TRUSTCRYPT
19 subscribers
741 photos
740 links
TrustCrypt – your go-to channel for the latest cybersecurity news, in-depth breach analyses, and practical tips to protect your data
https://trustcrypt.com/
Download Telegram
Safeguarding Forensic Reports: Addressing Privilege Concerns Post-Data Breach
In a noteworthy ruling from the Federal Court of Australia, the case of McClure v. Medibank Private Limited [2025] FCA 167 highlights significant considerations regarding the preservation of legal…
1
3AM Ransomware Exploits Spoofed IT Communications and Email Bombing Techniques to Compromise Network Security
A recent investigation has unveiled the tactics employed by the 3AM ransomware affiliates, who are executing highly targeted attacks by leveraging email bombardment and spoofed IT support calls. This…
1
Western Intelligence Agencies Collaborate to Uncover Russian Cyber Operations Targeting Logistics and Technology Sectors
A prominent Russian hacking group has been held accountable for executing a significant cyber operation that officials indicate poses a substantial threat to various organizations and sectors across more…
1
Russian Threat Actors Target Email and VPN Vulnerabilities to Conduct Espionage on Ukrainian Aid Operations
Russian cyber threat actors have been attributed to a state-sponsored initiative targeting Western logistics entities and technology firms since 2022. This campaign is assessed to be conducted by APT28…
Anthropic Web Configuration Suggests Advancements in Claude Sonnet 4 and Opus 4 Technologies
Anthropic is reportedly advancing its efforts with new AI models labeled Claude Sonnet 4 and Opus 4, following recent clues extracted from the company’s web configuration files. According to…
Microsoft Disrupts Lumma Stealer Network, Secures Over 2,000 Domains
Microsoft has executed a significant disruption of the Lumma Stealer network, a robust operation responsible for a substantial number of cybercrimes worldwide. This initiative resulted in the seizure of…
Microsoft Initiates Global Action Against Lumma Stealer: A Strategic Disruption of a Prominent Cybercrime Tool
Microsoft’s Digital Crimes Unit (DCU) has taken significant action against one of the most prevalent tools employed in the theft of sensitive personal and organizational data, a crucial factor…
OpenAI Indicates Significant Enhancements for ChatGPT Operator Agent
ChatGPT’s Operator, which is currently in the research preview phase, is set to evolve into a highly efficient tool, as noted by Jerry Tworek, the Vice President of Research…
Investigation Reveals Inconsistencies in Claims of 1.2 Billion Facebook Records Available for Sale by Threat Actor
Recent claims have emerged from a threat actor known as ‘ByteBreaker,’ who asserts the availability of 1.2 billion Facebook records obtained through API abuse. This disclosure has raised eyebrows…
Security Researchers Extract and Disseminate 2 Billion Discord Messages Online
Researchers have released an extensive database comprising over 2 billion messages from Discord. This data was extracted through the utilization of Discord’s public API and encompasses information from 3,167…
Severe Vulnerability in Samlify SSO Allows Unauthorized Administrative Access
A significant vulnerability has been identified in the Samlify authentication library, enabling malicious actors to gain administrative access by injecting unsigned harmful assertions into validly signed SAML responses.

Samlify…
INE Security Collaborates with Abadnet Institute to Deliver Cybersecurity Training Programs in Saudi Arabia
Cary, North Carolina, May 22, 2025 — In the rapidly evolving landscape of cybersecurity, businesses must remain vigilant against an increasing number of sophisticated threats. The rise in cyberattacks…
Data Breach of Communications Application Utilized by Trump Aide Results in Compromise of Sensitive US Government Information
A recent analysis has revealed that a cybersecurity incident involving a communications service utilized by former Trump national security adviser Mike Waltz has resulted in the compromise of messages…
Russian Cyber Intrusions Target Organizations to Monitor Humanitarian Aid Channels to Ukraine
A recent cyber espionage campaign linked to the Russian state-sponsored group APT28, also known as Fancy Bear or Forest Blizzard, has been actively targeting and infiltrating international organizations since…
Western Logistics and Technology Firms Targeted by APT28.
Dozens of Western logistics and technology companies involved in delivering aid to Ukraine have faced targeted cyber-espionage attacks attributed to a Russian state-backed threat actor over the past two…
XRP Futures: Advanced Solutions for Managing Cryptocurrency Volatility
As the cryptocurrency market evolves, investors are increasingly seeking advanced financial instruments that cater to their unique needs and risk profiles. The transition from speculative trading to more structured…
FBI and Europol Successfully Disrupt Lumma Stealer Malware Network Associated with 10 Million Infections
A global collaborative operation led by law enforcement agencies and private cybersecurity firms has effectively disrupted the online infrastructure associated with the Lumma (also known as LummaC or LummaC2)…
Signal Implements Block on Microsoft Recall Screenshots for Windows 11 Users
Signal has made significant enhancements to its Windows application aimed at safeguarding user privacy by preventing Microsoft’s AI-driven Recall feature from capturing screenshots of Signal conversations. This newly introduced…
Sensitive Personal Data Compromised in West Lothian Ransomware Incident
West Lothian Council has reported a significant data breach involving the theft of both personal and sensitive information from its education network. On May 21, the council updated stakeholders…
FBI Issues Alert on AI-Driven Impersonation Tactics Targeting Senior Officials
The FBI has issued a warning regarding an ongoing malicious campaign involving text and voice messages that impersonate high-ranking U.S. officials.

This campaign primarily targets current and former federal…