TRUSTCRYPT
19 subscribers
741 photos
740 links
TrustCrypt – your go-to channel for the latest cybersecurity news, in-depth breach analyses, and practical tips to protect your data
https://trustcrypt.com/
Download Telegram
Growing Cyber Risks Associated with Generative AI Drive Investment in AI Security Solutions
Around 73% of organizations are now investing in AI-specific security tools due to escalating concerns regarding the cyber risks associated with Generative AI (GenAI), as reported in the latest…
1
Compromised RVTools Installer Distributing Bumblebee Malware
Recent findings have revealed that the RVTools installer available on its official website has been compromised, leading to the distribution of malware. Investigations indicate that this malicious software is…
1
Cyber Attack Targets Major Supplier for UK Supermarkets Aldi, Tesco, and Sainsbury’s, Leading to Ransom Demand
Owen Scott reports that Peter Green Chilled, a logistics provider serving various supermarkets in the UK, has experienced a significant cyberattack resulting in a ransom demand. In response to…
1
Malware-Infected Printer Exposes Additional Risks for Windows Users
You would expect that a significant investment of $6,000 in a printer would ensure a secure user experience, devoid of viruses and other malware. Unfortunately, the reality surrounding Procolored…
1
South Asian Ministries Targeted by SideWinder APT Exploiting Legacy Office Vulnerabilities and Tailored Malware Solutions
High-level government institutions in Sri Lanka, Bangladesh, and Pakistan are currently the target of a sophisticated cyber campaign orchestrated by the threat actor known as SideWinder.

According to researchers…
1
Microsoft Announces Open-Source Initiative for Windows Subsystem for Linux at Build 2025
Microsoft has made a significant advancement by open-sourcing the Windows Subsystem for Linux (WSL), now available on GitHub, with a few exceptions for specific components integral to Windows.

This…
1
LockBit Leak Reveals Affiliate Pressure Tactics and Infrequent Compensation
Weeks following the LockBit ransomware incident, the disclosure of compromised data has shed light on the operational mechanisms utilized by affiliates involved in the ransomware ecosystem. This analysis highlights…
1
UK: Post Office to Provide Compensation for Hundreds Affected by Data Breach
The Post Office has reached a settlement to compensate numerous former subpostmasters whose personal information was unintentionally disclosed during a data breach that occurred last year. In June, the…
1
Discovery of AWS Default IAM Roles Facilitating Lateral Movement and Cross-Service Exploitation
Cybersecurity researchers have uncovered significant vulnerabilities within the default identity and access management (IAM) roles associated with Amazon Web Services (AWS), which could enable attackers to escalate privileges, manipulate…
1
Russian APT Groups Escalate Attacks in Europe Utilizing Zero-Day Exploits
The end of 2024 and the onset of 2025 witnessed a notable escalation in malicious cyber activities conducted by Russian-aligned hacking groups, as reported by ESET.

In its APT…
1
Acquisition of Genetic Data from 23andMe by Pharmaceutical Organization
The recent acquisition of the bankrupt genetic testing company 23andMe by Regeneron Pharmaceuticals for $256 million raises significant questions about the motivations and implications of this transaction. Regeneron, a…
1
Exposing Over 100 Malicious Chrome Extensions Engaged in Session Hijacking, Credential Theft, and Ad Injection
An unidentified threat actor has been implicated in the development of various malicious Chrome Browser extensions since February 2024. These extensions, which masquerade as benign utilities, are designed to…
1
RVTools Compromised in Supply Chain Attack Distributing Bumblebee Malware
The official RVTools website, a management tool for VMware, has fallen victim to a supply chain attack, resulting in the distribution of a compromised installer that delivers the Bumblebee…
1
Data Breach Impacting 200,000 Harbin Clinic Patients Identified in Debt Collection Operations
A recent data breach has compromised the personal information of over 200,000 patients associated with Harbin Clinic, due to a cyber-attack on Nationwide Recovery Services (NRS), a debt collection…
1
Hazy Hawk Threat Actor Identified Targeting Unmonitored Cloud Resources Since 2023
Infoblox has identified a new threat actor, dubbed Hazy Hawk, that has been exploiting abandoned cloud resources, such as S3 buckets and Azure services, alongside gaps in DNS configurations.…
1
Data Breach: 15 Years of UK Legal Aid Applicant Information Compromised by Cyber Attackers
Hackers have successfully infiltrated the U.K. Ministry of Justice, compromising personal information related to criminal defendants seeking legal representation. This breach, reported by the British government, was detected on…
1
Hazy Hawk Group Leverages DNS Misconfigurations to Compromise Trusted Domains
A threat actor identified as “Hazy Hawk” is capitalizing on neglected DNS CNAME records associated with abandoned cloud services. This exploitation allows them to seize control of trusted subdomains…
1
Emerging AI Tool Triggers Cybersecurity Concerns
A new AI-powered chatbot, Venice.ai, is sparking significant concern within cybersecurity circles following its emergence in underground hacking forums, primarily due to its absence of content restrictions. This platform…
1
Gujarat ATS Detains 18-Year-Old Suspect in Cyberattack Investigation During Operation Sindoor
The Gujarat Anti-Terrorism Squad (ATS) has apprehended 18-year-old Jasim Shahnawaz Ansari from Nadiad in connection with a series of cyberattacks targeting numerous Indian government websites. This operation occurred during…
Hazy Hawk Leverages DNS Vulnerabilities to Compromise CDC and Corporate Domains for Malware Distribution
A threat actor identified as Hazy Hawk has been observed exploiting abandoned cloud resources from prominent organizations, such as Amazon S3 buckets and Microsoft Azure endpoints, utilizing misconfigurations within…