Blogs by Fox-IT
The many-faced CISO
What kind of CISO are you?
The lessons of one year GDPR
Ideally, you ensure that all sensitive information is "secured by design"
A year of GDPR in the Netherlands: Cyber risks and data breaches
It has already been over a year since the General Data Protection Regulation (GDPR) entered into…
Can you use malware to bypass a data diode system with radio waves?
Is it possible to break the ‘unbreakable’?
Your trust, our signature
Signing phishing mails to fake trust
New ransomware also hits the Netherlands
Dozens of companies have been affected
Phishing – Ask and ye shall receive
Impersonating everyday applications for profit
Cost of cyber incidents a limiting factor to M&A?
When an incident turns into a catastrophe
Bokbot: The (re)birth of a banker
Connecting a new threat to an old threat actor group: Neverquest
SMS-authentication is no longer sufficient for IT-administration
6 questions and answers about 2-factor authentication
Papers by Fox-IT
Central Election Commission in regards to the Supporting Software of the elections
The report contains vulnerabilities identified by Fox-IT
Open Banking: A new era in financial services is about to start
How Fox-IT Enables Open Banking and PSD2
Mofang: a politically motivated information stealing adversary
This report describes the results of an extensive study into the spy ring Mofang. It contains contextual as well as technical information about the group and its activities.
Cyber Threat Management platform: defense against known and unknown threats
In this whitepaper we are presenting our intelligence-driven and operational approach of cyber security and our Cyber Threat Management platform.
Ponmocup: a giant hiding in the shadows
This report describes the results of an extensive study about the Ponmocup botnet. It provides a complete time-line and unique insight into the modus operandi of the Ponmocup operation and describes the important details of the malware.
‘GameOver Zeus – Backgrounds on the Badguys and the Backends’
This whitepaper describes the results of the research we conducted together with the FBI on the cybercrime group ‘Businessclub’.
Fox DataDiode: Protecting Critical Assets and Production Environments
Whitepaper about the Fox DataDiode: a one-way data connection that protects the integrity and availability of critical assets in ICS-networks.
Protecting confidential information using data diodes
Briefing paper about how data diodes are used to protect confidential information.
Fox-IT in the Media
How do you recognise a fake webshop?
7 tips to recognise a bogus webshop
5G Supply chain is vulnerable
"This is the second largest threat to 5G, after hackers attacking the telco provider themselves"
Erik Ploegmakers about cybercrime and financials
The financial sector is far ahead compared to other industries
Homecomputers often easy targets for hackers
What can you do to improve your security?
Using a western supplier does not guarantee the prevention of espionage
It is important that companies, especially companies within the critical infrastructure, assume that they are hacked or can be hacked.
Growing partnership between Russian intelligence agency and cyber criminals
Michael Sandee tells about how he discovered one of these collaboration between the intelligence agency and one of the most dangerous cyber criminals in the world, Evgeniy Bogachev.
Continuing concerns about safety 5G network
‘It is important that the government comes up soon with laws and regulations to check privatized organizations who have access to the Dutch infrastructure.”
WhatsApp phishing, a growing problem
How can you avoid becoming a victim?
CEO fraud is becoming more common
Fraudsters pretending to be the CEO to steal their money. CEO fraud is becoming more common nowadays.
CEOs should be more aware of their own cyber security risks
Every large corporation should regularly map the cyber security risks for its CEO