â̲èÖ±²¥",{"__typename":13,"path":14},"Url","/en/competencies",[16,21,26,31,36,41],{"__typename":10,"title":17,"url":18,"children":20},"Cyber Security",{"__typename":13,"path":19},"/en/competencies/cyber-security",[],{"__typename":10,"title":22,"url":23,"children":25},"Cloud Services",{"__typename":13,"path":24},"/en/competencies/cloud",[],{"__typename":10,"title":27,"url":28,"children":30},"Legal & Procurement",{"__typename":13,"path":29},"/en/competencies/legal-procurement",[],{"__typename":10,"title":32,"url":33,"children":35},"Digital Identity",{"__typename":13,"path":34},"/en/competencies/digital-identity",[],{"__typename":10,"title":37,"url":38,"children":40},"Registry",{"__typename":13,"path":39},"/en/competencies/registry",[],{"__typename":10,"title":42,"url":43,"children":45},"Research Network",{"__typename":13,"path":44},"/en/competencies/research-network",[],{"__typename":10,"title":47,"url":48,"children":50},"Solutions",{"__typename":13,"path":49},"/en/solutions",[],{"__typename":10,"title":52,"url":53,"children":55},"Events",{"__typename":13,"path":54},"/en/events",[],{"__typename":10,"title":57,"url":58,"children":60},"Communities",{"__typename":13,"path":59},"/en/community",[],{"__typename":10,"title":62,"url":63,"children":65},"Insights",{"__typename":13,"path":64},"/en/insights",[],{"__typename":10,"title":67,"url":68,"children":70},"About us",{"__typename":13,"path":69},"/en/about-us",[71,76,81,86,91,96],{"__typename":10,"title":72,"url":73,"children":75},"Our foundation",{"__typename":13,"path":74},"/en/about/our-foundation",[],{"__typename":10,"title":77,"url":78,"children":80},"Higher education policy",{"__typename":13,"path":79},"/en/higher-education-policy",[],{"__typename":10,"title":82,"url":83,"children":85},"Innovation",{"__typename":13,"path":84},"/en/about/innovation",[],{"__typename":10,"title":87,"url":88,"children":90},"Collaborations ",{"__typename":13,"path":89},"/en/Collaborations-international",[],{"__typename":10,"title":92,"url":93,"children":95},"Jobs",{"__typename":13,"path":94},"/en/jobs",[],{"__typename":10,"title":97,"url":98,"children":100},"Contact us",{"__typename":13,"path":99},"/en/contact-us",[],{"__typename":6,"name":102,"items":103},"Footer Column 1",[104,107,110,113,116],{"__typename":10,"title":17,"url":105,"children":106},{"__typename":13,"path":19},[],{"__typename":10,"title":22,"url":108,"children":109},{"__typename":13,"path":24},[],{"__typename":10,"title":32,"url":111,"children":112},{"__typename":13,"path":34},[],{"__typename":10,"title":27,"url":114,"children":115},{"__typename":13,"path":29},[],{"__typename":10,"title":37,"url":117,"children":118},{"__typename":13,"path":39},[],{"__typename":6,"name":120,"items":121},"Footer Column 2",[122,125,128,131,134],{"__typename":10,"title":42,"url":123,"children":124},{"__typename":13,"path":44},[],{"__typename":10,"title":47,"url":126,"children":127},{"__typename":13,"path":49},[],{"__typename":10,"title":62,"url":129,"children":130},{"__typename":13,"path":64},[],{"__typename":10,"title":67,"url":132,"children":133},{"__typename":13,"path":74},[],{"__typename":10,"title":135,"url":136,"children":138},"Newsletter",{"__typename":13,"path":137},"/en/newsletter",[],{"__typename":6,"name":140,"items":141},"Footer Column 3 (External Links)",[142,147,152,157,162],{"__typename":10,"title":143,"url":144,"children":146},"nic.ch",{"__typename":13,"path":145},"https://www.nic.ch/",[],{"__typename":10,"title":148,"url":149,"children":151},"nic.li",{"__typename":13,"path":150},"https://www.nic.li/",[],{"__typename":10,"title":153,"url":154,"children":156},"eduid.ch",{"__typename":13,"path":155},"https://eduid.ch/",[],{"__typename":10,"title":158,"url":159,"children":161},"eduhub.ch",{"__typename":13,"path":160},"https://www.eduhub.ch/",[],{"__typename":10,"title":163,"url":164,"children":166},"Community