TRUSTCRYPT
19 subscribers
741 photos
740 links
TrustCrypt – your go-to channel for the latest cybersecurity news, in-depth breach analyses, and practical tips to protect your data
https://trustcrypt.com/
Download Telegram
CoinMarketCap Suffers Security Breach, Initiates Urgent Measures to Eliminate Threatening Wallet Verification Popup
CoinMarketCap experienced a security breach on Friday, marked by the emergence of a deceptive popup on its platform. This notification prompted users to “verify” their cryptocurrency wallets, a tactic…
Report Alerts on Advanced DDoS Campaigns Disrupting Global Banking Institutions
A recent report by FS-ISAC and Akamai highlights the significant impact of advanced Distributed Denial of Service (DDoS) attacks on the global financial sector. These sophisticated threats have resulted…
Montana Attorney General Initiates Inquiry into Lee Enterprises Data Breach
Montana Attorney General Austin Knudsen has initiated an investigation into the ransomware attack on Lee Enterprises, executed by the threat actor Qilin. This cyber incident, which occurred earlier this…
Exploitative Use of Encrypted Applications for Adolescent Recruitment in Violent Activities
European police authorities, spearheaded by Denmark and Sweden, have initiated a comprehensive operation targeting individuals involved in the emerging field of violence-as-a-service. This troubling trend sees criminal organizations leveraging…
Securing Sensitive Data: Collaborative Efforts to Address Vulnerabilities in State Forensics Laboratory Systems
This week, a pressing issue emerged regarding the safeguarding of sensitive data, resembling the lightbulb-changing meme that humorously questions the number of individuals required for a straightforward task. However,…
McLaren Issues Formal Notification to 743,131 Patients Following July 2024 Ransomware Incident
On August 5, 2024, McLaren Healthcare identified suspicious activity impacting the computer systems of McLaren Health Care and the Karmanos Cancer Institute. In an initial announcement regarding the incident,…
Cybercriminals Exploit Inferno Drainer to Misappropriate $43K from CoinMarketCap Users
Scammers have leveraged a sophisticated tool known as Inferno Drainer to illicitly acquire approximately $43,000 in cryptocurrency from 110 users of CoinMarketCap. This was executed through the integration of…
CoinMarketCap Experiences Security Breach Resulting in Cryptocurrency Wallet Exploitation through Deceptive Web3 Pop-up
CoinMarketCap, a leading cryptocurrency price tracking platform, experienced a significant security breach that resulted in the unauthorized draining of crypto wallets from unsuspecting visitors. On January 20, 2025, users…
Cyber Essentials Achieves Record Quarterly Milestone in Certifications
The UK government’s flagship cyber-resilience initiative has reached a significant milestone, with quarterly certifications for the Cyber Essentials scheme surpassing the 10,000 mark for the first time. This achievement,…
The Risks Associated with Storing Sensitive Data on Network Shares
Are you currently utilizing a shared network drive for storing sensitive information? If so, it is critical to recognize that your organization may be exposed to substantial risks involving…
Gmail’s Multi-Factor Authentication Compromised by Cybercriminals in Targeted Assaults
Russian hackers have successfully circumvented Google’s multi-factor authentication (MFA) in Gmail to execute targeted attacks. This finding comes from security researchers at the Google Threat Intelligence Group (GTIG).

The…
U.S. Homeland Security Issues Advisory on Increasing Cyber Threats from Iranian Actors
The U.S. Department of Homeland Security (DHS) has issued a warning regarding the increasing risks of cyberattacks from Iranian-backed hacking groups and pro-Iranian hacktivists. This alert comes as part…
Exploiting Echo Chamber Vulnerabilities in LLMs: Risks of Generating Malicious Content in OpenAI and Google Systems
Cybersecurity researchers are raising awareness about an innovative jailbreaking technique known as Echo Chamber. This method has the potential to deceive popular large language models (LLMs) into generating inappropriate…
Cyber Fattah Exposes Data from Saudi Games in Suspected Iranian Operation
Thousands of personal records linked to athletes and attendees of the Saudi Games have been compromised due to a cyber-attack attributed to the pro-Iranian hacktivist group known as Cyber…
Potential Asymmetric Warfare by a Militarily Degraded Iran: Implications for Proxy and Cyber Threats
Israel’s air assault on Iran has concentrated primarily on diminishing the Islamic Republic’s military capabilities and potential nuclear development. Actions taken in recent operations have successfully affected Iran’s ability…
Salt Typhoon Exploits Router Vulnerabilities to Target Telecommunications: Alert Issued by FBI and Canadian Authorities
A recently released advisory from the FBI and Canadian authorities highlights the activities of a China-linked group known as Salt Typhoon. This actor has been identified as exploiting vulnerabilities…
Weekly Security Update: June 15 – June 21
In the recent updates from Malwarebytes Labs, several significant topics have emerged in the information security landscape:

- Discussion surrounding the impacts of social media on children prompted a…
Malware Discovered on Google Play and Apple App Store: Compromising Personal Photos and Cryptocurrency Assets
A recently identified mobile malware, known as SparkKitty, has been found on both Google Play and Apple App Store, specifically targeting Android and iOS devices. This advanced malware is…
China-Linked Salt Typhoon Exploits Critical Cisco Vulnerability to Compromise Canadian Telecommunications Sector
The Canadian Centre for Cyber Security and the U.S. Federal Bureau of Investigation (FBI) have issued an advisory regarding cyber attacks conducted by the China-linked Salt Typhoon actors. These…
Cyber Intelligence Professionals and Enthusiasts Now Have the Ability to Report Threats Anonymously
Imagine a landscape where cybersecurity professionals, enthusiasts, or whistleblowers can anonymously report new clusters of malicious cyber activity without enduring extensive and formal disclosure procedures. This vision is being…
Pro-Russian Cyber Actors Target Dutch Government Websites in Anticipation of NATO Summit
On Monday morning, an online platform utilized by Dutch municipalities and provinces for the dissemination of official documents appears to have been subjected to a digital attack, as reported…