TRUSTCRYPT
19 subscribers
741 photos
740 links
TrustCrypt – your go-to channel for the latest cybersecurity news, in-depth breach analyses, and practical tips to protect your data
https://trustcrypt.com/
Download Telegram
INE Security Advisory: Proactive CVE Management Bridges Critical Divide Between Vulnerability Notifications and Robust Defense Strategies
Cary, North Carolina – On May 14, 2025, a notable incidence of cyber attack has been reported, raising critical concerns within the information security sector. This incident highlights the…
Extradition of Online Criminal Marketplace Administrator from Kosovo to the United States
Tampa, Florida – United States Attorney Gregory W. Kehoe has confirmed the extradition of Liridon Masurica, 33, from Gjilan, Kosovo. Masurica, also recognized by the online alias “@blackdb,” faces…
The Advantages of Offensive Security Training for Enhancing Your Security Team’s Effectiveness
Organizations across various sectors are witnessing a striking increase in cyberattacks, particularly those targeting critical infrastructure and cloud-based enterprises. The latest Data Breach Investigations Report revealed an 18% year-over-year…
Nucor Corporation Encounters Operational Disruptions Following Cybersecurity Incident
A cybersecurity incident affecting Nucor Corporation, the leading steel manufacturer in the United States, has necessitated the offline status of portions of the company’s networks as well as the…
Fraud Losses Average $11 Million Per Company Amid Increased Customer Misuse
Online retailers experienced substantial financial losses due to fraud, averaging nearly $11 million per company last year, with a notable surge in first-party fraud incidents. This information comes from…
Twilio Refutes Breach Claims Following Disclosure of Alleged Steam Two-Factor Authentication Codes
Twilio has publicly refuted claims of a security breach following assertions from a threat actor regarding the possession of over 89 million Steam user records, including one-time access codes.…
Key Components of a Robust Business Continuity and Disaster Recovery Strategy for Ransomware Defense
Ransomware has evolved into a sophisticated and deceptive threat that can incapacitate organizations regardless of their size. Cybercriminals are increasingly leveraging legitimate IT tools to penetrate networks and execute…
Sophisticated Phishing Attacks: Targeting Victims Through Trusted Websites and Real-Time Verification
The threat research team has identified a sophisticated phishing incident that employs legitimate infrastructure, precise email validation, and evasive delivery techniques. This case exemplifies the exploitation of trusted domains,…
Law Enforcement Authorities Disrupt Illicit Trading Platform Responsible for Extensive Financial Fraud
Authorities across Europe have successfully dismantled a fraudulent online trading platform that deceived hundreds of individuals, resulting in significant financial losses. This operation involved law enforcement agencies from multiple…
Compromise of Personal Data Due to Breach at the Australian Human Rights Commission
The Australian Human Rights Commission (AHRC) recently reported an incident involving the inadvertent online exposure of over 600 submissions and nominations made through its website. This data exposure occurred…
Rethinking Penetration Testing: Moving Beyond Compliance-Driven Approaches
Imagine a scenario where an organization successfully completes its annual penetration test in January, achieving high compliance ratings. In February, the development team implements a routine software update. By…
Dior Reports Cybersecurity Incident and Alerts of Potential Data Breach
The House of Dior, a prominent French luxury fashion brand, has officially reported a cybersecurity incident that has resulted in the exposure of customer data. A company spokesperson confirmed…
The Future of Business Communication: The Imperative Shift to Cloud Phone Systems
Over the years, numerous technologies have migrated to cloud-based solutions, encompassing Enterprise Resource Planning (ERP) systems and email management platforms. This transition has been driven by the desire for…
$28 Million Allocated for Texas Schools’ Cybersecurity Remains Unutilized
Cyberattacks targeting school districts in Texas have become increasingly prevalent, drawing attention to the critical need for cybersecurity infrastructure within K-12 educational institutions. Reports indicate that many of these…
APT28 Linked to Russia Exploits MDaemon Zero-Day Vulnerability to Compromise Government Webmail Servers
A threat actor linked to Russia has been identified as the driving force behind a sophisticated cyber espionage operation aimed at webmail servers, specifically targeting platforms such as Roundcube,…
Kosovo Extradites BlackDB Administrator to the United States to Address Cybercrime Allegations
A Kosovo national has been extradited to the United States to address charges relating to the operation of an online cybercrime marketplace in existence since 2018.

The individual, Liridon…
Significant Increase of 967% in Linux Vulnerabilities Over the Past Year
The number of newly discovered vulnerabilities affecting Linux and macOS systems has seen a significant increase. According to a recent analysis by Action1, the total count of vulnerabilities identified…
Enhancing Code Security: Cultivating a Culture of Credential Protection within Development Teams
Credential protection is essential for safeguarding against security breaches. As organizations increasingly rely on various applications and services, the importance of securing APIs and managing sensitive information has never…
Chinese Cyber Operatives Target Drone Industry through Supply Chain Assaults
A notable Chinese threat actor has been identified as disrupting the drone supply chain through a series of multi-wave attacks against various organizations in Taiwan and South Korea, according…
Exploitation of Unicode Steganography in Malicious npm Package for Google Calendar Command and Control Operations
Cybersecurity researchers have identified a malicious package titled “os-info-checker-es6,” masquerading as a utility for operating system information. Its primary function appears to be the stealthy installation of subsequent payloads…
1