Portal",{"__typename":13,"path":165},"https://portal.switch.ch/",[],{"__typename":6,"name":168,"items":169},"Copyright",[170,175,180],{"__typename":10,"title":171,"url":172,"children":174},"Data protection",{"__typename":13,"path":173},"/en/data-protection",[],{"__typename":10,"title":176,"url":177,"children":179},"Imprint",{"__typename":13,"path":178},"/en/imprint",[],{"__typename":10,"title":181,"url":182,"children":184},"Legal notice",{"__typename":13,"path":183},"/en/legal-notice",[],false,7,{"data":188,"loading":185,"networkStatus":186},{"settings":189},{"__typename":190,"site_name":191,"slogan":192},"SiteSettings","Â̲èÖ±²¥","",{"data":194,"loading":185,"networkStatus":186},{"router":195},{"__typename":196,"entity":197},"EntityResponse",{"__typename":198,"_id":199,"nid":200,"title":201,"langcode":202,"alternates":203,"breadcrumb":214,"seo_information":215,"content_elements":219,"lead":217,"date_published":263,"og_image":264,"image":266,"topics":273,"blog_view":277,"insight_author":286,"insights_overview_page":214},"BlogDetailpage","cbc89bf1-3e6b-449b-8fb4-5d5c961cc713",442,"Working for a secure Swiss Internet","en",[204,208,211],{"__typename":205,"language_id":206,"url":207},"AlternatePathItem","EN","/en/insights/working-secure-swiss-internet",{"__typename":205,"language_id":209,"url":210},"DE","/de/insights/im-einsatz-fuer-ein-sicheres-schweizer-internet",{"__typename":205,"language_id":212,"url":213},"FR","/fr/insights/engagement-pour-un-internet-sur-en-suisse",null,{"__typename":216,"meta_description":217,"meta_name_robots":192,"canonical":207,"page_title":218,"keywords":192,"hreflang":202},"SeoInformation","Thousands of people in Switzerland fall victim to cyberattacks every year. Last year alone, Â̲èÖ±²¥ handled 2,500 cases of abuse. More worrying than the number of attacks is the increasing technical sophistication. A glimpse behind the scenes shows how Â̲èÖ±²¥ unmasks ever more perfidious cyberthreats every day.","Working for a secure Swiss Internet | Â̲èÖ±²¥",[220,225,243,247,259],{"__typename":221,"_id":222,"paragraph_id":223,"title":214,"text":224},"TextItem","cb85205a-e6ba-44f7-bf9a-250785dea3d5",3023,"\u003Cp>I’ve been working at the Â̲èÖ±²¥ registry for six years as a specialist in combating the abuse of .ch and .li domain names. I have witnessed first-hand how cybercriminals are developing ever more perfidious tactics to line their pockets from their victims.\u003C/p>\u003Ch4>Malware and phishing are becoming increasingly sophisticated\u003C/h4>\u003Cp>When I joined Â̲èÖ±²¥ in 2019, the cases of abuse were comparatively simple. We detected phishing simply by surfing a website in a secure environment. We detected malware directly in the website’s source code using known patterns. Complicated cases were the exception.\u003C/p>\u003Cp>However, the complexity of abuse cases has increased significantly in recent years. The criminals have become more cunning. Today, they specifically block IP addresses of security professionals, they use software to detect analysis systems, and they hide their malware behind legitimate services, as we will see in an example later.