TRUSTCRYPT
19 subscribers
741 photos
740 links
TrustCrypt – your go-to channel for the latest cybersecurity news, in-depth breach analyses, and practical tips to protect your data
https://trustcrypt.com/
Download Telegram
Webinar: Advancing Application Security from Code to Cloud to Security Operations Center Solutions
Modern applications evolve rapidly, often outpacing security teams’ ability to respond effectively. As organizations increasingly transition to cloud environments, security practices frequently lag behind these advancements. Security teams find…
1
CISA Identifies Recently Mitigated Chrome Vulnerability as Under Active Exploitation
On May 15, 2025, the Cybersecurity and Infrastructure Security Agency (CISA) issued a warning to U.S. federal agencies regarding a significant vulnerability in the Chrome web browser, designated as…
1
Newly Discovered Vulnerabilities in Intel CPUs Facilitate Memory Leaks and Exploitations of Spectre Version 2
Researchers at ETH Zürich have identified a significant security vulnerability that affects all modern Intel CPUs. This vulnerability allows the unintended disclosure of sensitive information stored in memory, highlighting…
1
U.S. Authorities Indict Additional 12 Individuals in Connection with $230 Million Cryptocurrency Theft
In a significant law enforcement action, twelve additional individuals have been charged as part of a RICO conspiracy connected to a cyber theft exceeding $230 million in cryptocurrency. The…
1
Escalating Healthcare Cyber-Attacks: The Sector Emerges as a Primary Target
Cyber-attacks targeting the healthcare sector have escalated sharply, with reports indicating a notable increase in incidents compared to other key industries in 2024, as evidenced by recent data from…
1
Ten Fundamental Best Practices for Robust Data Protection
Data is a fundamental component of organizational productivity, and the protection of sensitive information has become increasingly crucial. As cyber threats continue to evolve and data privacy regulations become…
1
Government Webmail Compromised Through XSS Vulnerabilities in Coordinated Global Espionage Operation
Hackers are conducting an extensive cyber-espionage operation identified as ‘RoundPress’, utilizing both zero-day and n-day vulnerabilities present in webmail servers to infiltrate and extract email data from high-profile governmental…
1
Russian Espionage Operation Aimed at Entities Connected to the Ukraine Conflict
A recent cyber espionage campaign attributed to Russian hackers is actively targeting organizations associated with the ongoing conflict in Ukraine. This operation, named “Operation RoundPress” by ESET, has been…
1
US Retail Sector Under Increased Cyber Threats Following UK Incidents, Reports Google
Hackers from the Scattered Spider group, previously recognized for their attacks on UK retail establishments, have recently shifted their focus to US retailers, as highlighted by Google’s cybersecurity team.…
1
Pompompurin, Head of Breachforums, Agrees to $700,000 Settlement in Healthcare Data Breach Case
A recent development has emerged regarding a previously reported data breach in 2023. According to Brian Krebs, a notable legal resolution has been reached involving the former 22-year-old administrator…
1
Emergence of HTTPBot Botnet Initiates Over 200 Targeted DDoS Assaults on Gaming and Technology Industries
Cybersecurity researchers have recently identified a new botnet malware named HTTPBot, which is primarily targeting the gaming industry, as well as technology firms and educational institutions in…
1
FBI: U.S. Officials Compromised by Voice Deepfake Attacks Since April
The FBI has issued a warning regarding recent voice phishing attacks targeting U.S. officials using AI-generated audio deepfakes, which have been occurring since April 2025. This alert serves as…
1
Impersonation of U.S. Officials via SMS and Voice Deepfakes
Malicious actors are increasingly using advanced AI technologies to impersonate senior US officials in sophisticated SMS and voice phishing schemes, also known as smishing and vishing, respectively. These tactics…
1
Withdrawal of Data Broker Protection Regulation by the CFPB
The Consumer Financial Protection Bureau (CFPB) has opted to withdraw its proposed 2024 regulation aimed at limiting the sale of American citizens’ personal information by data brokers.

In a…
1
Fileless Remcos RAT Deployment via LNK Files and MSHTA in PowerShell-Driven Cyber Attacks
Cybersecurity researchers have uncovered a new malware campaign utilizing a PowerShell-based shellcode loader for the deployment of a remote access trojan known as Remcos RAT.

According to a technical…
1
Coinbase Data Breach Compromises Customer Information and Government Identification Documents
Coinbase, a prominent cryptocurrency exchange with a user base exceeding 100 million, has reported a significant data breach. Cybercriminals, allegedly in collusion with rogue support agents, managed to acquire…
1
UK Cybersecurity Job Openings Increase by 12% Annually
UK cybersecurity job vacancies are increasing at an annual growth rate of 10-12%, with hiring teams facing challenges in locating qualified candidates for these positions. Analysis conducted by the…
1
Meta Issues Cease and Desist Letter Regarding AI Training Practices
EU privacy advocacy group NOYB has issued a firm response to Meta regarding its plans to utilize the data of European users for AI model training. In a cease-and-desist…
1
Exploitation of Zero-Day Vulnerabilities in VMware ESXi and Microsoft SharePoint Uncovered at Pwn2Own
During the second day of the Pwn2Own Berlin 2025 event, competitors achieved remarkable success by identifying and exploiting zero-day vulnerabilities in several high-profile products, collectively earning $435,000. The identified…
1
Israel Apprehends Additional Suspect Linked to $190 Million Nomad Bridge Crypto Incident
An American-Israeli national, Osei Morrell, has been apprehended in Israel for his alleged involvement in the exploit of the Nomad bridge smart contract that led to the siphoning of…
1