Blogs by Fox-IT
Detection and recovery of NSA’s covered up tracks
Fox-IT's blog on DanderSpritz' eventlogedit
Further abusing the badPwdCount attribute
How to remediate the issue
BadRabbit ransomware hits Eastern Europe
This is what we know so far
Vulnerabilities in WPA2
Fox-IT debunks report on ByLock app that landed 75,000 people in jail in Turkey
Multiple key findings from the MIT investigation were contradicted
Ethical aspects of mistakes in software
Connect your Factory
Anti-virus (heuristic) evasion
Anti-virus detection during phishing simulations
FAQ about Petya outbreak
Everything you need to know about the ransomware attack
More spreading mechanisms than Wanacry
Papers by Fox-IT
Mofang: a politically motivated information stealing adversary
This report describes the results of an extensive study into the spy ring Mofang. It contains contextual as well as technical information about the group and its activities.
Cyber Threat Management platform: defense against known and unknown threats
In this whitepaper we are presenting our intelligence-driven and operational approach of cyber security and our Cyber Threat Management platform.
Ponmocup: a giant hiding in the shadows
This report describes the results of an extensive study about the Ponmocup botnet. It provides a complete time-line and unique insight into the modus operandi of the Ponmocup operation and describes the important details of the malware.
‘GameOver Zeus – Backgrounds on the Badguys and the Backends’
This whitepaper describes the results of the research we conducted together with the FBI on the cybercrime group ‘Businessclub’.
Fox DataDiode: Protecting Critical Assets and Production Environments
Whitepaper about the Fox DataDiode: a one-way data connection that protects the integrity and availability of critical assets in ICS-networks.
Protecting confidential information using data diodes
Briefing paper about how data diodes are used to protect confidential information.
Fox-IT in the Media
Ronald Prins talks about his farewell to Fox-IT
"I worked within the technique for 18 years with great pleasure."
Interview Frank Groenewegen about North Korean hackers
The Lazarus Group
Interview Joachim Schipper in Tweakers
The the impact of quantum computers on cryptography
Gina Doekhie at Accountantsdag 2017
Dutch accountancy firm got hacked
Article Ronald Prins in CFO Magazine
Organizations need to understand the importance of cybersecurity
Opinion piece by Ronald Prins
"Why do authorities still don't recognize the internet as a public space?"
Ronald Prins about Uber hack on Dutch news radio
What to do when your company is hacked?
Gina Doekhie on Dutch television show
"Hackers deliberately use external IP addresses."
Radio 1 interviewed Frank Groenewegen about fake news
"Techfirms need to take action against fake news."
Interview Frank Groenewegen in NOS article
New way of collecting virtual currency