Telsy
    • About Us
    • Solutions
      • Go to Solutions
      • Cyber
      • Crypto
      • Quantum
    • Innovation
    • Markets
    • Careers
    • Blog
    • Featured News
      • 01 Jun

        The Spyware

      • 31 May

        CRYSTALS-Dilithium: LWE-based digital signature

    01 Jun

    The Spyware

    31 May

    CRYSTALS-Dilithium: LWE-based digital signature

    View all
    • English
    • Italiano
    Cyber Threat Intelligence: knowing and anticipating threats
    03 Apr

    Success in the digital age depends on the ability to validate complex information and leverage it to lead change. For organizations, it is today necessary to equip themselves with tools...

    Read more
    The Triple Cyber Threat: Borat RAT
    06 Mar

    Recently a US cyber risk intelligence company has discovered a new Remote Access Trojan (RAT) malware. RAT malware typically helps cybercriminals gain complete control of a victim’s system, permitting them...

    Read more
    Security Monitoring: protecting your business from cyber threats
    20 Feb

    Hackers or malware, careless or disgruntled employees, outdated or vulnerable devices and operating systems, public and mobile cloud computing, or third-party service providers: in the normal course of business, most...

    Read more
    The Cyber Vulnerabilities
    16 Jan

    The fast evolution of the international scenario puts companies in front of new challenges. These challenges are closely related to security, staff preparation and the constant growth of cyber vulnerabilities....

    Read more
    Microsoft Exchange servers exploited with OWASSRF
    29 Dec

    Executive Summary In December 2022, Telsy Incident Response Team was called upon to handle a cyber security incident. The analysis conducted detected the execution of PowerShell code by exploiting a...

    Read more
    Microsoft Exchange servers backdoored with OwlProxy
    20 Sep

    Introduction In early 2022, Telsy observed malicious cyber activity in the Microsoft Exchange infrastructure. The analysis conducted revealed the presence of a malicious DLL, called “fuscom.dll“, and its persistence by...

    Read more
    What is the Cyber Threat Intelligence?
    11 Apr

    In the nowadays cybersecurity paradigm, Cyber Threat Intelligence plays a leading role. Reactive malware detection tools, firewalls, and analysis through artificial intelligence are not enough: to ensure the security of...

    Read more
    NOBELIUM again or eCrime operation?
    07 Dec

    Telsy Threat Intelligence team identified a phishing campaign that seems to target multiple victims based in the United States, Great Britain, and Europe. The campaign appears to have been active since...

    Read more
    Possible attack to Telco company in Middle East
    24 Nov

    Telsy Threat Intelligence team identified a possible Grunt Covenant multi-stage attack aimed at a major telecommunications company in Iran.   Introduction In this article, we will look at the different steps...

    Read more
    Dissecting new AppleSeed backdoor of Kimsuky threat actor
    03 Nov

    Telsy analyzed the cyber espionage group known as Kimsuky in a particular spear phishing campaign.   Introduction The Telsy Threat Intelligence team trackings various threat actors, among them the cyber espionage...

    Read more

    Posts navigation

    Older posts
    Find out more
    About us
    Solutions
    Careers
    Blog
    Governance
    Privacy Policy
    Comment Policy
    Operational Offices

    Turin
    Corso Svizzera, 185, 10149

    Rome
    Via del Pellegrino, 155, 00186
    Via Antonio Nibby, 4-6, 00161

    Naples
    Centro Direzionale, Isola F7, 80143

    Commercial Office

    Milan
    Via Gaetano Negri, 1, 20123

    Contacts

    Phone
    +39 011 77 14 343

    Mail
    contact@telsy.it

    Follow us
    tim group
    tim group
    logo zero
    logo zero
    © 2021 Telsy SpA con unico socio Gruppo TIM • P.IVA 00737690016 • REA TO443365