Telsy
    • About Us
    • Solutions
      • Go to Solutions
      • Crypto
      • Cyber
      • Quantum
    • Innovation
    • Markets
    • Careers
    • Blog
    • Featured News
      • 20 Mar

        Security Awareness: how to avoid the dangers of cybersecurity with TelsySkills

      • 06 Mar

        The Triple Cyber Threat: Borat RAT

    20 Mar

    Security Awareness: how to avoid the dangers of cybersecurity with TelsySkills

    06 Mar

    The Triple Cyber Threat: Borat RAT

    View all
    • English
    • Italiano
    Microsoft Exchange servers backdoored with OwlProxy
    20 Sep

    Introduction In early 2022, Telsy observed malicious cyber activity in the Microsoft Exchange infrastructure. The analysis conducted revealed the presence of a malicious DLL, called “fuscom.dll“, and its persistence by...

    Read more
    The Lateral Movement
    08 Aug

    Lateral movement refers to the techniques that a cyber attacker uses, after gaining initial access, to move deeper into a network in search of sensitive data and other high-value assets....

    Read more
    The TrickBot malware
    01 Aug

    TrickBot (or “TrickLoader”) is a banking Trojan that targets both businesses and consumers for their data, such as banking information, account credentials, personally identifiable information (PII), and even bitcoins. As...

    Read more
    The FTCode Ransomware
    25 Jul

    FTCode is a type of ransomware that spreads itself via spam emails, and is able to execute its PowerShell-based malicious payload in memory only, without downloading any files to disk....

    Read more
    The Ryuk Ransomware
    27 Jun

    Ryuk is a ransomware family that first appeared in mid to late 2018. In December 2018, the New York Times reported that Tribune Publishing had been infected with Ryuk, forcing...

    Read more
    The Turla malware
    13 Jun

    Turla is one of the most advanced APTs (Advanced Persistent Threat) in the world. Also, Turla Group is a well-established collective that has been operational since at least 2004 Also...

    Read more
    The Advanced Persistent Threats (APT)
    06 Jun

    “APT”, the acronym for Advanced Persistent Threat, indicates a type of targeted and persistent attacks carried out by opponents with considerable technical expertise and great resources. As the “Advanced” part...

    Read more
    The Locky ransomware
    30 May

    Locky is a type of malware that can encrypt critical files on your computer and hold them hostage while demanding a ransom payment. The cybercriminals promise to give users a...

    Read more
    The Evil Twin attack
    23 May

    An Evil Twin attack is a spoofing cyberattack that works by tricking users into connecting to a fake Wi-Fi access point that mimics a legitimate network. Once a user is...

    Read more
    Rootkit viruses
    28 Mar

    Rootkits have coexisted with the computer world for over 20 years, allowing hackers to access (almost) any computer.   What are Rootkits? First of all, Rootkits are malware, malicious software...

    Read more

    Posts navigation

    Older posts
    Find out more
    About us
    Solutions
    Careers
    Blog
    Governance
    Privacy Policy
    Comment Policy
    Operational Offices

    Turin
    Corso Svizzera, 185, 10149

    Rome
    Via del Pellegrino, 155, 00186
    Via Antonio Nibby, 4-6, 00161

    Naples
    Centro Direzionale, Isola F7, 80143

    Commercial Office

    Milan
    Via Gaetano Negri, 1, 20123

    Phone

    +39 011 77 14 343

    Follow us
    tim group
    tim group
    logo zero
    logo zero
    © 2022 Telsy SpA con unico socio Gruppo TIM • P.IVA 00737690016 • REA TO443365