Telsy
    • About Us
    • Solutions
      • Go to Solutions
      • Cyber
      • Crypto
      • Quantum
    • Innovation
    • Markets
    • Careers
    • Blog
    • Featured News
      • 01 Jun

        The Spyware

      • 31 May

        CRYSTALS-Dilithium: LWE-based digital signature

    01 Jun

    The Spyware

    31 May

    CRYSTALS-Dilithium: LWE-based digital signature

    View all
    • English
    • Italiano
    The Lateral Movement
    08 Aug

    Lateral movement refers to the techniques that a cyber attacker uses, after gaining initial access, to move deeper into a network in search of sensitive data and other high-value assets....

    Read more
    The Emotet Trojan
    04 Jul

    The Emotet Trojan is one of the most dangerous malware in cybersecurity history. Individuals, companies, or even global authorities, anyone could be potential victims. Emotet tricks basic antiviruses into hiding...

    Read more
    WannaCry ransomware
    02 May

    WannaCry ransomware is a cryptomalware worm that attacks Windows PCs.  It’s a form of malware that can spread from PC to PC across networks (hence the “worm” component) and then...

    Read more
    Rootkit viruses
    28 Mar

    Rootkits have coexisted with the computer world for over 20 years, allowing hackers to access (almost) any computer.   What are Rootkits? First of all, Rootkits are malware, malicious software...

    Read more
    SharkBot: the stealing banking and cryptocurrency accounts trojan
    02 Mar

    Some cybersecurity researchers from Cleafy took the wraps off a new Android trojan that takes advantage of accessibility features on mobile devices to siphon credentials from banking and cryptocurrency services...

    Read more
    SimJacker, the SIM cards vulnerability
    21 Feb

    SimJacker is a SIM card vulnerability that allows cybercriminals to compromise any cell phone and spy on victims by simply sending an SMS text message.   What is SimJacker? The...

    Read more
    The Web Shell
    14 Feb

    A Web Shell is a shell-like interface that enables a web server to be remotely accessed, often for the purposes of cyberattacks.   What is a Web Shell? A Web...

    Read more
    Tardigrade, the shape-shifting virus
    24 Jan

    An APT attacked two different vaccine manufacturers this year, using shape-shifting malware that initially appears to be a ransomware attack but later turns out to be much more sophisticated.  ...

    Read more
    The social engineering
    18 Oct

    Social engineering is a technique for obtaining information widely used by experienced hackers and spies and, since it involves (especially in the last phase of the attack) a more direct...

    Read more
    Google Drive abused in document exfiltration operation against Afghanistan
    29 Sep

    Telsy analyzed a new campaign that targeted Afghanistan and aimed to steal documents.   Introduction Telsy last June analyzed a new campaign that targeted Afghanistan, specifically researchers and government employees....

    Read more

    Posts navigation

    Older posts
    Find out more
    About us
    Solutions
    Careers
    Blog
    Governance
    Privacy Policy
    Comment Policy
    Operational Offices

    Turin
    Corso Svizzera, 185, 10149

    Rome
    Via del Pellegrino, 155, 00186
    Via Antonio Nibby, 4-6, 00161

    Naples
    Centro Direzionale, Isola F7, 80143

    Commercial Office

    Milan
    Via Gaetano Negri, 1, 20123

    Contacts

    Phone
    +39 011 77 14 343

    Mail
    contact@telsy.it

    Follow us
    tim group
    tim group
    logo zero
    logo zero
    © 2021 Telsy SpA con unico socio Gruppo TIM • P.IVA 00737690016 • REA TO443365