Telsy
    • About Us
    • Solutions
      • Go to Solutions
      • Cyber
      • Crypto
      • Quantum
    • Innovation
    • Markets
    • Careers
    • Blog
    • Featured News
      • 03 Nov

        The mathematics behind PQC: the codes

      • 16 Oct

        New post-quantum digital signature proposals: the second NIST competition

    The mathematics behind PQC: the codes

    New post-quantum digital signature proposals: the second NIST competition

    View all
    • English
    • Italiano
    The Triple Cyber Threat: Borat RAT
    06 Mar

    Recently a US cyber risk intelligence company has discovered a new Remote Access Trojan (RAT) malware. RAT malware typically helps cybercriminals gain complete control of a victim’s system, permitting them...

    Read more
    What is the Cyber Threat Intelligence?
    11 Apr

    In the nowadays cybersecurity paradigm, Cyber Threat Intelligence plays a leading role. Reactive malware detection tools, firewalls, and analysis through artificial intelligence are not enough: to ensure the security of...

    Read more
    SideCopy APT: from Windows to *nix
    05 Jan

    Telsy Threat Intelligence team has observed a spear-phishing campaign conducted by cyber-espionage group SideCopy against critical government entities in India.    SideCopy APT: from Windows to *nix As previously published...

    Read more
    DDoS attacks 
    13 Sep

    DDoS attacks are a cyber threat as simple to put into practice as it is effective: capable of sending a company or critical infrastructures such as hospitals and airports into...

    Read more
    The Lamphone Attack
    06 Sep

    Today it’s possible to spy on secret conversations happening in a room from a remote location just by observing a light bulb hanging in there – visible from a window...

    Read more
    MARITIME CYBERSECURITY: SEAFUTURE 2021
    30 Aug

    In the last two decades, the cases of cyberattacks against Institutions have increased exponentially, so much so that they pose a real threat to the defense of the state and...

    Read more
    Tokyo 2020 Olympic Games & cyber threats
    28 Jul

    The organizing committee of the Tokyo2020 Olympics has decided to use the expertise of about 200 ethical hackers to protect their infrastructures from possible cyberattacks. Organizers fear that history may...

    Read more
    Cyber threats & economic intelligence: the deadly mix to national security
    28 Jun

    The ongoing exploit of emerging technologies to carry out cyberattacks is not just a matter concerning gangs of hackers and threat actors asking for ransoms, but also affects national security....

    Read more
    Firmware security: why it matters
    31 May

    While securing other critical components of their infrastructure such as hardware and software, businesses often neglect firmware security. Being the basic core of all its hardware stuff, an organization is...

    Read more
    Penetration testing: what it is and why it is important
    03 May

    Penetration Testing (Pen Test) refers to the activity of systematically attempting to violate a vulnerable component of a system to discover the security breaches in it through a simulated attack....

    Read more

    Posts navigation

    Older posts
    Find out more
    About us
    Solutions
    Careers
    Blog
    Governance
    Privacy Policy
    Comment Policy
    Whistleblowing
    Operational Offices

    Turin
    Corso Svizzera, 185, 10149

    Rome
    Via del Pellegrino, 155, 00186
    Via Antonio Nibby, 4-6, 00161

    Naples
    Centro Direzionale, Isola F7, 80143

    Commercial Office

    Milan
    Via Gaetano Negri, 1, 20123

    Contacts

    Phone
    +39 011 77 14 343

    Mail
    contact@telsy.it

    Follow us
    tim group
    tim group
    logo zero
    logo zero
    © 2021 Telsy SpA company with a single shareholder TIM Group • VAT 00737690016 • REA TO443365