Telsy
    To search, type something and press "enter"
    • About Us
    • Solutions
      • Go to Solutions
      • Cyber
      • Crypto
      • Quantum
    • Innovation
    • Careers
    • Blog
    • Featured News
      • 10 Nov

        The Internet of Medical Things (IoMT)

      • 10 Nov

        Italy targeted by multiple adversaries, new APT operations, latest developments in cybercrime

    The Internet of Medical Things (IoMT)

    Italy targeted by multiple adversaries, new APT operations, latest developments in cybercrime

    View all
    • English
    • Italiano
    Legitimate Sites used as Cobalt Strike C2s against Indian Government
    04 Mar

    Introduction Telsy Threat Intelligence team observed an attack against members of the Indian government or local institutions, which uses social engineering themes as an investigation for a cyber attack or...

    Read more
    SimJacker, the SIM cards vulnerability
    21 Feb

    SimJacker is a SIM card vulnerability that allows cybercriminals to compromise any cell phone and spy on victims by simply sending an SMS text message.   What is SimJacker? The...

    Read more
    The Web Shell
    14 Feb

    A Web Shell is a shell-like interface that enables a web server to be remotely accessed, often for the purposes of cyberattacks.   What is a Web Shell? A Web...

    Read more
    CronRAT, the e-commerce malware
    31 Jan

    Experts have identified a new Linux RAT that was dubbed “CronRAT”. It stands out through its hiding place, as it can be found in different tasks which have a schedule-timeline...

    Read more
    The BlackMatter ransomware
    10 Jan

    First seen in July 2021, BlackMatter is a Ransomware-as-a-Service (RaaS) tool that allows the ransomware‘s developers to profit from cybercriminal affiliates (i.e., BlackMatter actors) who deploy it against victims.  BlackMatter...

    Read more
    Artificial intelligence and Cybersecurity between cyber defense and cyber attack
    29 Dec

    Abstract Artificial intelligence can be qualified as an ambivalent tool since it lends itself to being used both as a means to create cyber defense products and, unfortunately, as a...

    Read more
    Double and triple extortion attacks
    13 Dec

    Initially, criminals exclusively used ransomware-related malware to restrict access to user data by encrypting files on individual or organizational devices.  In exchange for the decryption key, the victims had to...

    Read more
    The Dharma ransomware
    06 Dec

    Dharma is a dangerous ransomware, identified as early as 2016, whose uniqueness lies entirely in its peculiar attack technique: the Dharma ransomware, in fact, is able to install itself on...

    Read more
    Possible attack to Telco company in Middle East
    24 Nov

    Telsy Threat Intelligence team identified a possible Grunt Covenant multi-stage attack aimed at a major telecommunications company in Iran.   Introduction In this article, we will look at the different steps...

    Read more
    The REvil ransomware
    22 Nov

    REvil (Ransomware Evil, also known as Sodinokibi) is a Russian-speaking private Ransomware-as-a-Service (RaaS) operation. After an attack, REvil would threaten to publish the information on their page (Happy Blog) unless...

    Read more

    Posts navigation

    Older posts
    Newer posts
    Find out more
    About us
    Solutions
    Careers
    Blog
    Governance
    Privacy Policy
    Cookie Policy
    Comment Policy
    Whistleblowing
    Telsy Gruppo TIM 1
    Carbon offset_WEBSITE_2024
    Operational Offices

    Turin
    Corso Svizzera, 185, 10149

    Rome
    Via Bartolomeo Marliano, 27, 00162
    Via Antonio Nibby, 4-6, 00161

    Naples
    Centro Direzionale, Isola F6, 80143

    Commercial Office

    Milan
    Via Gaetano Negri, 1, 20123

    Contacts

    Phone
    +39 011 77 14 343

    Mail
    contact@telsy.it

    Follow us
    © 2021 Telsy SpA company with a single shareholder TIM Group • VAT 00737690016 • REA TO443365