Telsy
    To search, type something and press "enter"
    • About Us
    • Solutions
      • Go to Solutions
      • Cyber
      • Crypto
      • Quantum
    • Innovation
    • Careers
    • Blog
    • Featured News
      • 19 May

        The Mathematics behind PQC: Isogenies of Elliptic Curves

      • 12 May

        Web reputation e social engineering: mutual influence and impacts on the business

    The Mathematics behind PQC: Isogenies of Elliptic Curves

    Web reputation e social engineering: mutual influence and impacts on the business

    View all
    • English
    • Italiano
    New malicious campaign spreading Windows and Linux backdoors
    13 Oct

    Telsy analyzed a new malicious campaign spreading Linux and Windows backdoors.   Introduction This type of campaign starts by exploiting known vulnerabilities related to the target technologies and then performs...

    Read more
    Lazarus Group continues AppleJeus Operation
    11 Oct

    Telsy analyzed new samples related to the threat actor Lazarus Group and in particular to the “AppleJeus Operation”.   Introduction While some of the details have changed, the methods used...

    Read more
    Google Drive abused in document exfiltration operation against Afghanistan
    29 Sep

    Telsy analyzed a new campaign that targeted Afghanistan and aimed to steal documents.   Introduction Telsy last June analyzed a new campaign that targeted Afghanistan, specifically researchers and government employees....

    Read more
    Malware-as-a-Service (MaaS): what it is and why it is (very) dangerous
    04 Aug

    Malware-as-a-Service (MaaS) refers to the illegal lease of software and hardware for carrying out cyber-attacks. Owners of MaaS servers offer to threat actors a paid botnet service that distributes malwares....

    Read more
    Smart working: how to mitigate cyber risks
    07 Apr

    Smart working is a fertile ground for cyber threats and criminals. As steps to counter the coronavirus outbreak take effect, millions of workers worldwide have been sent home with their...

    Read more
    Ransomware: a threat to the present and the future
    10 Jul

    Ransomware has become an increasingly prominent threat to cyberspace security globally and the recent statistical data collected would seem to confirm this trend also for the years to come.  ...

    Read more
    Zebrocy relies on dropbox and remote template injection to supply its dishes to an institution of Eastern Europe diplomatic sector.
    29 Aug

    Introduction On the 22nd of August 2019, a new spear-phishing email message has been collected by Telsy CTI Team. This malicious email has been armed with an attached lure document...

    Read more
    Unknown threat actor is using Agent Tesla variants against Oil&Gas and Energy Sector
    12 Jul

    On 02/07/2019, Telsy TRT catched a new malware variant belonging to Agent Tesla family addressed to companies operating in the Energy and Oil&Gas sector. Among these organizations, Telsy identifies a...

    Read more
    Find out more
    About us
    Solutions
    Careers
    Blog
    Governance
    Privacy Policy
    Cookie Policy
    Comment Policy
    Whistleblowing
    Telsy Gruppo TIM 1
    Carbon offset_WEBSITE_2024
    Operational Offices

    Turin
    Corso Svizzera, 185, 10149

    Rome
    Via Bartolomeo Marliano, 27, 00162
    Via Antonio Nibby, 4-6, 00161

    Naples
    Centro Direzionale, Isola F6, 80143

    Commercial Office

    Milan
    Via Gaetano Negri, 1, 20123

    Contacts

    Phone
    +39 011 77 14 343

    Mail
    contact@telsy.it

    Follow us
    © 2019 Telsy SpA company with a single shareholder TIM Group • VAT 00737690016 • REA TO443365