TRUSTCRYPT
19 subscribers
741 photos
740 links
TrustCrypt – your go-to channel for the latest cybersecurity news, in-depth breach analyses, and practical tips to protect your data
https://trustcrypt.com/
Download Telegram
Emerging ‘Chihuahua Stealer’ Malware Compromises Browser Data and Cryptocurrency Wallets
A new infostealer, identified as “Chihuahua Stealer,” combines traditional malware tactics with advanced functionalities, raising concerns within the cybersecurity community. The malware was initially reported by a Reddit user…
Apple Agrees to Settlement of $95 Million in Siri Surveillance Litigation – Application Details Enclosed
Apple has agreed to pay $95 million to settle allegations regarding unauthorized recordings made by Siri, its voice-activated assistant. This settlement comes in response to claims that the company…
CTM360 Discovers Increased Incidence of Phishing Attacks Aimed at Meta Business Users
A new global phishing threat identified as “Meta Mirage” has emerged, specifically targeting organizations that utilize Meta’s Business Suite. This campaign primarily focuses on hijacking high-value accounts associated with…
Microsoft Addresses Booting Challenges on Dual-Boot Windows and Linux Environments
Microsoft has addressed a significant issue that was preventing Linux from booting on dual-boot systems where Secure Boot was enabled, following the installation of the August 2024 Windows security…
Android Enterprise Introduces Device Trust for Enhanced Security
A new security solution, Device Trust, has been introduced by Android Enterprise to enhance the security of Android devices. This initiative is particularly timely as organizations navigate the complexities…
Xinbi Telegram Marketplace Linked to $8.4 Billion in Cryptocurrency-Related Criminal Activities, Including Romance Scams and North Korean Money Laundering
A Telegram-based marketplace facilitating illicit transactions, named Xinbi Guarantee, has processed transactions totaling approximately $8.4 billion since its inception in 2022. This establishment has emerged as the second notable…
Incident Involving Disclosure of Documents by the Australian Human Rights Commission to Search Engine Platforms
The Australian Human Rights Commission (AHRC) has confirmed a serious data breach involving the unauthorized exposure of sensitive documents that were subsequently indexed by major search engines.

The breach…
👍1
Samsung Implements Security Patch for CVE-2025-4632 Exploited in Mirai Botnet Deployment via MagicINFO 9 Vulnerability
Samsung has implemented software updates to rectify a critical security vulnerability identified in the MagicINFO 9 Server, which has been the target of active exploitation.

This vulnerability, designated as…
Google Chrome Implements Restrictions on Admin-Level Browser Launches to Enhance Security Measures
Google is implementing a significant update to Chromium that modifies Google Chrome’s operational privileges to enhance security within Windows environments. This initiative aims to prevent the browser from running…
CISA Reverses Decision on Cybersecurity Advisory Modifications
The US Cybersecurity and Infrastructure Security Agency (CISA) has temporarily halted its plans to revamp the public cybersecurity advisory framework following significant backlash from the information security community.

Recently,…
Understanding Ransomware-as-a-Service: Analyzing the Scale of Cybercriminal Operations
Cyberattacks, particularly ransomware, present a significant financial threat to organizations of all sizes. The increasing sophistication and prevalence of these attacks compel enterprises to fortify their security measures and…
Exploitation of Zero-Day Vulnerability for Intelligence Operations Against Kurdish Forces by Turkish Group
Turkish-affiliated cyber espionage groups have deployed a zero-day vulnerability within widely used chat software to conduct operations against Kurdish military activities in Iraq, as reported by Microsoft Threat Intelligence.…
Google Agrees to $1.38 Billion Settlement Addressing Privacy Violations
The state of Texas has finalized a significant financial settlement with Google, amounting to $1.375 billion, to resolve two long-standing lawsuits stemming from allegations of deceptive data practices.

The…
BianLian and RansomExx Leverage SAP NetWeaver Vulnerability to Implement PipeMagic Trojan
At least two distinct cybercriminal organizations, BianLian and RansomExx, are reported to have exploited a security vulnerability in SAP NetWeaver, designated as CVE-2025-31324. This incident highlights that multiple threat…
Cybercriminals Involved in UK Retail Breaches Expanding Focus to U.S. Enterprises
Recent intelligence indicates that cybercriminals employing tactics associated with Scattered Spider, previously active against retail entities in the United Kingdom, have now expanded their focus to include retailers in…
Exploitation of New Fortinet and Ivanti Zero-Day Vulnerabilities Detected in the Wild
Fortinet and Ivanti have issued urgent alerts regarding the exploitation of new zero-day vulnerabilities affecting a variety of their products. On May 13, the companies released separate advisories, highlighting…
North Korean Cyber Operatives Misappropriated $88 Million by Impersonating U.S. Technology Professionals
North Korean cybercriminals have developed sophisticated tactics to secure remote IT positions within the United States. This strategy, which involves the use of fabricated identities, enables these threat actors…
Rising Threat Landscape: Cyberattacks Targeting Long Island Educational Institutions
In a troubling trend, more than 20 school districts throughout Long Island have experienced cyberattacks, resulting in the compromise of personal data belonging to over 10,000 students. Recent state…
Unskippable Advertisements Flood Android Users
Researchers have identified a highly adaptable ad fraud network known as Kaleidoscope, which inundates users with unskippable advertisements.

Typically, ad fraud does not actively concern users of compromised devices,…
Chrome Vulnerability Facilitates Cross-Origin Data Leakage Through Loader Referrer Policy
Google has recently issued updates to its Chrome web browser, addressing four security vulnerabilities, including one classified as being actively exploited in the wild. This high-severity vulnerability, designated as…
Ransomware Groups Engage in Ongoing Attacks Targeting SAP NetWeaver Systems
Ransomware groups have intensified their activities, joining existing attacks on SAP NetWeaver platforms by exploiting a critical vulnerability that enables remote code execution on unprotected servers.

SAP recently released…