TRUSTCRYPT
19 subscribers
741 photos
740 links
TrustCrypt – your go-to channel for the latest cybersecurity news, in-depth breach analyses, and practical tips to protect your data
https://trustcrypt.com/
Download Telegram
Palo Alto Networks Addresses Multiple Security Vulnerabilities
Cybersecurity leader Palo Alto Networks has released a series of critical patches to address vulnerabilities across its product suite, including the GlobalProtect App, Cortex XDR, PAN-OS, and Prisma Access…
Sweden Faces Cybersecurity Threat: Prime Minister Issues Urgent Warning
Sweden is currently facing significant cyberattacks, as articulated by Prime Minister Ulf Kristersson during a press conference on Wednesday. Over the course of three days, disruptions have impacted several…
EchoLeak: Zero-Click AI Vulnerability in Microsoft Copilot Compromises Corporate Data Security
Aim Labs has identified a critical security vulnerability known as EchoLeak within the Microsoft 365 Copilot feature. This zero-click exploit enables unauthorized access to sensitive information through email communications,…
Graphite spyware Employed in Zero-Click iOS Attacks Targeting Journalists
Recent forensic investigations have validated the deployment of Paragon’s Graphite spyware platform in zero-click attacks against Apple iOS devices belonging to at least two journalists in Europe.

Citizen Lab…
Utilization of WordPress Platforms in Malicious Activities: An In-Depth Analysis of VexTrio and Its Global Scam Network Operations
The VexTrio Viper Traffic Distribution Service (TDS) is part of a broader network of malicious actors engaged in the distribution of harmful content through various adtech channels, including Help…
NIST Releases Updated Guidance on Zero Trust Implementation
The US National Institute of Standards and Technology (NIST) has released enhanced guidance for the implementation of Zero Trust Architecture (ZTA). This new publication aims to assist organizations in…
School Districts Unaware of BoardDocs Software Exposing Confidential Files
BoardDocs, a software tool utilized by numerous school boards for the management of meeting minutes and the storage of sensitive information, has reportedly experienced a data breach that impacts…
United States Accounts for the Highest Number of Vulnerable Cameras Compromising Residential and Commercial Security
A recent analysis highlights a concerning trend in global cybersecurity: more than 40,000 internet-connected security cameras are currently exposed, permitting unauthorized access to live footage without adequate protective measures.…
Trend Micro Addresses Critical Vulnerabilities Across Multiple Product Lines
Trend Micro has announced the release of security updates to remediate multiple critical-severity vulnerabilities affecting its Apex Central and Endpoint Encryption (TMEE) PolicyServer products. The company has reported no…
Exploitation of Apple Zero-Click Vulnerability in Messages for Surveillance of Journalists via Paragon Spyware
Apple has reported a security flaw in its Messages application, designated as CVE-2025-43200, which has been actively exploited in targeted cyber attacks against members of civil society. This vulnerability,…
M365 Copilot: Emerging Zero-Click AI Vulnerability Facilitates Corporate Data Breach
In a groundbreaking revelation, researchers from Aim Labs have identified a critical zero-click vulnerability in Microsoft 365 Copilot that enables the unauthorized extraction of sensitive corporate data through a…
Disciplinary Actions Taken Against Financial Conduct Authority Employees for Unauthorized Transmission of Work Data to Home Addresses
Four employees at the UK Financial Conduct Authority (FCA) received warnings for engaging in the transmission of regulator-related information to their personal email accounts. This incident raises critical questions…
Over 269,000 Websites Compromised by JSFireTruck JavaScript Malware Within a Single Month
Recent investigations by cybersecurity experts highlight a significant campaign compromising legitimate websites through malicious JavaScript injections. Insights from Palo Alto Networks’ Unit 42 indicate that the injected code employs…
Former CISA and NCSC Leaders Caution Against the Glamorization of Threat Actor Names
The former leaders of key cybersecurity agencies in the US and UK have emphasized the need for significant reforms in the naming conventions of cyber threat actors. This discussion…
Coop Hospital Acknowledges Investigation into Alleged Cybersecurity Breach
The Palawan Medical Mission Group Multipurpose Cooperative (PMMGPMC), which oversees the Coop Hospital in Puerto Princesa City, has initiated an investigation into a ransomware attack that is believed to…
Meta AI Chats: Public Accessibility and Its Implications
Conversations conducted through the Meta AI application are being inadvertently made public, exposing sensitive topics such as medical, legal, and private discussions. The standalone app, along with Meta’s AI…
Google Attributes Significant Cloud Outage to API Management Complications
Google has attributed a significant disruption in its cloud services to an issue with API management, which resulted in widespread outages affecting numerous platforms globally.

The outage, which began…
Discord Invite Link Exploitation Facilitates AsyncRAT and Skuld Stealer Deployment Against Cryptocurrency Wallets
A recent malware campaign is leveraging a vulnerability in Discord’s invitation system to distribute an information stealer known as Skuld and the AsyncRAT remote access trojan. Attackers have been…
European Journalists Targeted by Paragon Spyware, Citizen Lab Confirms
Researchers have uncovered the first forensic evidence indicating that the iPhones of at least two European journalists were compromised by Graphite, spyware developed by Paragon Solutions. In a report…