\u003C/p>\u003Ch4>When branded shoes become a trap\u003C/h4>\u003Cp>My day as a Domain Abuse Handler starts with checking the abuse reports I received. One message immediately catches my eye: Blocking request pursuant to \u003Ca href=\"https://www.fedlex.admin.ch/eli/cc/2014/701/en\">Art. 15 VID\u003C/a> (Swiss Ordinance on Internet Domains). It’s about a fake shop selling cheap branded trainers. But if you order a pair of your dream trainers for a fifth of the original price, you can be sure you’ll never receive a parcel. An \u003Ca href=\"https://www.bakom.admin.ch/bakom/en/homepage/digital-switzerland-and-internet/internet/fight-against-internet-crime.html\">authority recognised\u003C/a> by the Federal Office of Communications (OFCOM) is asking us to block this Swiss domain name. I comply with this, and the fake shop is no longer accessible on the Internet.\u003C/p>\u003Cp>When it comes to fraud, we as a registry have no authority of our own. Only a recognised authority, usually a police force, is authorised to issue an injunction and demand the blocking of a domain name. Our areas of expertise are strictly regulated in the VID. It contains, so to speak, our Ten Commandments – even if it contains more than ten paragraphs.\u003C/p>\u003Ch4>The phishing classics\u003C/h4>\u003Cp>The next case is a reported phishing website. The criminals imitate well-known brands or organisations in order to gain access to their victims’ personal or credit card details. According to the report, this time it was a phishing case against Swiss Post. Since almost everyone in Switzerland comes into contact with Swiss Post and regularly receives parcels, this scam works particularly well.\u003C/p>\u003Cp>So, I’m dealing with a classic, and yet I stut. Amongst other top-level domains such as .com or .top, we come across dozens of such phishing websites every day. Under .ch, they are comparatively rare.\u003C/p>\u003Ch4>The problem with analysis systems\u003C/h4>\u003Cp>Our custom analysis system has already analysed the website. I take a look at the results: 404 – The website cannot be found. This is a common pattern when criminals block our publicly known IP addresses. They try to prevent Â̲èÖ±²¥ from detecting their malware. I therefore use our VPN gateways to resolve the domain from other IP addresses. No luck. Again, just 404s.\u003C/p>\u003Cp>My next tactic is to use a secure browser environment to hide our analytics system and conceal my origin by accessing the website via the Tor network. Bingo! A copy of the official Swiss Post website is displayed with a request to pay CHF 3.28 in customs fees. Upon clicking on ‘Pay now’, input fields for credit card details appear.\u003C/p>",{"__typename":226,"_id":227,"paragraph_id":228,"title":214,"caption":214,"size":229,"image":230},"ImageItem","cce98bde-0469-47b2-81e7-96772cab3e53",3037,"big",{"__typename":231,"src":232,"sources":233,"width":238,"height":239,"alt":240,"type":241,"caption":242},"ImageMedia","https://static.www.switch.ch/sites/default/files/styles/image_small_16_9/public/2025-06/post_phishing.png?itok=kG2GvpcS",[234],{"__typename":235,"src":236,"media":214,"sizes":237},"ImageSource","https://static.www.switch.ch/sites/default/files/styles/image_small_16_9/public/2025-06/post_phishing.png?itok=kG2GvpcS 400w, https://static.www.switch.ch/sites/default/files/styles/image_small_1_5x_16_9/public/2025-06/post_phishing.png?itok=qB83nALS 608w, https://static.www.switch.ch/sites/default/files/styles/image_large_16_9/public/2025-06/post_phishing.png?itok=GGoWyDwx 1024w, https://static.www.switch.ch/sites/default/files/styles/hero_large_16_9/public/2025-06/post_phishing.png?itok=M1SS1F0j 1600w","100vw",3200,1804,"Two screenshots next to each other depicting a fake payment portal of Swiss Post to phish for credit card details.","image/png","Criminals pretend to be Swiss Post and redirect victims to a website where they phish for credit card details. Screenshots: Â̲èÖ±²¥",{"__typename":221,"_id":244,"paragraph_id":245,"title":214,"text":246},"c6f0e108-f4ad-4600-b621-d59e1b269188",3025,"\u003Cp>As no valid address and telephone number were provided when the domain name was registered, I suspect that the criminals themselves have registered the domain name: a so-called abusive registration. I block the domain name immediately. As a result, the website is no longer accessible on the Internet, and it can no longer cause any damage. At the same time, I ask the domain name holder to disclose his identity. After the deadline has passed and the identity request has not been answered, we will revoke the registration of the domain name.