Blogs by Fox-IT
Can you use malware to bypass a data diode system with radio waves?
Is it possible to break the ‘unbreakable’?
Your trust, our signature
Signing phishing mails to fake trust
New ransomware also hits the Netherlands
Dozens of companies have been affected
Phishing – Ask and ye shall receive
Impersonating everyday applications for profit
Cost of cyber incidents a limiting factor to M&A?
When an incident turns into a catastrophe
Bokbot: The (re)birth of a banker
Connecting a new threat to an old threat actor group: Neverquest
SMS-authentication is no longer sufficient for IT-administration
6 questions and answers about 2-factor authentication
Catching an insider spy
The risk of insider threats for organisations
Nine years of bugs and coordinated vulnerability disclosure
Only 26% of researched security vulnerabilities are resolved
Introducing Team Foundation Server decryption tool
Two new tools to decrypt sensitive information
Papers by Fox-IT
Open Banking: A new era in financial services is about to start
How Fox-IT Enables Open Banking and PSD2
Mofang: a politically motivated information stealing adversary
This report describes the results of an extensive study into the spy ring Mofang. It contains contextual as well as technical information about the group and its activities.
Cyber Threat Management platform: defense against known and unknown threats
In this whitepaper we are presenting our intelligence-driven and operational approach of cyber security and our Cyber Threat Management platform.
Ponmocup: a giant hiding in the shadows
This report describes the results of an extensive study about the Ponmocup botnet. It provides a complete time-line and unique insight into the modus operandi of the Ponmocup operation and describes the important details of the malware.
‘GameOver Zeus – Backgrounds on the Badguys and the Backends’
This whitepaper describes the results of the research we conducted together with the FBI on the cybercrime group ‘Businessclub’.
Fox DataDiode: Protecting Critical Assets and Production Environments
Whitepaper about the Fox DataDiode: a one-way data connection that protects the integrity and availability of critical assets in ICS-networks.
Protecting confidential information using data diodes
Briefing paper about how data diodes are used to protect confidential information.
Fox-IT in the Media
Erasmus University tests employees with phishing mail
One in five fell for ‘e-mail virus’ experiment
Dutch government is worried about Chinese espionage via police software
Should the government be worried?
Changes in management of Fox-IT due to new corporate structure
Fox-IT has restructured and is now aligned to three divisions: Managed Services, Professional Services and Crypto.
Fox-IT wins security supplier of the year award
Computable Awards 2018
Frank Groenewegen – Algemeen Dagblad
We are still recruiting from the same pool
Sanne Maasakkers – RTV Utrecht
Small businesses are less often victims of cyber attacks
Frank Groenewegen – NU.nl
Which countries are spying on us online?
Sanne Maasakkers – NU.nl
How safe are you online?
Frank Groenewegen – BNR Nieuwsradio
Is the Russian hack operation in the Netherlands a sign of cyber war?
Frank Groenewegen and Sanne Maasakkers – Radio EenVandaag
How do Dutch people think about their online privacy?