Blogs by Fox-IT
Can you use malware to bypass a data diode system with radio waves?
Is it possible to break the ‘unbreakable’?
Your trust, our signature
Signing phishing mails to fake trust
New ransomware also hits the Netherlands
Dozens of companies have been affected
Phishing – Ask and ye shall receive
Impersonating everyday applications for profit
Cost of cyber incidents a limiting factor to M&A?
When an incident turns into a catastrophe
Bokbot: The (re)birth of a banker
Connecting a new threat to an old threat actor group: Neverquest
SMS-authentication is no longer sufficient for IT-administration
6 questions and answers about 2-factor authentication
Catching an insider spy
The risk of insider threats for organisations
Nine years of bugs and coordinated vulnerability disclosure
Only 26% of researched security vulnerabilities are resolved
Introducing Team Foundation Server decryption tool
Two new tools to decrypt sensitive information
Papers by Fox-IT
Central Election Commission in regards to the Supporting Software of the elections
The report contains vulnerabilities identified by Fox-IT
Open Banking: A new era in financial services is about to start
How Fox-IT Enables Open Banking and PSD2
Mofang: a politically motivated information stealing adversary
This report describes the results of an extensive study into the spy ring Mofang. It contains contextual as well as technical information about the group and its activities.
Cyber Threat Management platform: defense against known and unknown threats
In this whitepaper we are presenting our intelligence-driven and operational approach of cyber security and our Cyber Threat Management platform.
Ponmocup: a giant hiding in the shadows
This report describes the results of an extensive study about the Ponmocup botnet. It provides a complete time-line and unique insight into the modus operandi of the Ponmocup operation and describes the important details of the malware.
‘GameOver Zeus – Backgrounds on the Badguys and the Backends’
This whitepaper describes the results of the research we conducted together with the FBI on the cybercrime group ‘Businessclub’.
Fox DataDiode: Protecting Critical Assets and Production Environments
Whitepaper about the Fox DataDiode: a one-way data connection that protects the integrity and availability of critical assets in ICS-networks.
Protecting confidential information using data diodes
Briefing paper about how data diodes are used to protect confidential information.
Fox-IT in the Media
Growing partnership between Russian intelligence agency and cyber criminals
Michael Sandee tells about how he discovered one of these collaboration between the intelligence agency and one of the most dangerous cyber criminals in the world, Evgeniy Bogachev.
CEO fraud is becoming more common
Fraudsters pretending to be the CEO to steal their money. CEO fraud is becoming more common nowadays.
CEOs should be more aware of their own cyber security risks
Every large corporation should regularly map the cyber security risks for its CEO
Fox-IT Earns Acclaim from Frost & Sullivan for Its Managed Security Service Product Line
Fox-IT's solutions scale with the needs of its clients
Erasmus University tests employees with phishing mail
One in five fell for ‘e-mail virus’ experiment
More women in IT makes tech industry stronger
There is shortage of women in IT. Technical jobs still suffer from a boring image. That has to change.
Cyber security standards are needed for safe use of technology
Cyber security norms and constantly maintaining these norms are crucial for safe hardware and software use
Popular password managers are safe but not waterproof
Fox-IT: 'The risk attributed to this leak is acceptable provided that two-step verification is also used.'
Dutch government is worried about Chinese espionage via police software
Should the government be worried?
Changes in management of Fox-IT due to new corporate structure
Fox-IT has restructured and is now aligned to three divisions: Managed Services, Professional Services and Crypto.