Telsy
    To search, type something and press "enter"
    • About Us
    • Solutions
      • Go to Solutions
      • Cyber
      • Crypto
      • Quantum
    • Innovation
    • Careers
    • Blog
    • Featured News
      • 12 May

        Web reputation e social engineering: mutual influence and impacts on the business

      • 28 Apr

        Post-Quantum Cryptography for Embedded Systems: Challenges and Accelerator Integration over RISC-V Architecture

    Web reputation e social engineering: mutual influence and impacts on the business

    Post-Quantum Cryptography for Embedded Systems: Challenges and Accelerator Integration over RISC-V Architecture

    View all
    • English
    • Italiano
    Healthcare sector targeted by ransomware attacks
    17 Jun

    Threat Discovery is an editorial space of Telsy and TS-WAY dedicated to in-depth analysis of cyber threat intelligence at a global level. The information reported is the outcome of the collection and analysis work done...

    Read more
    The Lateral Movement
    08 Aug

    Lateral movement refers to the techniques that a cyber attacker uses, after gaining initial access, to move deeper into a network in search of sensitive data and other high-value assets....

    Read more
    The TrickBot malware
    01 Aug

    TrickBot (or “TrickLoader”) is a banking Trojan that targets both businesses and consumers for their data, such as banking information, account credentials, personally identifiable information (PII), and even bitcoins. As...

    Read more
    The FTCode Ransomware
    25 Jul

    FTCode is a type of ransomware that spreads itself via spam emails, and is able to execute its PowerShell-based malicious payload in memory only, without downloading any files to disk....

    Read more
    The Locky ransomware
    30 May

    Locky is a type of malware that can encrypt critical files on your computer and hold them hostage while demanding a ransom payment. The cybercriminals promise to give users a...

    Read more
    The Evil Twin attack
    23 May

    An Evil Twin attack is a spoofing cyberattack that works by tricking users into connecting to a fake Wi-Fi access point that mimics a legitimate network. Once a user is...

    Read more
    WannaCry ransomware
    02 May

    WannaCry ransomware is a cryptomalware worm that attacks Windows PCs.  It’s a form of malware that can spread from PC to PC across networks (hence the “worm” component) and then...

    Read more
    FlawedGrace RAT
    21 Mar

    FlawedGrace is the name of a Remote Access Threat (RAT) that is part of the menacing arsenal of the financially motivated cyber criminals gang known as TA505 (or Hive0065). The...

    Read more
    The banking Trojans
    14 Mar

    The term banking Trojan indicates a category of malware that aims to steal the banking credentials of victims and carry out online fraud, usually causing significant economic damage.   Dridex:...

    Read more
    NetWalker ransomware
    07 Mar

    Netwalker is a type of ransomware that targets Windows-based systems. First discovered in August 2019, it has evolved throughout the rest of 2019 and into 2020. The FBI noted significant spikes in...

    Read more

    Posts navigation

    Older posts
    Find out more
    About us
    Solutions
    Careers
    Blog
    Governance
    Privacy Policy
    Cookie Policy
    Comment Policy
    Whistleblowing
    Telsy Gruppo TIM 1
    Carbon offset_WEBSITE_2024
    Operational Offices

    Turin
    Corso Svizzera, 185, 10149

    Rome
    Via Bartolomeo Marliano, 27, 00162
    Via Antonio Nibby, 4-6, 00161

    Naples
    Centro Direzionale, Isola F6, 80143

    Commercial Office

    Milan
    Via Gaetano Negri, 1, 20123

    Contacts

    Phone
    +39 011 77 14 343

    Mail
    contact@telsy.it

    Follow us
    © 2022 Telsy SpA company with a single shareholder TIM Group • VAT 00737690016 • REA TO443365