Telsy
    To search, type something and press "enter"
    • About Us
    • Solutions
      • Go to Solutions
      • Cyber
      • Crypto
      • Quantum
    • Innovation
    • Careers
    • Blog
    • Featured News
      • 11 Feb

        The role of ISO certifications in ACN cloud qualification: security and quality for the Public Administration

      • 09 Feb

        DDoS and ransomware in Italy, supply-chain attacks, new Russian offensives

    The role of ISO certifications in ACN cloud qualification: security and quality for the Public Administration

    DDoS and ransomware in Italy, supply-chain attacks, new Russian offensives

    View all
    • English
    • Italiano
    The CryptoLocker ransomware
    29 Aug

    CryptoLocker is a ransomware capable of blocking documents on your computer by encrypting them with a password and making it impossible to open files, a malicious software that infects Windows...

    Read more
    The Lateral Movement
    08 Aug

    Lateral movement refers to the techniques that a cyber attacker uses, after gaining initial access, to move deeper into a network in search of sensitive data and other high-value assets....

    Read more
    The TrickBot malware
    01 Aug

    TrickBot (or “TrickLoader”) is a banking Trojan that targets both businesses and consumers for their data, such as banking information, account credentials, personally identifiable information (PII), and even bitcoins. As...

    Read more
    The Emotet Trojan
    04 Jul

    The Emotet Trojan is one of the most dangerous malware in cybersecurity history. Individuals, companies, or even global authorities, anyone could be potential victims. Emotet tricks basic antiviruses into hiding...

    Read more
    The Turla malware
    13 Jun

    Turla is one of the most advanced APTs (Advanced Persistent Threat) in the world. Also, Turla Group is a well-established collective that has been operational since at least 2004 Also...

    Read more
    The Evil Twin attack
    23 May

    An Evil Twin attack is a spoofing cyberattack that works by tricking users into connecting to a fake Wi-Fi access point that mimics a legitimate network. Once a user is...

    Read more
    WannaCry ransomware
    02 May

    WannaCry ransomware is a cryptomalware worm that attacks Windows PCs.  It’s a form of malware that can spread from PC to PC across networks (hence the “worm” component) and then...

    Read more
    What is the Cyber Threat Intelligence?
    11 Apr

    In the nowadays cybersecurity paradigm, Cyber Threat Intelligence plays a leading role. Reactive malware detection tools, firewalls, and analysis through artificial intelligence are not enough: to ensure the security of...

    Read more
    FlawedGrace RAT
    21 Mar

    FlawedGrace is the name of a Remote Access Threat (RAT) that is part of the menacing arsenal of the financially motivated cyber criminals gang known as TA505 (or Hive0065). The...

    Read more
    SimJacker, the SIM cards vulnerability
    21 Feb

    SimJacker is a SIM card vulnerability that allows cybercriminals to compromise any cell phone and spy on victims by simply sending an SMS text message.   What is SimJacker? The...

    Read more

    Posts navigation

    Older posts
    Find out more
    About us
    Solutions
    Careers
    Blog
    Governance
    Privacy Policy
    Cookie Policy
    Comment Policy
    Whistleblowing
    Accessibility
    GDPR Information Notice
    Courtesy page
    Operational Offices

    Turin
    Corso Svizzera, 185, 10149

    Rome
    Via Bartolomeo Marliano, 27, 00162
    Via Antonio Nibby, 4-6, 00161

    Naples
    Centro Direzionale, Isola F6, 80143

    Orvieto
    Via delle Acacie, 17, 05018 Ciconia (TR)

    Contacts

    Phone
    +39 011 77 14 343

    Mail
    contact@telsy.it

    Follow us
    Telsy Gruppo TIM 1
    SITO WEB_emissioni CO2e compensate_2024
    SITO WEB_emissioni CO2e compensate_2024
    © 2022 Telsy SpA company with a single shareholder TIM Group • VAT 00737690016 • REA TO443365