Resources

Our Resources hub offers direct access to insights, technical info and documentation.

Blogs → Whitepapers → Case studies → Documentation →

Blogs

Scanners Beware: Welcome to the Network from Hell

Describes a “tarpit”-style defense that not only slows down but actively confuses and traps hostile network scans, flipping defense into offense.

Read more →

Escaping from isolated networks using Broadcast DNS

Introduces a new DNS-based out-of-band escape method that leverages broadcast traffic to probe and exfiltrate data from sealed networks.

Read more →

Bidirectional escape testing

Shows how to verify two-way network leaks—sending and receiving—using a triple-ping UDP technique to confirm true bidirectional communication.

Read more →

Retired Device called Home — July 11, 2023

DNS in isolated networks, does it leak and how to mitigate when it does — January 4, 2023

Firewall bypass with CARP in OPNsense Packet Filter — March 28, 2022

Revisiting Isolated Networks in the Cloud — March 21, 2022

Lopsided routing, a stealthy hole punch into FortiGate — January 7, 2022

Escaping from a truly air gapped network via Apple AWDL — August 3, 2021

Whitepapers

New agile methods for improving cyber security in companies

It is important that companies identify the material that they need to protect to enable efficient protection. Complex isolated networks are not always as well isolated as you would think. The feasibility study (Toteutettavuustutkimus) conducted by the National Cyber Security Centre Finland (NCSC-FI) successfully tested and developed new, agile and scalable methods for improving these areas.

Read more →

Protecting water utility against nation state cyber adversary

Water supply professionals and government planners have long been aware that urban water systems are a lucrative target for cyber adversaries. Water utilities are heavily using industrial control system (ICS) networks to control the physical processes essential to water treatment and distribution systems. Network isolation and segmentation are key protections that prevent unauthorized access to these SCADA/ICS systems and to keep hostile adversaries at bay.

Read more →

Experiences with the Beacon deployments

We have delivered our SensorFu Beacons into a real production networks. To celebrate this milestone of real deployments, we are writing about the lessons learned and experiences gained while working with our early adopters.

Read more →

Case studies

Rapid deployment of Beacons to 100 substations

A case study detailing how Eximprod’s ES200 vRTU tech enabled the rapid rollout of 100 SensorFu Beacons across geographically dispersed substations and the key insights gained.

Read more →

Documentation

Beacon User Manual →

SensorFu Oy

Teknologiantie 11
90590 Oulu, Finland
Business ID: 2811349-6
© 2026 SensorFu. All rights reserved.