The Mathematics behind PQC: Multivariate Polynomials
BEC and CEO fraud: a growing risk for companies
All the news and announcements regarding Telsy and the world of cybersecurity and cryptography.
Over the course of 2023 Telsy website, together with our Group’s main websites, with almost 490 million total page views, generated around 397 tonnes of CO2eq, as much as would...
With the growing quantity and quality of cyber attacks and cybercrime, the security of devices, data, and communications exchanged by companies, institutions, and private citizens is constantly at risk. When...
TIM Group offsets the climate impact of its websites with certified international project During 2022, our Group’s main websites, with around 680 million total page views, generated around 554 tonnes...
Telsy analyzed a new campaign that targeted Afghanistan and aimed to steal documents. Introduction Telsy last June analyzed a new campaign that targeted Afghanistan, specifically researchers and government employees....
An Italian government email has been targeted by a phishing campaign. The attack’s goal aimed to install some remote control and information-stealing tool. What’s happened During the last month,...
In the last two decades, the cases of cyberattacks against Institutions have increased exponentially, so much so that they pose a real threat to the defense of the state and...
Telsy has recently completed its entry into Quantum Telecommunications Italy (QTI) with a minority stake in the share capital of this startup active in the field of quantum fiber optic...
What does Bitcoin Mining mean? Bitcoin mining is creating, or rather discovering, bitcoin currency. Unlike real-world money printed when more is needed, bitcoin cannot simply be willed into existence but...
A shroud and halo of myth surround the figure of Adriano Olivetti. He was one of the most prominent figures in the Italian cultural and industrial panorama, reserved for the...
Agnes Meyer Driscoll was a leading cryptanalyst working for American defense agencies between WW1 and the Cold War’s early years. She started her career in the US Navy by enlisting...
Did you know nations struggle for cablocracy, that is, the control for strategic comms? In the age of wireless and mobile, few people know that a long net of submarine...
Kevin Mitnick was the most elusive computer break-in artist in history. Security experts often refer to him as “The World’s Most Wanted Hacker.” Indeed, the US Feds took almost three...
Enisa (the European Union Agency for Cybersecurity) has recently published the eighth edition of its Threat Landscape Report (ETL) on cyber threats registered in the period between January 2019 and...
On the evening of April 19, Telsy denounced that the personal data of about 3000 employees of the UniCredit S.p.A. bank, one of the largest banks in Italy, had been...
During some activities of the Telsy research team within a client company, some vulnerabilities emerged in the product NOKIA IMPACT WEB PLATFORM. These vulnerabilities are currently identified according to the...
In the first days of May 2019, Telsy TRT joined a collaborative international effort aimed at studying, researching and mitigating a recent malicious campaign carried out by a criminal gang...
In July 2018, Palo Alto Unit 42 analyzed a targeted attack spreading in the Middle East. In that case, the threat actor used a custom PowerShell based payload that the...