Spyware: a growing global threat
The Mathematics behind PQC: hash functions
An APT attacked two different vaccine manufacturers in past years, using shape-shifting malware that initially appears to be a ransomware attack but later turns out to be much more sophisticated....
Phishing is a common way for cybercriminals to dupe people through socially-engineered emails into giving up their credentials to online accounts that can store sensitive data. Phishers use these emails—which...
First seen in July 2021, BlackMatter is a Ransomware-as-a-Service (RaaS) tool that allows the ransomware‘s developers to profit from cybercriminal affiliates (i.e., BlackMatter actors) who deploy it against victims. BlackMatter...
Telsy Threat Intelligence team has observed a spear-phishing campaign conducted by cyber-espionage group SideCopy against critical government entities in India. SideCopy APT: from Windows to *nix As previously published...
Abstract Artificial intelligence can be qualified as an ambivalent tool since it lends itself to being used both as a means to create cyber defense products and, unfortunately, as a...
Telsy Threat Intelligence team has identified a phishing campaign that appears to be targeting citizens abroad by exploiting the COVID-19 theme associated with a potential embassy lockdown status. Introduction...
Abstract Having learned the usefulness and importance of digital transformation, which has changed the conduct of daily activities for individual users and the management methods of companies, it is appropriate...
Initially, criminals exclusively used ransomware-related malware to restrict access to user data by encrypting files on individual or organizational devices. In exchange for the decryption key, the victims had to...
Dharma is a dangerous ransomware, identified as early as 2016, whose uniqueness lies entirely in its peculiar attack technique: the Dharma ransomware, in fact, is able to install itself on...
Abstract From the analysis of the 2030 Agenda for sustainable development and the 17 Goals set out therein, it can be deduced that digital security and sustainability today mix, allowing...