TRUSTCRYPT
19 subscribers
741 photos
740 links
TrustCrypt – your go-to channel for the latest cybersecurity news, in-depth breach analyses, and practical tips to protect your data
https://trustcrypt.com/
Download Telegram
DanaBot Malware Operators Unveiled Through 2022 Command and Control Vulnerability
A vulnerability introduced in the DanaBot malware operations with the June 2022 update has recently led to the exposure, indictment, and dismantling of their infrastructure as a result of…
Identification of Over 20 Configuration Vulnerabilities, Including Five CVEs, in Salesforce Industry Cloud
Cybersecurity researchers have identified more than 20 configuration-related vulnerabilities within Salesforce Industry Cloud, potentially jeopardizing sensitive data accessibility for unauthorized internal and external entities.

These vulnerabilities impact several components,…
Mastery Schools Alerts 37,031 Individuals of Significant Data Breach
A ransomware attack has resulted in the compromise of personal data belonging to 37,031 individuals, as confirmed by Mastery Schools, the largest charter school network in Philadelphia. The incident,…
Former Hilliard Treatment Center Employee Allegedly Involved in Sale of Patient Data on Dark Web
Authorities in Hilliard, Ohio, are currently investigating a significant case of fraud and identity theft linked to a former employee of a local addiction treatment center. This individual is…
Two Mirai Botnets, Lzrd and Resgod, Detected Exploiting Vulnerabilities in Wazuh System
Akamai’s recent analysis has identified two distinct Mirai botnets actively exploiting the significant vulnerability identified as CVE-2025-24016 within the Wazuh framework. This critical flaw presents a serious threat, particularly…
Vulnerability in Google Platform Exposed User Phone Numbers to Unauthorized Detection
Google has addressed vulnerabilities that exposed the phone numbers associated with nearly any Google account. This issue was identified within the account recovery process, which allows users to regain…
ConnectWise Implements Enhanced Code Signing Certificate Rotation to Address Security Vulnerabilities
ConnectWise is notifying its customers about the upcoming rotation of digital code signing certificates for its ScreenConnect, ConnectWise Automate, and ConnectWise RMM executables due to security concerns.

Digital certificates…
INTERPOL Neutralizes Over 20,000 Malicious IP Addresses Associated with 69 Malware Variants in Operation Secure
INTERPOL has reported the successful dismantling of over 20,000 malicious IP addresses and domains associated with 69 information-stealing malware variants. This initiative, codenamed Operation Secure, was executed from January…
Congress Introduces Legislation to Enhance Cybersecurity in Healthcare Sector
US legislators have introduced a new Healthcare Cybersecurity Bill, aimed at enhancing the federal government’s capacity to prevent and respond to breaches of American medical data.

Introduced by Congressman…
Dutch Law Enforcement Identifies Users on Cracked.io
Excerpts from a recent press release by the Dutch Police indicate significant developments following thorough investigations conducted by the Cybercrime Team of the Zeeland-West-Brabant unit. These investigations revealed that…
Operation Secure: INTERPOL Takes Down 20,000 Infostealer Domains and Arrests 32 Individuals
In a significant operation targeting cybercrime, INTERPOL has successfully disrupted 20,000 infostealer domains across the Asia-Pacific region. This extensive crackdown has resulted in the arrest of 32 individuals linked…
Congress Critiques 23andMe on Privacy Practices and Sale of Genetic Data
During a recent Senate hearing titled “23 and You: The Privacy and National Security Implications of the 23andMe Bankruptcy,” executives from 23andMe addressed significant concerns regarding the privacy ramifications…
SmartAttack Utilizes Smartwatch Technology to Compromise Air-Gapped Systems
A new method known as ‘SmartAttack’ leverages smartwatches to act as covert ultrasonic signal receivers, enabling the exfiltration of data from air-gapped systems.

Air-gapped systems, designed for high-security environments…
Ex-Members of Black Basta Leverage Microsoft Teams and Python Scripts in 2025 Cyber Attacks
Former members associated with the Black Basta ransomware operation have been observed maintaining their established tactics of email bombing and Microsoft Teams phishing to secure persistent access to target…
20,000 Asian IP Addresses and Domains Neutralized in Infostealer Operation
Over 20,000 malicious IP addresses and domains linked to information stealers (infostealers) have been dismantled in a significant operation targeting cybercriminal infrastructure across Asia.

On June 11, Interpol announced…
CISA Issues Advisory on Vulnerabilities in Remote Control Functionality of SinoTrack GPS Trackers
The Cybersecurity and Infrastructure Security Agency (CISA) has identified critical vulnerabilities in SinoTrack GPS devices that pose significant risks, including the potential for unauthorized remote control of vehicles and…
U.S. Airline Sector Discreetly Providing Flight Data to Department of Homeland Security
A data broker affiliated with some of the largest airlines in the United States has been providing customer flight data access to the Department of Homeland Security (DHS).

The…
Impact on Performance Remains Unaffected by 80% Price Reduction of ChatGPT o3 API
The recent 80% price reduction of the ChatGPT o3 API by OpenAI presents a significant opportunity for developers without compromising performance standards.

On June 11, 2025, OpenAI announced this…
Zero-Click AI Vulnerability Unveils Microsoft 365 Copilot Data Without User Consent
A newly identified attack technique, termed EchoLeak, has been classified as a “zero-click” artificial intelligence (AI) vulnerability that enables malicious actors to exfiltrate sensitive information from Microsoft 365 Copilot’s…
Palo Alto Networks Addresses Multiple Security Vulnerabilities
Cybersecurity leader Palo Alto Networks has released a series of critical patches to address vulnerabilities across its product suite, including the GlobalProtect App, Cortex XDR, PAN-OS, and Prisma Access…
Sweden Faces Cybersecurity Threat: Prime Minister Issues Urgent Warning
Sweden is currently facing significant cyberattacks, as articulated by Prime Minister Ulf Kristersson during a press conference on Wednesday. Over the course of three days, disruptions have impacted several…