Blogs by Fox-IT
Connect your Factory
Anti-virus (heuristic) evasion
Anti-virus detection during phishing simulations
FAQ about Petya outbreak
Everything you need to know about the ransomware attack
Society has to be digitally resilient. But how?
Cyber Security Assessment Netherlands 2017
SCADA Cyber Security
The mammoth cost of not being prepared
TEMPEST attacks against AES
Covertly stealing keys for €200
Serious threat or serious hype?
FAQ on the WanaCry ransomware outbreak
Learn more about the ransomware variant WanaCry
Massive outbreak of ransomware variant
Large amounts of computers around the world infected
Common weaknesses in your Windows network
Relaying credentials everywhere with ntlmrelayx
Papers by Fox-IT
Mofang: a politically motivated information stealing adversary
This report describes the results of an extensive study into the spy ring Mofang. It contains contextual as well as technical information about the group and its activities.
Cyber Threat Management platform: defense against known and unknown threats
In this whitepaper we are presenting our intelligence-driven and operational approach of cyber security and our Cyber Threat Management platform.
Ponmocup: a giant hiding in the shadows
This report describes the results of an extensive study about the Ponmocup botnet. It provides a complete time-line and unique insight into the modus operandi of the Ponmocup operation and describes the important details of the malware.
‘GameOver Zeus – Backgrounds on the Badguys and the Backends’
This whitepaper describes the results of the research we conducted together with the FBI on the cybercrime group ‘Businessclub’.
Fox DataDiode: Protecting Critical Assets and Production Environments
Whitepaper about the Fox DataDiode: a one-way data connection that protects the integrity and availability of critical assets in ICS-networks.
Protecting confidential information using data diodes
Briefing paper about how data diodes are used to protect confidential information.
Fox-IT in the Media
Interview Ronald Prins on Radio 1
The importance of cyber security in vital sectors
More spreading mechanisms than Wanacry
Third CyberOpleidingsProgramma (COP III) launched
Ministry of Defence and Fox-IT close framework agreement
Secret services fear hacks by the British during Brexit negotiations
News item in NRC Handelsblad
Fox-IT nominated for Smart Business Award
Category Best Network Security
Inspiring Fifty Netherlands 2017
Joost Halkes in BNR
Business News Radio program 'Zakendoen'
Smart Business Strategies: Business Meets IT-seminar
The future is digital, certainly for criminals
Turkish hacktivists targeting the Netherlands: high noise, low impact
Political tensions result in a surge in activity from several Turkish hacker groups
CSR Magazine March 2017
Ronald Prins: 'Invest in a digital business climate'
Events with Fox-IT
Cyber Security Awareness
Keynote Torsten Noack: ICS Cybersecurity summit DACH
Cybercrime – The Real Deal
Keynote: Marcel van Oirschot at CGE Risk Management Solutions
Why do we have cyber criminals and what is their right of existence?
Keynote: Marcel van Oirschot breakfast session at VOA
For a more secure society!
Access to Talent Day
Cyber Security Week 2017
Cyber Crisis Workshop
Cyber Security Week 2017
Keynote: Marcel van Oirschot at the Hague University of Applied Sciences
Guest lecture cyber crisis management
Keynote: Marcel van Oirschot at the Cyber Crime in Transport and Logistic Congress
Different hacks and motives for hackers
FS-ISAC 2017 Fall Summit
Strength in Sharing- Content. Connection. Collaboration.
Keynote: Ronald Prins at Maritime Tech 2017
The industry in transformation