\u003C/p>\u003Ch4>Malware remains the biggest challenge\u003C/h4>\u003Cp>I move on to the malware cases where criminals spread malware via mostly compromised websites. This is where my work really begins. In Switzerland, there are four cases of malware for every phishing case. These are also much more complex. Like the case I am dealing with today, which was reported by one of our many threat intelligence partners.\u003C/p>\u003Cp>Our analysis system doesn’t detect the malware. Even when I look at the code more closely, I can’t detect any malware. So, I call my colleague Robin for help. He is an experienced malware expert and knows the current threat situation like a tailor knows his sewing box.\u003C/p>\u003Cp>Robin explains to me: ‘This is a new attack tactic used by ClearFake. They access the financial blockchain ‘Binance’ and download obfuscated code from it. This is executed in the browser and downloads the ClearFake browser infection, which in turn infects the victim’s computer with malware. I’m working on automating the detection of this pattern.’\u003C/p>",{"__typename":226,"_id":248,"paragraph_id":249,"title":214,"caption":250,"size":229,"image":251},"dbae699f-7914-433c-a1d2-8da6176d630c",3026,"Process of a ClearFake infection using obfuscated code in the Binance blockchain. The attack process may differ in other ClearFake incidents. Graphic: Â̲èÖ±²¥",{"__typename":231,"src":252,"sources":253,"width":256,"height":257,"alt":258,"type":241,"caption":250},"https://static.www.switch.ch/sites/default/files/styles/image_small_16_9/public/2025-06/Clearfake.png?itok=VUCd_IO-",[254],{"__typename":235,"src":255,"media":214,"sizes":237},"https://static.www.switch.ch/sites/default/files/styles/image_small_16_9/public/2025-06/Clearfake.png?itok=VUCd_IO- 400w, https://static.www.switch.ch/sites/default/files/styles/image_small_1_5x_16_9/public/2025-06/Clearfake.png?itok=6-J1_3IH 608w, https://static.www.switch.ch/sites/default/files/styles/image_large_16_9/public/2025-06/Clearfake.png?itok=SVkRYSv8 1024w, https://static.www.switch.ch/sites/default/files/styles/hero_large_16_9/public/2025-06/Clearfake.png?itok=sCIZ_Erq 1600w",1752,946,"A graphic illustrating the process of a ClearFake infection using obfuscated code in the Binance blockchain.",{"__typename":221,"_id":260,"paragraph_id":261,"title":214,"text":262},"a30a0cc8-1fcf-4dfa-9b91-69a01de9b585",3027,"\u003Cp>The stored data of the domain name holder looks legitimate in this case. So my suspicion is that criminals have compromised his web server and taken control of the website. I am going to notify the holder and allow 24 hours to remove the malware. If he does not comply with our request within this period, I have to temporarily block the website in accordance with the rules set out in the VID to prevent website visitors from becoming infected with the malware.\u003C/p>\u003Cp>After two hours, the holder removed the compromise. That was quick. But a lingering aftertaste remains, and I wonder:\u003C/p>\u003Cul>\u003Cli>Is all the malware removed?\u003C/li>\u003Cli>Did the holder miss a backdoor?\u003C/li>\u003Cli>Has the holder changed all the system passwords?\u003C/li>\u003Cli>Are all components up to date now?