Skip to content

Swiss AI Weeks

Join the movement! Swiss {ai} Weeks calls on researchers, developers, businesses, and citizens to come together and build the future of AI — hands-on, ethical, and open. This isn’t just exploration, it’s collaboration in action.

CYD Fellowships

To promote research and education in cyber-defence, the EPFL and the Cyber-Defence (CYD) Campus have jointly launched the “CYD Fellowships – A Talent Program for Cyber-Defence Research.”

The 12th call for applications is now open, with a rolling call for Master Thesis Fellowship applications and Proof of Concept Fellowship applications, and with a deadline of 20 August 2025 (17:00 CEST) for Doctoral and Distinguished Postdoctoral Fellowship applications.

Tech4Trust Awards Ceremony 2025

Join us for the Tech4Trust Season 6 Awards Ceremony, celebrating excellence in cybersecurity and digital trust startups. This high-level event brings together corporate decision-makers, investors, and Switzerland’s most innovative startups for a day of recognition, insights, and networking. 🏆🎉 Sponsored by our strategic partners Canton of Vaud, PwC Switzerland, Fortinet, Unlimitrust Campus, and Exoscale.

Amazon will nicht, dass die Republik Verträge mit dem Bund sieht

Digitale Souveränität und doch bei einem der ‘Großen’ einkaufen? Mit diesem Versprechen sind US-amerikanische Tech-Giganten in den letzten Jahren in Europa werben gegangen. Doch wie passt das zusammen mit dem Versuch der schweizerischen Öffentlichkeit die Details der Rahmenverträge mit dem Bund vorenthalten zu wollen?

ENISA launches European vulnerability database

ENISA’s new vulnerability database is a significant development in the pursuit of European digital sovereignty. It reduces reliance on US-dominated resources and could lead to better alignment with EU regulations, such as the GDPR and the NIS2 Directive. However, key questions remain about coordination with existing global databases, disclosure policies, and the participation of non-EU (…)

Microsoft open sources Windows Subsystem for Linux – well, most of it

It’s fascinating to see the tightrope dance Microsoft is doing with open source. While most of its operating system is closed source, Microsoft actively participates in several open source projects and provides some of its programs under an open source license. Open sourcing is beneficial because it allows security researchers to examine the source code (…)

eID Privacy Hands-on Workshop

Switzerland’s digital identity (eID) system is ready, and a public referendum on the new law is scheduled for 28th of September 2025. C4DT started working on the recently awarded Innosuisse grant to research privacy-preserving technologies for the eID. We’ll present our first findings, as well as the current Swiyu test environment during our upcoming hands-on (…)

How agentic AI can drive workforce transformation

‘I call it the ‘AI dilemma’: while AI may threaten many jobs, it also serves as an essential tool to mitigate its own impact by boosting re-skilling and upskilling initiatives. I appreciate this article because it demonstrates how agentic AI can be employed in lifelong learning systems to reduce skill gaps, which are in part (…)

White House scraps plan to block data brokers from selling Americans’ sensitive data

A senior official in the Trump administration has withdrawn a proposal that would have prevented data brokers from selling Americans’ personal and financial information, leaving these companies exempt from federal privacy regulations that apply to other companies. It’s puzzling that sharing health data requires strict consent and safeguards, while other personal data can be shared (…)

Japan enacts new Active Cyberdefense Law allowing for offensive cyber operations

The new bill shifts Japan’s strategy from defensive cybersecurity to active threat disruption, similar to approaches in other countries like the U.S. However, it uniquely empowers military and law enforcement to take preemptive actions, including deploying ‘cyber harm prevention officers’ to disrupt enemy servers without explicit oversight during critical incidents, raising concerns about potential ‘vigilante (…)

Das neue Policy Paper C4DT Insight #2 mit dem Titel “Datenstrategie,-Policy und -Regulierung für die Schweiz” ist erschienen!

Melanie Kolbe-Guyot und Matthias Finger diskutieren die Notwendigkeit einer umfassenden Datenpolitik für die Schweiz, um das Potenzial von Daten durch klare Regeln und Anreize zu nutzen und die Wettbewerbsfähigkeit langfristig zu sichern. Es formuliert 6 Handlungsempfehlungen für die Politik.

C4DT Insight #2: Datenstrategie,-Policy und -Regulierung für die Schweiz

In diesem Paper diskutieren Melanie Kolbe-Guyot und Matthias Finger die Notwendigkeit einer umfassenden Datenpolitik für die Schweiz, um das Potenzial von Daten durch klare Regeln und Anreize zu nutzen und die Wettbewerbsfähigkeit langfristig zu sichern. Es formuliert 6 Handlungsempfehlungen für die Politik.

Das globale Outsourcing hinter Sozialen Medien und KI

Dieser Artikel stellt die Arbeit der Initiative Data4Mods vor – eine Kooperation zwischen der African Content Moderators’ Union (ACMU) und der schweizerischen NGO personaldata.io, deren Ziel es ist, die Verflechtungen in den Arbeitsbeziehungen im Bereich Contentmoderation und Datenarbeit offen zu legen. Die Abwicklung über Dienstleister, die Outsourcing-Zentren in Ländern auf dem afrikanischen Kontinent betreiben, verschleiert die Rolle der (…)

Nintendo says your Switch 2 isn’t really yours even if you paid for it

Companies are taking advantage of the digital world to keep control over physical devices, even after you buy them. The latest licensing terms of the Nintendo Switch 2 contains wording that allows the company to permanently disable the console if it determines you’ve violated their terms. This highlights a serious trust concern: even after paying (…)

Advanced Cryptography

The NSCS has released an excellent overview of advanced cryptographic techniques and their potential applications. It wisely points out that while these new methods (e.g., homomorphic encryption, multiparty computation or zero-knowledge proofs) provide unique data-processing functionalities to solve certain privacy and trust problems, they come with significant trade-offs in performance, complexity and maturity. To guide (…)

Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials

Supply chain attacks are improving through automation. Adding new libraries to a software project has always been a point of vulnerability, but now that tools like ‘Cursor’ can add libraries automatically, developers are paying less attention to what gets installed. Some tools add libraries that send API keys of LLMs to attackers and load other (…)

Summer Research Institute 2025

The Research Institute (SuRI) is an annual event that takes place at the School of Computer and Communication Sciences of the École polytechnique fédérale de Lausanne, Switzerland. The workshop brings together researchers and experts from academia and industry for research talks and informal discussions.