Telsy
    To search, type something and press "enter"
    • About Us
    • Solutions
      • Go to Solutions
      • Cyber
      • Crypto
      • Quantum
    • Innovation
    • Careers
    • Blog
    • Featured News
      • 14 Jul

        The applications of isogenies in Post Quantum Cryptography

      • 07 Jul

        The Establishment of Accredited Testing Laboratories (LAP) within the Italian Cybersecurity Framework

    The applications of isogenies in Post Quantum Cryptography

    The Establishment of Accredited Testing Laboratories (LAP) within the Italian Cybersecurity Framework

    View all
    • Italiano
    • English
    The Triple Cyber Threat: Borat RAT
    06 Mar

    Recently a US cyber risk intelligence company has discovered a new Remote Access Trojan (RAT) malware. RAT malware typically helps cybercriminals gain complete control of a victim’s system, permitting them...

    Read more
    What is the Cyber Threat Intelligence?
    11 Apr

    In the nowadays cybersecurity paradigm, Cyber Threat Intelligence plays a leading role. Reactive malware detection tools, firewalls, and analysis through artificial intelligence are not enough: to ensure the security of...

    Read more
    SideCopy APT: from Windows to *nix
    05 Jan

    Telsy Threat Intelligence team has observed a spear-phishing campaign conducted by cyber-espionage group SideCopy against critical government entities in India.    SideCopy APT: from Windows to *nix As previously published...

    Read more
    The Lamphone Attack
    06 Sep

    Today it’s possible to spy on secret conversations happening in a room from a remote location just by observing a light bulb hanging in there – visible from a window...

    Read more
    MARITIME CYBERSECURITY: SEAFUTURE 2021
    30 Aug

    In the last two decades, the cases of cyberattacks against Institutions have increased exponentially, so much so that they pose a real threat to the defense of the state and...

    Read more
    Tokyo 2020 Olympic Games & cyber threats
    28 Jul

    The organizing committee of the Tokyo2020 Olympics has decided to use the expertise of about 200 ethical hackers to protect their infrastructures from possible cyberattacks. Organizers fear that history may...

    Read more
    Cyber threats & economic intelligence: the deadly mix to national security
    28 Jun

    The ongoing exploit of emerging technologies to carry out cyberattacks is not just a matter concerning gangs of hackers and threat actors asking for ransoms, but also affects national security....

    Read more
    Firmware security: why it matters
    31 May

    While securing other critical components of their infrastructure such as hardware and software, businesses often neglect firmware security. Being the basic core of all its hardware stuff, an organization is...

    Read more
    Cyberwarfare and national economies
    10 Feb

    Cyberwarfare is not just a standard threat in the dark woods of cyber threats. It is much more serious than that. It is no secret that big and key strategic...

    Read more
    Kevin Mitnick: the computer-break-in artist
    08 Feb

    Kevin Mitnick was the most elusive computer break-in artist in history. Security experts often refer to him as “The World’s Most Wanted Hacker.” Indeed, the US Feds took almost three...

    Read more

    Posts navigation

    Older posts
    Find out more
    About us
    Solutions
    Careers
    Blog
    Governance
    Privacy Policy
    Cookie Policy
    Comment Policy
    Whistleblowing
    Telsy Gruppo TIM 1
    Carbon offset_WEBSITE_2024
    Operational Offices

    Turin
    Corso Svizzera, 185, 10149

    Rome
    Via Bartolomeo Marliano, 27, 00162
    Via Antonio Nibby, 4-6, 00161

    Naples
    Centro Direzionale, Isola F6, 80143

    Commercial Office

    Milan
    Via Gaetano Negri, 1, 20123

    Contacts

    Phone
    +39 011 77 14 343

    Mail
    contact@telsy.it

    Follow us
    © 2021 Telsy SpA company with a single shareholder TIM Group • VAT 00737690016 • REA TO443365