\u003C/li>\u003Cli>Are there no insecure plugins from third-party providers in use?\u003C/li>\u003C/ul>\u003Cp>I know it is the website operator’s responsibility to clarify this. Â̲èÖ±²¥ has no access to their systems and cannot perform these checks. However, we are happy to provide website operators with important security information at \u003Ca href=\"https://www.saferInternet.ch\">www.saferInternet.ch\u003C/a>.\u003C/p>\u003Ch4>Working together for a secure Swiss Internet \u003C/h4>\u003Cp>The cybercriminals are clever, and so are we. However, we rely on everyone to report suspicious websites to the National Cyber Security Centre’s (NCSC) reporting office at \u003Ca href=\"https://www.antiphishing.ch\">www.antiphishing.ch\u003C/a>. Only by working together can we successfully combat the threats to the Swiss Internet.\u003C/p>","27. June 2025",{"__typename":231,"fallback":265},"https://static.www.switch.ch/sites/default/files/styles/image_small_16_9/public/2025-06/chatgpt-image_secure-swiss-internet_0.png?itok=BwWyGlRq",{"__typename":231,"src":265,"sources":267,"width":238,"height":270,"alt":271,"type":241,"caption":272},[268],{"__typename":235,"src":269,"media":214,"sizes":237},"https://static.www.switch.ch/sites/default/files/styles/image_small_16_9/public/2025-06/chatgpt-image_secure-swiss-internet_0.png?itok=BwWyGlRq 400w, https://static.www.switch.ch/sites/default/files/styles/image_small_1_5x_16_9/public/2025-06/chatgpt-image_secure-swiss-internet_0.png?itok=nr6fodOb 608w, https://static.www.switch.ch/sites/default/files/styles/image_large_16_9/public/2025-06/chatgpt-image_secure-swiss-internet_0.png?itok=eMOy831d 1024w, https://static.www.switch.ch/sites/default/files/styles/hero_large_16_9/public/2025-06/chatgpt-image_secure-swiss-internet_0.png?itok=Qla9FeeM 1600w",1802,"A white Swiss cross on red background with a protective network around it.","Together, we can successfully combat the threats to the Swiss Internet. Illustration: ChatGPT",[274,276],{"__typename":275,"name":17},"TaxonomyTerm",{"__typename":275,"name":37},{"__typename":278,"view_id":279,"display_id":280,"pager":281},"View","blog","blog_releated_articles",{"__typename":282,"items_per_page":283,"pager_type":284,"total_pages":285},"ViewsPager",3,"some",0,[287],{"__typename":288,"title":289,"job_title":290,"organisation":191,"image":214,"url":291},"InsightAuthor","Jonas Maag","Security Engineer","/en/jonas-maag",{"data":293,"loading":185,"networkStatus":186},{"view":294},{"__typename":278,"view_id":279,"field_settings":214,"result_count":283,"pager":295,"result":296},{"__typename":282,"items_per_page":283,"pager_type":284,"total_pages":285},[297,319,335,350,364,380],{"__typename":198,"nid":298,"url":299,"teaser_title":300,"teaser_image":301,"topics":312},441,"/en/insights/tom-kleiber-leave-switch","Tom Kleiber to leave Â̲èÖ±²¥",{"__typename":231,"src":302,"sources":303,"width":307,"height":308,"alt":309,"type":310,"caption":311},"https://static.www.switch.ch/sites/default/files/styles/image_xsmall_16_9/public/2025-06/tom-kleiber-switch.jpg?itok=74zFzrIr",[304],{"__typename":235,"src":305,"media":214,"sizes":306},"https://static.www.switch.ch/sites/default/files/styles/image_xsmall_16_9/public/2025-06/tom-kleiber-switch.jpg?itok=74zFzrIr 288w, https://static.www.switch.ch/sites/default/files/styles/image_small_16_9/public/2025-06/tom-kleiber-switch.jpg?itok=IOqzm-OU 400w, https://static.www.switch.ch/sites/default/files/styles/image_medium_16_9/public/2025-06/tom-kleiber-switch.jpg?itok=SXZ1qdPb 544w, https://static.www.switch.ch/sites/default/files/styles/image_small_1_5x_16_9/public/2025-06/tom-kleiber-switch.jpg?itok=ULKABOfF 