Blogs by Fox-IT
MITM6: compromising IPv4 networks via IPv6
Investigating an attack that abuses the default IPv6 configuration
Webinar Meltdown & Spectre
Recorded version available
Fox-IT hit by cyber attack
Lessons learned from a Man-in-the-Middle attack
Criminals in a festive mood?
Zeus Panda banking malware
Detection and recovery of NSA’s covered up tracks
Fox-IT's blog on DanderSpritz' eventlogedit
Further abusing the badPwdCount attribute
How to remediate the issue
BadRabbit ransomware hits Eastern Europe
This is what we know so far
Vulnerabilities in WPA2
Fox-IT debunks report on ByLock app that landed 75,000 people in jail in Turkey
Multiple key findings from the MIT investigation were contradicted
Ethical aspects of mistakes in software
Papers by Fox-IT
Open Banking: A new era in financial services is about to start
How Fox-IT Enables Open Banking and PSD2
Mofang: a politically motivated information stealing adversary
This report describes the results of an extensive study into the spy ring Mofang. It contains contextual as well as technical information about the group and its activities.
Cyber Threat Management platform: defense against known and unknown threats
In this whitepaper we are presenting our intelligence-driven and operational approach of cyber security and our Cyber Threat Management platform.
Ponmocup: a giant hiding in the shadows
This report describes the results of an extensive study about the Ponmocup botnet. It provides a complete time-line and unique insight into the modus operandi of the Ponmocup operation and describes the important details of the malware.
‘GameOver Zeus – Backgrounds on the Badguys and the Backends’
This whitepaper describes the results of the research we conducted together with the FBI on the cybercrime group ‘Businessclub’.
Fox DataDiode: Protecting Critical Assets and Production Environments
Whitepaper about the Fox DataDiode: a one-way data connection that protects the integrity and availability of critical assets in ICS-networks.
Protecting confidential information using data diodes
Briefing paper about how data diodes are used to protect confidential information.
Fox-IT in the Media
Erik de Jong talks about IoT on Radio1
'It's time for a quality mark for IoT devices'
How to start 2018 safely on the internet?
Erik de Jong in Volkskrant
Blog Graham Cluley
Fox-IT reveals hackers hijacked its DNS records, spied on clients' files
Ronald Prins at Radio 1 on infrastructure protection
"In theory, we can open all locks at the same time."
Interview Ronald Prins on CIO.nl
Public authorities should protect public order on the internet
Ronald Prins talks about his farewell to Fox-IT
"I worked within the technique for 18 years with great pleasure."
Interview Frank Groenewegen about North Korean hackers
The Lazarus Group
Interview Joachim Schipper in Tweakers
The the impact of quantum computers on cryptography
Gina Doekhie at Accountantsdag 2017
Dutch accountancy firm got hacked
Article Ronald Prins in CFO Magazine
Organizations need to understand the importance of cybersecurity