TRUSTCRYPT
19 subscribers
741 photos
740 links
TrustCrypt – your go-to channel for the latest cybersecurity news, in-depth breach analyses, and practical tips to protect your data
https://trustcrypt.com/
Download Telegram
Microsoft Acknowledges That May Windows 10 Updates Activate BitLocker Recovery Mode
Microsoft has acknowledged that certain Windows 10 and Windows 10 Enterprise LTSC 2021 systems are experiencing issues after the installation of the May 2025 security updates, specifically leading to…
1
Comparative Analysis: HubSpot vs. Salesforce – Identifying the Optimal CRM Solution for Your Business Needs
When deciding between HubSpot and Salesforce, it’s essential to carefully evaluate your business needs, current infrastructure, and long-term growth objectives. Both platforms are leaders in customer relationship management (CRM),…
1
Alabama Individual Receives 14-Month Sentence Related to Securities and Exchange Commission Cyber Intrusion Impacting Bitcoin Valuation
An Alabama man has been sentenced to 14 months in prison, followed by three years of supervised release, due to his involvement in the unauthorized takeover of the U.S.…
1
Procolored Distributes Compromised Drivers Containing Malware for Extended Period
For a duration of at least six months, the official software distributed with Procolored printers has been identified to contain malware, including a remote access trojan (RAT) and a…
1
Ransomware Groups Are Intensifying Their Use of Skitnet Post-Exploitation Malware
Ransomware groups are increasingly leveraging a sophisticated malware known as Skitnet, also referred to as “Bossnet,” to conduct stealthy post-exploitation operations within compromised networks.

This malware has been available…
1
Pwn2Own Berlin 2025: Compromises Identified in Windows 11, VMware, Firefox, and Additional Platforms
The Pwn2Own Berlin 2025 event at the OffensiveCon conference has successfully wrapped up its initial two days of rigorous competition. This prestigious event continues to attract elite security researchers…
1
Australian National “DR32” Sentenced in U.S. Federal Court
In a noteworthy development, the Australian individual known as “DR32” received his sentencing this week in a federal court located in Colorado. Contrary to widespread expectations, the outcome of…
1
Anne Arundel County Reports Ransomware Attack Resulting in Breach of Sensitive Health Data
A cybersecurity incident occurred in February, leading to the compromise of sensitive information pertaining to patients who sought medical services from the Anne Arundel County Department of Health. In…
1
Introduction of ‘Defendnot’ Tool Manipulates Windows to Deactivate Microsoft Defender
A new tool, ‘Defendnot,’ has emerged, capable of disabling Microsoft Defender on Windows systems by masquerading as a legitimate antivirus application, even in the absence of actual antivirus software.…
1
Ransomware Incident Involving ADP Partner Compromises Broadcom Employee Data
A recent ransomware attack on Business Systems House (BSH), a partner of payroll provider ADP in the Middle East, resulted in the breach of employee data belonging to Broadcom.…
1
Fresno County Targeted in $1.6 Million Phishing Scheme; One Individual Arrested and Another Indicted
Two individuals have been indicted by a federal grand jury on multiple counts of wire fraud linked to a sophisticated phishing scheme that defrauded the County of Fresno out…
Russia-Linked SpyPress Malware Leverages Webmail Vulnerabilities for Espionage Against Ukraine
ESET has conducted an in-depth analysis of RoundPress, a significant cyber espionage campaign attributed to Russia’s Fancy Bear, also known as Sednit. This operation primarily targets organizations associated with…
FBI Issues Advisory on AI Voice Scams Targeting U.S. Government Officials
The FBI has issued a warning regarding an advanced vishing (voice phishing) and smishing (SMS phishing) campaign that utilizes AI-generated voice messages to impersonate high-ranking officials within the U.S.…
Former NSA Threat Analyst Evaluates Scattered Spider’s Sophisticated Social Engineering Tactics: “Their Expertise is Notable”
The help desk at a prominent US retailer received a concerning call. An individual claimed to be an employee who had encountered difficulties accessing their corporate accounts. However, this…
Former Sussex Police Officer Charged with Additional 18 Computer Misuse Offences Amid Rape Trial
A former officer of Sussex Police, currently undergoing trial for allegations of rape and sexual assault stemming from an investigation conducted by the Independent Office for Police Conduct (IOPC),…
Weekly Security Insights: May 12 – May 18
Last week brought significant developments in the information security landscape:

– The Consumer Financial Protection Bureau (CFPB) has quietly withdrawn the previously proposed data broker protection rule, sparking concerns…
👍1
Staying Ahead of Evolving Cloud Threats: Strategies for CISOs in 2025
Cloud environments have increasingly become prime targets for cybercriminals, which will be a focal point in discussions among experts at the forthcoming security conference in Europe.

Recent studies indicate…
Assets Valued at $4.5 Million, Including Luxury Real Estate and Cryptocurrency, Seized from Cybercriminal Shane Stephen Duffy Involved in League of Legends Exploits
Luxury assets exceeding $4.5 million have been confiscated due to their association with a previously convicted hacker from Queensland. This extensive seizure includes a beachfront mansion, a 2019 black…
SEC SIM Swapper Sentenced to 14 Months for Account Hijacking
An Alabama man has been sentenced to 14 months in prison following his involvement in the hacking of a social media account belonging to the Securities and Exchange Commission…
Legal Aid Agency Acknowledges Significant Breach of Applicant Data
An April breach at the UK’s Legal Aid Agency has led to a significant data compromise, exposing a vast amount of personal information belonging to applicants, including criminal records,…
👍1