TRUSTCRYPT
19 subscribers
741 photos
740 links
TrustCrypt – your go-to channel for the latest cybersecurity news, in-depth breach analyses, and practical tips to protect your data
https://trustcrypt.com/
Download Telegram
Anne Arundel County Reports Ransomware Attack Resulting in Breach of Sensitive Health Data
A cybersecurity incident occurred in February, leading to the compromise of sensitive information pertaining to patients who sought medical services from the Anne Arundel County Department of Health. In…
1
Introduction of ‘Defendnot’ Tool Manipulates Windows to Deactivate Microsoft Defender
A new tool, ‘Defendnot,’ has emerged, capable of disabling Microsoft Defender on Windows systems by masquerading as a legitimate antivirus application, even in the absence of actual antivirus software.…
1
Ransomware Incident Involving ADP Partner Compromises Broadcom Employee Data
A recent ransomware attack on Business Systems House (BSH), a partner of payroll provider ADP in the Middle East, resulted in the breach of employee data belonging to Broadcom.…
1
Fresno County Targeted in $1.6 Million Phishing Scheme; One Individual Arrested and Another Indicted
Two individuals have been indicted by a federal grand jury on multiple counts of wire fraud linked to a sophisticated phishing scheme that defrauded the County of Fresno out…
Russia-Linked SpyPress Malware Leverages Webmail Vulnerabilities for Espionage Against Ukraine
ESET has conducted an in-depth analysis of RoundPress, a significant cyber espionage campaign attributed to Russia’s Fancy Bear, also known as Sednit. This operation primarily targets organizations associated with…
FBI Issues Advisory on AI Voice Scams Targeting U.S. Government Officials
The FBI has issued a warning regarding an advanced vishing (voice phishing) and smishing (SMS phishing) campaign that utilizes AI-generated voice messages to impersonate high-ranking officials within the U.S.…
Former NSA Threat Analyst Evaluates Scattered Spider’s Sophisticated Social Engineering Tactics: “Their Expertise is Notable”
The help desk at a prominent US retailer received a concerning call. An individual claimed to be an employee who had encountered difficulties accessing their corporate accounts. However, this…
Former Sussex Police Officer Charged with Additional 18 Computer Misuse Offences Amid Rape Trial
A former officer of Sussex Police, currently undergoing trial for allegations of rape and sexual assault stemming from an investigation conducted by the Independent Office for Police Conduct (IOPC),…
Weekly Security Insights: May 12 – May 18
Last week brought significant developments in the information security landscape:

– The Consumer Financial Protection Bureau (CFPB) has quietly withdrawn the previously proposed data broker protection rule, sparking concerns…
👍1
Staying Ahead of Evolving Cloud Threats: Strategies for CISOs in 2025
Cloud environments have increasingly become prime targets for cybercriminals, which will be a focal point in discussions among experts at the forthcoming security conference in Europe.

Recent studies indicate…
Assets Valued at $4.5 Million, Including Luxury Real Estate and Cryptocurrency, Seized from Cybercriminal Shane Stephen Duffy Involved in League of Legends Exploits
Luxury assets exceeding $4.5 million have been confiscated due to their association with a previously convicted hacker from Queensland. This extensive seizure includes a beachfront mansion, a 2019 black…
SEC SIM Swapper Sentenced to 14 Months for Account Hijacking
An Alabama man has been sentenced to 14 months in prison following his involvement in the hacking of a social media account belonging to the Securities and Exchange Commission…
Legal Aid Agency Acknowledges Significant Breach of Applicant Data
An April breach at the UK’s Legal Aid Agency has led to a significant data compromise, exposing a vast amount of personal information belonging to applicants, including criminal records,…
👍1
Strategic Intelligence Integration: Advancing the Future of On-Chain AI Agents
Disciplined, well-trained, and adequately equipped, artificial intelligence (AI) agents function as digital operatives. These entities are capable of executing assigned tasks autonomously, streamlining processes and enhancing efficiency across various…
🔥1
The Strategic Advantage of CTEM for CISOs in 2025
Continuous Threat Exposure Management (CTEM) has transitioned from a theoretical concept to a foundational element of modern cybersecurity strategy, becoming instrumental for Chief Information Security Officers (CISOs). By continuously…
Firefox Integrates AI-Enhanced Perplexity Search Engine Within Browser Environment
Mozilla Firefox has initiated experiments integrating an AI-driven search capability, specifically the Perplexity Search Engine, into the browser’s address bar for version 139. This development signals a potential shift…
Firefox Addresses Two Zero-Day Vulnerabilities Exploited at Pwn2Own Berlin, Offering $100,000 in Bounty Rewards
Mozilla has released critical security updates to address two significant vulnerabilities in its Firefox browser, which could potentially be exploited to access sensitive data or execute arbitrary code.

The…
Zimperium Discovers Over 40,000 iOS Applications Misusing Private Entitlements
A recent analysis by Zimperium highlights an escalating array of threats impacting iOS devices, with particular emphasis on vulnerabilities associated with malicious applications and potential exploits targeting the operating…
Weekly Security Brief: Analysis of Zero-Day Exploits, Insider Threats, APT Targeting, Botnet Activity, and Additional Insights
In the evolving landscape of cybersecurity, leaders are not only tasked with mitigating attacks but also with safeguarding trust, ensuring system reliability, and upholding their organizations’ reputations. Recent developments…
Mozilla Addresses Firefox Zero-Day Vulnerabilities Exploited During Hacking Competition
Mozilla has released urgent security updates to rectify two critical zero-day vulnerabilities in Firefox, which were demonstrated at the recent Pwn2Own Berlin 2025 hacking competition. These updates apply to…
🤔1