Telsy
    • About Us
    • Solutions
      • Go to Solutions
      • Cyber
      • Crypto
      • Quantum
    • Innovation
    • Markets
    • Careers
    • Blog
    • Featured News
      • 25 Sep

        TS-Intelligence: The Advanced Cyber Threat Intelligence Platform from Telsy and TS-WAY  

      • 18 Sep

        Secure collaboration

    TS-Intelligence: The Advanced Cyber Threat Intelligence Platform from Telsy and TS-WAY  

    Secure collaboration

    View all
    • English
    • Italiano
    Key Negotiation in the Post-Quantum Era
    09 Sep

    Introduction Cryptography, understood as the set of information protection schemes, is typically divided into symmetric or private key cryptography and asymmetric or public key cryptography. Schemes or protocols that exploit...

    Read more
    Cryptophones: what they are and how they work
    05 Sep

    The issue of mobile communication security highlights one of the weak links in the security chain of organizations. It is often the behavior of individual employees, not necessarily malicious but...

    Read more
    The Lateral Movement
    08 Aug

    Lateral movement refers to the techniques that a cyber attacker uses, after gaining initial access, to move deeper into a network in search of sensitive data and other high-value assets....

    Read more
    The TrickBot malware
    01 Aug

    TrickBot (or “TrickLoader”) is a banking Trojan that targets both businesses and consumers for their data, such as banking information, account credentials, personally identifiable information (PII), and even bitcoins. As...

    Read more
    The FTCode Ransomware
    25 Jul

    FTCode is a type of ransomware that spreads itself via spam emails, and is able to execute its PowerShell-based malicious payload in memory only, without downloading any files to disk....

    Read more
    Post-Quantum Cryptography (PQC): a classical solution to the quantum threat
    13 Jul

    Introduction Public key (or asymmetric) cryptography is one of the bases on which all communication protocols rest which, starting from an insecure channel, must achieve multiple security properties, such as...

    Read more
    The Emotet Trojan
    04 Jul

    The Emotet Trojan is one of the most dangerous malware in cybersecurity history. Individuals, companies, or even global authorities, anyone could be potential victims. Emotet tricks basic antiviruses into hiding...

    Read more
    The Ryuk Ransomware
    27 Jun

    Ryuk is a ransomware family that first appeared in mid to late 2018. In December 2018, the New York Times reported that Tribune Publishing had been infected with Ryuk, forcing...

    Read more
    The Advanced Persistent Threats (APT)
    06 Jun

    “APT”, the acronym for Advanced Persistent Threat, indicates a type of targeted and persistent attacks carried out by opponents with considerable technical expertise and great resources. As the “Advanced” part...

    Read more
    The Evil Twin attack
    23 May

    An Evil Twin attack is a spoofing cyberattack that works by tricking users into connecting to a fake Wi-Fi access point that mimics a legitimate network. Once a user is...

    Read more

    Posts navigation

    Older posts
    Newer posts
    Find out more
    About us
    Solutions
    Careers
    Blog
    Governance
    Privacy Policy
    Comment Policy
    Whistleblowing
    Operational Offices

    Turin
    Corso Svizzera, 185, 10149

    Rome
    Via del Pellegrino, 155, 00186
    Via Antonio Nibby, 4-6, 00161

    Naples
    Centro Direzionale, Isola F7, 80143

    Commercial Office

    Milan
    Via Gaetano Negri, 1, 20123

    Contacts

    Phone
    +39 011 77 14 343

    Mail
    contact@telsy.it

    Follow us
    tim group
    tim group
    logo zero
    logo zero
    © 2022 Telsy SpA company with a single shareholder TIM Group • VAT 00737690016 • REA TO443365