From large scale data collection to timelining events.
In recent years, Fox-IT has observed a significant evolution in the field of Incident Response (IR). With the scale of incidents increasing, our engagements now frequently involve managing not just a few systems but handling over a thousand. This increase in scale has necessitated refining our approach to seamlessly integrate diverse data sources, manage a […]
How to develop secure software
Secure software development frameworks and methodologies have been around for 20 years. Yet, despite many companies committing to them, we still have vulnerable software that enables devastating cyberattacks. Therefore, many organizations question the value of secure software development processes and do not know how to organize their software development to be secure-by-design. In this talk, […]
Inside a CTI investigation
A deep dive into an investigation on a malicious infastructure, navigating using cyber threat intelligence frameworks to your advantage. How we navigated different sources of information and collaboration, to figure out what was the heck was going on.
Anyone Can Launch a DDoS: Gorilla botnet & DDoS-for-Hire
DDoS-for-hire services have plagued the Internet for years, and recently the “Gorilla botnet” gained notoriety for performing a large number of high-profile DDoS attacks, some of which were targeted at large Dutch organizations. In this talk we share insights of our ongoing investigations in DDoS-for-hire networks at the Delft University of Technology (TU Delft), and […]