TRUSTCRYPT
19 subscribers
741 photos
740 links
TrustCrypt – your go-to channel for the latest cybersecurity news, in-depth breach analyses, and practical tips to protect your data
https://trustcrypt.com/
Download Telegram
Exploitation of Ivanti EPMM Vulnerabilities by Chinese Cyber Actors in Global Enterprise Network Intrusions
A recently addressed pair of security vulnerabilities within Ivanti Endpoint Manager Mobile (EPMM) software has been exploited by a China-based threat actor targeting various sectors across Europe, North America,…
FTC Concludes Mandate for GoDaddy to Enhance Security Protocols for Hosting Services
The U.S. Federal Trade Commission (FTC) has finalized an order that requires GoDaddy, a leading web hosting provider, to enhance the security of its services. This decision comes as…
Global Law Enforcement Agencies and Microsoft Disrupt Over 2,300 Lumma Stealer Domains
Microsoft has partnered with global law enforcement agencies to disrupt the infrastructure associated with one of the most prominent infostealer operations, Lumma Stealer. Between March 16 and May 16,…
Leak of VanHelsing Ransomware Builder Discovered on Cybersecurity Forum
The VanHelsing ransomware-as-a-service operation has recently made significant operational changes by releasing the source code for its affiliate panel, data leak blog, and Windows encryptor builder. This move follows…
Disruption of Lumma Information Stealer Infrastructure
The US Department of Justice (DOJ) and Microsoft have jointly disrupted the Lumma information stealer’s infrastructure. Lumma, also referred to as LummaC or LummaC2, has rapidly emerged since its…
Significant Vulnerability in Windows Server 2025 dMSA Poses Risk of Active Directory Compromise
A recently identified privilege escalation vulnerability in Windows Server 2025 poses significant risks to organizations utilizing Active Directory (AD). This flaw allows attackers to compromise any user account within…
Chinese Hackers Exploit Cityworks Zero-Day Vulnerability to Compromise U.S. Local Government Systems
Chinese-speaking cyber adversaries have successfully exploited a now-resolved zero-day vulnerability in Trimble Cityworks, affecting multiple local government entities across the United States.

Trimble Cityworks is a Geographic Information System…
Coinbase Data Breach Impacted Nearly 70,000 Customers
The recent breach at Coinbase has had significant implications, affecting approximately 70,000 customers. This alarming development was officially reported by the cryptocurrency exchange in a data breach notification submitted…
Opexus Breach Identified as Primary Catalyst in Significant Federal Data Compromise
This breach may not be the largest insider breach of 2025; however, it holds the potential to be one of the most significant in terms of impact. Reports indicate…
🥰1
Webinar: Developing a Robust and Legally Defensible Cybersecurity Program
It’s imperative that organizations not only ensure their cybersecurity measures are in place but also demonstrate their effectiveness within the current legal landscape. The complexities of cybersecurity now require…
Ivanti EPMM Vulnerability Exploited by Advanced Persistent Threat Actors to Compromise Government Entities
Chinese state-sponsored threat actors have been exploiting a significant remote code execution vulnerability within Ivanti Endpoint Manager Mobile (EPMM), affecting various governmental and high-profile organizations globally. The vulnerability, designated…
Kettering Health Cyber-Attack Causes Service Disruption
Kettering Health, a prominent healthcare provider in western Ohio, is currently managing the repercussions of a system-wide outage initiated by a recent cyber-attack. This incident has severely disrupted internal…
Understanding the Degradation of Image Quality in JPEG Resizing and Effective Solutions for Mitigation
Resizing images can often lead to unintended outcomes, such as blurriness or pixelation. When adjusting an image’s dimensions, it’s crucial to maintain its clarity and detail. This article explores…
Heightened Concerns for Domestic Abuse Survivors as Cybercriminals Anticipated to Disclose Confidential Addresses
Sensitive information pertaining to women and girls who have experienced domestic abuse may soon be compromised due to a data extortion event affecting the Legal Aid Agency of the…
Chinese Cyber Threat Actors Leverage Trimble Cityworks Vulnerability to Breach U.S. Government Networks
A threat actor identified as UAT-6382, operating with Chinese-language capabilities, has been connected to the exploitation of a recently addressed remote-code-execution vulnerability in Trimble Cityworks, specifically targeting…
Global Operation Leads to Arrest of 270 Dark Web Vendors and Buyers by Law Enforcement Agencies
Following a comprehensive global enforcement initiative, 270 individuals involved in dark web transactions have been apprehended as part of ‘Operation RapTor.’ This multinational crackdown involved collaboration among law enforcement…
AI-Generated TikTok Videos Deployed for Infostealer Malware Distribution
A recent malware campaign has exploited TikTok’s explosive popularity to distribute information-stealing malware, including variants such as Vidar and StealC. This endeavor represents a significant evolution in cyber threats,…
Significant Database Breach Exposes 184 Million Compromised Emails and Passwords Obtained via Infostealer Malware
A recent discovery by cybersecurity researcher Jeremiah Fowler has brought to light a misconfigured cloud server that exposed approximately 184 million login credentials. This significant data leak appears to…
Cybercriminals Deploy Counterfeit Ledger Applications to Exfiltrate Seed Phrases from macOS Users
Recent cybersecurity observations reveal that cybercriminals are employing counterfeit Ledger applications to exploit macOS users. These malicious programs are engineered to harvest seed phrases, which are crucial for accessing…
NCC Group Expert Urges UK Businesses to Brace for Upcoming Cybersecurity Legislation
Organizations in Europe are poised to encounter a surge of cybersecurity legislation from both the European Union and the United Kingdom.

In the EU, the legislative landscape is becoming…