Monthly Archives: November 2019

Foreseeing what is next: the rise of 5G technologies

Foreseeing what is next: the rise of 5G technologies

At the end of the 17th century, the French artist Jean-Marc Côté was commissioned some illustrations about en l’an 2000. Already back then, life in the 2000 was pictured as highly automatized: an automatic barber would take care of your skin and a barely self-standing robot would do the housework. But many intuitions that our ancestors would have thought of as barely possible are now features of our pasts. The technological innovation that took place over this past century reaches far beyond these forecasts. Cars will drive themselves and take you wherever you wish. Probably, they will also be able to connect with the lights in your house, or to […]

The Lazarus’ gaze to the world: What is behind the second stone ?

The Lazarus’ gaze to the world: What is behind the second stone ?

// Introduction In a recent blog post (link here) we analysed the first part of an operation likely conducted by APT38/Lazarus, which targeted various organizations, including financial and banking ones. We already described the initial phase of the kill chain where we get to describe the fact that the actor implemented in the operation two different first-stage payloads to be released to the victims on the basis of their system architecture. These payloads are used in order to carry out a first recognition phase. Beyond this, we have already described a first-level backend script used by the threat actor inside a compromised website to manage victims and to release an […]

Telsy has been involved in the organization of the event ‘’ DE CIFRIS AUGUSTAE TAURINORUM’’, that outlines an overview on cryptanalysis of ARX ciphers.

Telsy has been involved in the organization of the event ‘’ DE CIFRIS AUGUSTAE TAURINORUM’’,  that outlines an overview on cryptanalysis of ARX ciphers.

The event will take place on 22 on November, at Turin University (Aula 2), in ‘’Via Carlo Alberto 10’’ Following, a short abstract: ‘’ We present some features of block ciphers based on the three operations: addition mod 2n, rotation and XOR (ARX ciphers) and themain cryptanalytic attacks obtained by developing the methods underlying differential cryptanalysis. We focus on the recent tecnique of rotational-XOR differential cryptanalysis giving some ideas of this attack and its application to SPECK 32/64.’’

Make the Internet a Secure++ Word – The Internet Service Provider Role

Make the Internet a Secure++ Word – The Internet Service Provider Role

“The current world of telematic communications appears as fast-changing environment. The actors of this ecosystems are represented by billions of nodes that, every day, globally transmit a huge amount of data and information. With a factor directly proportional to the increase in these nodes and to the quantity and type of information in transit within it, the number and type of information that the community has learned to classify as “cyber threat” have also grown exponentially, by species and by potential risk factor.” This paper, written by security researcher Emanuele De Lucia, head of Cyber Security & Threat Intelligence Division of Telsy, highlights the state-of-the-art of current cyber threats and […]

The Lazarus’ gaze to the world: What is behind the first stone ?

The Lazarus’ gaze to the world: What is behind the first stone ?

// Introduction Lazarus (aka APT38 / Hidden Cobra / Stardust Chollima) is one of the more prolific threat actors in the APT panorama. Since 2009, the group leveraged its capability in order to target and compromise a wide range of targets; Over the time, the main victims have been government and defense institutions, organizations operating in the energy and petrochemical sector in addition to those operating in financial and banking one. The group has also a wide range of tools at its disposal; among these, it’s possible to catalog [D] DoS botnets, first stage implanters, remote access tools (RATs), keyloggers and wipers. This list of malicious tools has over time […]

Utilizzando il sito, accetti l'utilizzo dei cookie da parte nostra. maggiori informazioni

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close