SPHINCS+: stateless hash-based digital signature
The NoName057(16) collective and DDoS offensives in support of the Russian narrative
Dharma is a dangerous ransomware, identified as early as 2016, whose uniqueness lies entirely in its peculiar attack technique: the Dharma ransomware, in fact, is able to install itself on...
Abstract From the analysis of the 2030 Agenda for sustainable development and the 17 Goals set out therein, it can be deduced that digital security and sustainability today mix, allowing...
Telsy Threat Intelligence team identified a possible Grunt Covenant multi-stage attack aimed at a major telecommunications company in Iran. Introduction In this article, we will look at the different steps...
REvil (Ransomware Evil, also known as Sodinokibi) is a Russian-speaking private Ransomware-as-a-Service (RaaS) operation. After an attack, REvil would threaten to publish the information on their page (Happy Blog) unless...
DarkSide is a ransomware strain that threat actors have been using to target multiple large, high-revenue organizations resulting in the encryption and theft of sensitive data and threats to make...
LockBit is a relatively new ransomware that has become very popular and known fast. The ecosystem behind this threat has significantly increased its criminal activities since Q4 of 2020 and...
Telsy analyzed the cyber espionage group known as Kimsuky in a particular spear phishing campaign. Introduction The Telsy Threat Intelligence team trackings various threat actors, among them the cyber espionage...
Ransomware is evolving from a linear attack model to an insidious Ransomware as a Service (RaaS) model: attackers are increasingly focusing on program development, while letting third parties identify victims...
Social engineering is a technique for obtaining information widely used by experienced hackers and spies and, since it involves (especially in the last phase of the attack) a more direct...
Telsy analyzed a new malicious campaign spreading Linux and Windows backdoors. Introduction This type of campaign starts by exploiting known vulnerabilities related to the target technologies and then performs...