608w, https://static.www.switch.ch/sites/default/files/styles/image_medium_16_9_1_5x/public/2025-06/tom-kleiber-switch.jpg?itok=AT8ol7Tg 816w","(min-width:600px) 20vw, 70vw.",2500,1667,"Tom Kleiber, Managing Director, Â̲èÖ±²¥.","image/jpeg","Tom Kleiber, Managing Director, Â̲èÖ±²¥. Photo: Beat Schweizer",[313,316],{"__typename":275,"name":314,"id":315},"Corporate",21,{"__typename":275,"name":317,"id":318},"Media release",26,{"__typename":198,"nid":320,"url":321,"teaser_title":322,"teaser_image":323,"topics":332},435,"/en/insights/switch-looking-nextgen-heroes-2025","Â̲èÖ±²¥ is looking for the ‘NextGen Heroes’ of 2025",{"__typename":231,"src":324,"sources":325,"width":328,"height":329,"alt":330,"type":310,"caption":331},"https://static.www.switch.ch/sites/default/files/styles/image_xsmall_16_9/public/2025-05/preisubergabe_david-cleres.jpg?itok=EcZDGJQY",[326],{"__typename":235,"src":327,"media":214,"sizes":306},"https://static.www.switch.ch/sites/default/files/styles/image_xsmall_16_9/public/2025-05/preisubergabe_david-cleres.jpg?itok=EcZDGJQY 288w, https://static.www.switch.ch/sites/default/files/styles/image_small_16_9/public/2025-05/preisubergabe_david-cleres.jpg?itok=6CQb4Enf 400w, https://static.www.switch.ch/sites/default/files/styles/image_medium_16_9/public/2025-05/preisubergabe_david-cleres.jpg?itok=NpeEQNK3 544w, https://static.www.switch.ch/sites/default/files/styles/image_small_1_5x_16_9/public/2025-05/preisubergabe_david-cleres.jpg?itok=QTcdwmZ3 608w, https://static.www.switch.ch/sites/default/files/styles/image_medium_16_9_1_5x/public/2025-05/preisubergabe_david-cleres.jpg?itok=vxk_szgu 816w",3755,2128,"At the Digital Economy Award Night 2024, the audience voted live to select a female and a male winner of the NextGen Hero Award.","At the Digital Economy Award Night 2024, the audience voted live to select a female and a male winner of the NextGen Hero Award. Photo: zvg",[313,333],{"__typename":275,"name":82,"id":334},22,{"__typename":198,"nid":336,"url":337,"teaser_title":338,"teaser_image":339,"topics":347},433,"/en/insights/resilience-against-social-engineering-age-ai","Resilience against social engineering in the age of AI ",{"__typename":231,"src":340,"sources":341,"width":344,"height":345,"alt":346,"type":310,"caption":214},"https://static.www.switch.ch/sites/default/files/styles/image_xsmall_16_9/public/2025-04/adobestock_743341072.jpeg?itok=IxQ0KJNl",[342],{"__typename":235,"src":343,"media":214,"sizes":306},"https://static.www.switch.ch/sites/default/files/styles/image_xsmall_16_9/public/2025-04/adobestock_743341072.jpeg?itok=IxQ0KJNl 288w, https://static.www.switch.ch/sites/default/files/styles/image_small_16_9/public/2025-04/adobestock_743341072.jpeg?itok=WEutx6j6 400w, https://static.www.switch.ch/sites/default/files/styles/image_medium_16_9/public/2025-04/adobestock_743341072.jpeg?itok=wkME00GZ 544w, https://static.www.switch.ch/sites/default/files/styles/image_small_1_5x_16_9/public/2025-04/adobestock_743341072.jpeg?itok=xaJ4O4wp 608w, https://static.www.switch.ch/sites/default/files/styles/image_medium_16_9_1_5x/public/2025-04/adobestock_743341072.jpeg?itok=PerBmkjF 816w",5472,3078,"Cornelia_Insight",[348],{"__typename":275,"name":17,"id":349},2,{"__typename":198,"nid":351,"url":352,"teaser_title":353,"teaser_image":354,"topics":363},430,"/en/insights/digital-ecosystem-networked-research","A digital ecosystem for networked research",{"__typename":231,"src":355,"sources":356,"width":359,"height":360,"alt":361,"type":310,"caption":362},"https://static.www.switch.ch/sites/default/files/styles/image_xsmall_16_9/public/2025-04/eosc_data-commons_header.jpg?itok=nb4smO0S",[357],{"__typename":235,"src":358,"media":214,"sizes":306},"https://static.www.switch.ch/sites/default/files/styles/image_xsmall_16_9/public/2025-04/eosc_data-commons_header.jpg?itok=nb4smO0S 