Blogs by Fox-IT
Vulnerabilities in WPA2
Fox-IT debunks report on ByLock app that landed 75,000 people in jail in Turkey
Multiple key findings from the MIT investigation were contradicted
Ethical aspects of mistakes in software
Connect your Factory
Anti-virus (heuristic) evasion
Anti-virus detection during phishing simulations
FAQ about Petya outbreak
Everything you need to know about the ransomware attack
More spreading mechanisms than Wanacry
SCADA Cyber Security
The mammoth cost of not being prepared
TEMPEST attacks against AES
Covertly stealing keys for €200
Serious threat or serious hype?
Papers by Fox-IT
Mofang: a politically motivated information stealing adversary
This report describes the results of an extensive study into the spy ring Mofang. It contains contextual as well as technical information about the group and its activities.
Cyber Threat Management platform: defense against known and unknown threats
In this whitepaper we are presenting our intelligence-driven and operational approach of cyber security and our Cyber Threat Management platform.
Ponmocup: a giant hiding in the shadows
This report describes the results of an extensive study about the Ponmocup botnet. It provides a complete time-line and unique insight into the modus operandi of the Ponmocup operation and describes the important details of the malware.
‘GameOver Zeus – Backgrounds on the Badguys and the Backends’
This whitepaper describes the results of the research we conducted together with the FBI on the cybercrime group ‘Businessclub’.
Fox DataDiode: Protecting Critical Assets and Production Environments
Whitepaper about the Fox DataDiode: a one-way data connection that protects the integrity and availability of critical assets in ICS-networks.
Protecting confidential information using data diodes
Briefing paper about how data diodes are used to protect confidential information.
Fox-IT in the Media
Foxers Dirk-Jan Mollema and Rolf Govers in Smart Business
This is how a hacker hacks your computer
Ronald Prins on Dutch Television
"Dutch government insufficiently aware of cyber crime."
Growing amount of companies specialized in cyber security
How do you maintain high standards?
Interview Ronald Prins on Radio 1
The importance of cyber security in vital sectors in the UK
Secret services fear hacks by the British during Brexit negotiations
News item in NRC Handelsblad
Inspiring Fifty Netherlands 2017
Joost Halkes in BNR
Fox-IT focuses on law firms
Smart Business Strategies: Business Meets IT-seminar
The future is digital, certainly for criminals
CSR Magazine March 2017
Ronald Prins: "Invest in a digital business climate."
Inside the Hunt for Russia’s Most Notorious Hacker
Michael Sandee: "At some point, a light bulb went off. These are espionage commands."
Events with Fox-IT
OSIsoft EMEA User Conference
Transform your world
Cyber Security Symposium
Fox-IT symposium 2017
For a more secure society
FS-ISAC 2017 European Summit
Strength in Sharing - Content. Connection. Collaboration.
The Dutch trade fair in the field of IT security for IT managers and professionals
Keynote: Marcel van Oirschot at the Day of the Physiotherapist
‘ICT- failure and Cybersecurity, are you prepared?’
Everything you need to know about IT security