TS-Intelligence: The Advanced Cyber Threat Intelligence Platform from Telsy and TS-WAY
Secure collaboration
Introduction Cryptography, understood as the set of information protection schemes, is typically divided into symmetric or private key cryptography and asymmetric or public key cryptography. Schemes or protocols that exploit...
The issue of mobile communication security highlights one of the weak links in the security chain of organizations. It is often the behavior of individual employees, not necessarily malicious but...
Lateral movement refers to the techniques that a cyber attacker uses, after gaining initial access, to move deeper into a network in search of sensitive data and other high-value assets....
TrickBot (or “TrickLoader”) is a banking Trojan that targets both businesses and consumers for their data, such as banking information, account credentials, personally identifiable information (PII), and even bitcoins. As...
FTCode is a type of ransomware that spreads itself via spam emails, and is able to execute its PowerShell-based malicious payload in memory only, without downloading any files to disk....
Introduction Public key (or asymmetric) cryptography is one of the bases on which all communication protocols rest which, starting from an insecure channel, must achieve multiple security properties, such as...
The Emotet Trojan is one of the most dangerous malware in cybersecurity history. Individuals, companies, or even global authorities, anyone could be potential victims. Emotet tricks basic antiviruses into hiding...
Ryuk is a ransomware family that first appeared in mid to late 2018. In December 2018, the New York Times reported that Tribune Publishing had been infected with Ryuk, forcing...
“APT”, the acronym for Advanced Persistent Threat, indicates a type of targeted and persistent attacks carried out by opponents with considerable technical expertise and great resources. As the “Advanced” part...
An Evil Twin attack is a spoofing cyberattack that works by tricking users into connecting to a fake Wi-Fi access point that mimics a legitimate network. Once a user is...