TRUSTCRYPT
19 subscribers
741 photos
740 links
TrustCrypt – your go-to channel for the latest cybersecurity news, in-depth breach analyses, and practical tips to protect your data
https://trustcrypt.com/
Download Telegram
Impersonation of U.S. Officials via SMS and Voice Deepfakes
Malicious actors are increasingly using advanced AI technologies to impersonate senior US officials in sophisticated SMS and voice phishing schemes, also known as smishing and vishing, respectively. These tactics…
1
Withdrawal of Data Broker Protection Regulation by the CFPB
The Consumer Financial Protection Bureau (CFPB) has opted to withdraw its proposed 2024 regulation aimed at limiting the sale of American citizens’ personal information by data brokers.

In a…
1
Fileless Remcos RAT Deployment via LNK Files and MSHTA in PowerShell-Driven Cyber Attacks
Cybersecurity researchers have uncovered a new malware campaign utilizing a PowerShell-based shellcode loader for the deployment of a remote access trojan known as Remcos RAT.

According to a technical…
1
Coinbase Data Breach Compromises Customer Information and Government Identification Documents
Coinbase, a prominent cryptocurrency exchange with a user base exceeding 100 million, has reported a significant data breach. Cybercriminals, allegedly in collusion with rogue support agents, managed to acquire…
1
UK Cybersecurity Job Openings Increase by 12% Annually
UK cybersecurity job vacancies are increasing at an annual growth rate of 10-12%, with hiring teams facing challenges in locating qualified candidates for these positions. Analysis conducted by the…
1
Meta Issues Cease and Desist Letter Regarding AI Training Practices
EU privacy advocacy group NOYB has issued a firm response to Meta regarding its plans to utilize the data of European users for AI model training. In a cease-and-desist…
1
Exploitation of Zero-Day Vulnerabilities in VMware ESXi and Microsoft SharePoint Uncovered at Pwn2Own
During the second day of the Pwn2Own Berlin 2025 event, competitors achieved remarkable success by identifying and exploiting zero-day vulnerabilities in several high-profile products, collectively earning $435,000. The identified…
1
Israel Apprehends Additional Suspect Linked to $190 Million Nomad Bridge Crypto Incident
An American-Israeli national, Osei Morrell, has been apprehended in Israel for his alleged involvement in the exploit of the Nomad bridge smart contract that led to the siphoning of…
1
Ivanti EPMM Affected by Two Actively Exploited Zero-Day Vulnerabilities
Ivanti EPMM users must prioritize patching against critical zero-day vulnerabilities identified as CVE-2025-4427 and CVE-2025-4428. These vulnerabilities have been actively exploited in the wild, posing significant risks to organizations…
1
Introduction of Codex: An Advanced AI Solution for Software Development by ChatGPT
OpenAI is introducing Codex, an advanced AI tool integrated with ChatGPT designed to enhance the efficiency of software development. This innovative tool assists software engineers by automating and managing…
1
Pro-Ukraine Cyber Group Implements Python Backdoor Against Russian Development Teams
ReversingLabs has recently identified a sophisticated threat known as dbgpkg, a counterfeit Python debugger that clandestinely establishes backdoors within systems to facilitate data exfiltration. This revelation raises significant concerns…
1
Japan Implements New Active Cyber Defense Legislation Authorizing Offensive Cyber Operations
Japan has implemented a new legislative framework that empowers its authorities to conduct offensive cyber operations. This proactive approach is designed to engage adversaries before potential threats escalate and…
1
Microsoft Acknowledges That May Windows 10 Updates Activate BitLocker Recovery Mode
Microsoft has acknowledged that certain Windows 10 and Windows 10 Enterprise LTSC 2021 systems are experiencing issues after the installation of the May 2025 security updates, specifically leading to…
1
Comparative Analysis: HubSpot vs. Salesforce – Identifying the Optimal CRM Solution for Your Business Needs
When deciding between HubSpot and Salesforce, it’s essential to carefully evaluate your business needs, current infrastructure, and long-term growth objectives. Both platforms are leaders in customer relationship management (CRM),…
1
Alabama Individual Receives 14-Month Sentence Related to Securities and Exchange Commission Cyber Intrusion Impacting Bitcoin Valuation
An Alabama man has been sentenced to 14 months in prison, followed by three years of supervised release, due to his involvement in the unauthorized takeover of the U.S.…
1
Procolored Distributes Compromised Drivers Containing Malware for Extended Period
For a duration of at least six months, the official software distributed with Procolored printers has been identified to contain malware, including a remote access trojan (RAT) and a…
1
Ransomware Groups Are Intensifying Their Use of Skitnet Post-Exploitation Malware
Ransomware groups are increasingly leveraging a sophisticated malware known as Skitnet, also referred to as “Bossnet,” to conduct stealthy post-exploitation operations within compromised networks.

This malware has been available…
1
Pwn2Own Berlin 2025: Compromises Identified in Windows 11, VMware, Firefox, and Additional Platforms
The Pwn2Own Berlin 2025 event at the OffensiveCon conference has successfully wrapped up its initial two days of rigorous competition. This prestigious event continues to attract elite security researchers…
1
Australian National “DR32” Sentenced in U.S. Federal Court
In a noteworthy development, the Australian individual known as “DR32” received his sentencing this week in a federal court located in Colorado. Contrary to widespread expectations, the outcome of…
1
Anne Arundel County Reports Ransomware Attack Resulting in Breach of Sensitive Health Data
A cybersecurity incident occurred in February, leading to the compromise of sensitive information pertaining to patients who sought medical services from the Anne Arundel County Department of Health. In…
1