288w, https://static.www.switch.ch/sites/default/files/styles/image_small_16_9/public/2025-04/eosc_data-commons_header.jpg?itok=FScx0bi8 400w, https://static.www.switch.ch/sites/default/files/styles/image_medium_16_9/public/2025-04/eosc_data-commons_header.jpg?itok=W40PBuAx 544w, https://static.www.switch.ch/sites/default/files/styles/image_small_1_5x_16_9/public/2025-04/eosc_data-commons_header.jpg?itok=l_YEbcMW 608w, https://static.www.switch.ch/sites/default/files/styles/image_medium_16_9_1_5x/public/2025-04/eosc_data-commons_header.jpg?itok=iVfFkrQb 816w",2000,1124,"Interview with Sebastian Sigloch from Â̲èÖ±²¥ about the EOSC Data Commons project. ","Sebastian Sigloch from Â̲èÖ±²¥ talks about the EOSC Data Commons project. Photos: Samuel Schneider, Â̲èÖ±²¥",[333,313],{"__typename":198,"nid":365,"url":366,"teaser_title":367,"teaser_image":368,"topics":376},426,"/en/insights/switch-cloud-swiss-education-and-research-cloud","Â̲èÖ±²¥ Cloud: The Swiss education and research cloud",{"__typename":231,"src":369,"sources":370,"width":359,"height":373,"alt":374,"type":310,"caption":375},"https://static.www.switch.ch/sites/default/files/styles/image_xsmall_16_9/public/2025-03/green_metro_campus_zuerich_datacenter_m_dielsdorf.jpg?itok=whMAez1i",[371],{"__typename":235,"src":372,"media":214,"sizes":306},"https://static.www.switch.ch/sites/default/files/styles/image_xsmall_16_9/public/2025-03/green_metro_campus_zuerich_datacenter_m_dielsdorf.jpg?itok=whMAez1i 288w, https://static.www.switch.ch/sites/default/files/styles/image_small_16_9/public/2025-03/green_metro_campus_zuerich_datacenter_m_dielsdorf.jpg?itok=OVctK00j 400w, https://static.www.switch.ch/sites/default/files/styles/image_medium_16_9/public/2025-03/green_metro_campus_zuerich_datacenter_m_dielsdorf.jpg?itok=pCRRMDwC 544w, https://static.www.switch.ch/sites/default/files/styles/image_small_1_5x_16_9/public/2025-03/green_metro_campus_zuerich_datacenter_m_dielsdorf.jpg?itok=oqH01I-J 608w, https://static.www.switch.ch/sites/default/files/styles/image_medium_16_9_1_5x/public/2025-03/green_metro_campus_zuerich_datacenter_m_dielsdorf.jpg?itok=pEnhDpTW 816w",1118,"Green Metro Campus Zurich","Â̲èÖ±²¥ cloud is located at two of Green's ISO-certified sites in Dielsdorf and Lupfig. Pictured: Green Metro Campus Zurich in Dielsdorf. Photo: Green",[313,377,378,316],{"__typename":275,"name":22,"id":283},{"__typename":275,"name":42,"id":379},5,{"__typename":198,"nid":381,"url":382,"teaser_title":383,"teaser_image":384,"topics":392},425,"/en/insights/cyberattack-hospital-between-it-security-and-law-enforcement","Cyberattack on a hospital – between IT security and law enforcement",{"__typename":231,"src":385,"sources":386,"width":389,"height":390,"alt":391,"type":241,"caption":214},"https://static.www.switch.ch/sites/default/files/styles/image_xsmall_16_9/public/2025-02/darja_23.png?itok=KIOMuP43",[387],{"__typename":235,"src":388,"media":214,"sizes":306},"https://static.www.switch.ch/sites/default/files/styles/image_xsmall_16_9/public/2025-02/darja_23.png?itok=KIOMuP43 288w, https://static.www.switch.ch/sites/default/files/styles/image_small_16_9/public/2025-02/darja_23.png?itok=5asEKEWW 400w, https://static.www.switch.ch/sites/default/files/styles/image_medium_16_9/public/2025-02/darja_23.png?itok=wtVYcl2I 544w, https://static.www.switch.ch/sites/default/files/styles/image_small_1_5x_16_9/public/2025-02/darja_23.png?itok=fyK78-Ln 608w, https://static.www.switch.ch/sites/default/files/styles/image_medium_16_9_1_5x/public/2025-02/darja_23.png?itok=1_VcRjIX 816w",1185,677,"darja insight",[348],1751037543459]