TRUSTCRYPT
19 subscribers
741 photos
740 links
TrustCrypt – your go-to channel for the latest cybersecurity news, in-depth breach analyses, and practical tips to protect your data
https://trustcrypt.com/
Download Telegram
Deceptive AI Solutions Promote New Noodlephile Stealer via Facebook Advertising

Scammers are leveraging counterfeit artificial intelligence tools and Facebook advertisements to disseminate Noodlophile Stealer malware, specifically targeting users through deception and manipulation techniques.

This malware is designed to extract sensitive data from compromised devices, posing a significant threat to individual and organizational security. The tactics employed by these threat actors typically involve the creation of…

https://trustcrypt.com/deceptive-ai-solutions-promote-new-noodlephile-stealer-via-facebook-advertising/
Nova Scotia Power Experiences Cyberattack Targeting Critical Infrastructure; No Service Disruptions Reported

Nova Scotia Power Cyberattack: A Closer Examination

Recent reports indicate that Nova Scotia Power and its parent organization, Emera, are actively working to mitigate the repercussions of a cyberattack that compromised critical IT infrastructure. Fortunately, the physical operations of the utility remain intact, emphasizing the importance of robust cybersecurity measures in safeguarding essential services.

The…

https://trustcrypt.com/nova-scotia-power-experiences-cyberattack-targeting-critical-infrastructure-no-service-disruptions-reported/
Rethinking Password Security in the Era of Artificial Intelligence: Exploring Alternative Solutions

For decades, passwords have served as the primary method for securing online accounts. However, in the era of artificial intelligence, this traditional security mechanism faces challenges that it was never designed to withstand.

A recent study conducted on over 19 billion newly exposed passwords highlights a pervasive epidemic of weak password reuse. Despite ongoing efforts…

https://trustcrypt.com/rethinking-password-security-in-the-era-of-artificial-intelligence-exploring-alternative-solutions/
Russian Collective Unveils LOSTKEYS Malware in Cyber Offensive – Infosecurity Magazine
A new malware threat named LOSTKEYS has been identified by Google’s Threat Intelligence Group (GTIG) as part of a series of cyber-attacks linked to COLDRIVER, a group associated with the…
Abuse of Kickidler Employee Monitoring Software in Ransomware Incidents
Kickidler Employee Monitoring Software Misused in Ransomware Operations

Ransomware groups have increasingly repurposed legitimate Kickidler employee monitoring software for malicious activities, including reconnaissance, tracking victim activities, and credential harvesting following…
Security Breach: Compromise of LockBit Dark Web Domains Results in Data and Wallet Leak
LockBit Dark Web Domains Compromised: Internal Data and Bitcoin Wallets Exposed

In a significant breach, the dark web domains associated with the LockBit ransomware group have been compromised. This incident…
LockBit Ransomware Breach Uncovered: Insider Insights Revealed – Infosecurity Magazine
LockBit, one of the most notorious and prolific cybercrime groups, has recently been compromised, resulting in a significant breach of insider information that has been acquired by law enforcement…
Insight Partners Confirms Data Breach Involving Investor Information
Insight Partners Confirms Data Breach Involving Sensitive Investor Information

Venture capital firm Insight Partners has disclosed that sensitive employee and limited partner data was compromised during a cyberattack that…
Google Associates Newly Discovered LostKeys Data Theft Malware with Russian Cyber Espionage Actors
Google Associates New LostKeys Malware with Russian Cyber Espionage

Since the beginning of 2025, the Russian state-backed ColdRiver hacking group has employed the newly identified LostKeys malware to conduct…
Over 38,000 FreeDrain Subdomains Identified Engaging in SEO Exploitation for Crypto Wallet Seed Phrase Theft
Cybersecurity researchers have revealed an extensive global cryptocurrency phishing operation known as FreeDrain, which has been exploiting digital assets from cryptocurrency wallets over several years. The campaign…
Leak of 60,000 BTC Wallets Associated with LockBit Ransomware Collective
In a striking turn of events, a recent breach has led to the public exposure of approximately 60,000 Bitcoin wallet addresses associated with the notorious LockBit ransomware group, which…
UK Legal Aid Agency Experiences Cybersecurity Incident
The Ministry of Justice (MoJ) has initiated an investigation into a data breach, collaborating closely with the National Crime Agency (NCA) and the National Cyber Security Centre (NCSC). This…
Impersonation of Payroll, HR, and Benefits Platforms by Cyber Criminals: A Growing Threat to Data and Financial Security
The ongoing struggle against online fraud is an ever-evolving challenge, characterized by a continuous adaptation between security teams and threat actors. The sophistication of these attacks increasingly blurs the…
Malicious PyPi Package Conceals RAT Malware Targeting Discord Developers Since 2022
A malicious Python package designed to target Discord developers with remote access trojan (RAT) malware has been discovered on the Python Package Index (PyPI) after being active for over…
Decline in UK Cyber Essentials Certification Numbers – Infosecurity Magazine
Over a decade after the establishment of the UK’s Cyber Essentials scheme, the government recognizes that the current number of certified UK organizations falls significantly short of expectations. Approximately…
Maximizing Control Effectiveness: The Key to Comprehensive Security Beyond Tools Alone
Recent surveys reveal that a significant 61% of cybersecurity leaders have experienced breaches due to poorly configured security controls within the past year, despite the deployment of an average…
1
Google Deploys On-Device AI Security Measures to Identify Scams in Chrome and Android Platforms
Google has announced the rollout of new artificial intelligence (AI)-powered measures designed to combat scams across its platforms, specifically Chrome, Search, and Android. The company will utilize Gemini Nano,…
Cisco Addresses Critical IOS XE Vulnerability Allowing Potential Device Hijacking
Cisco has addressed a high-severity vulnerability in IOS XE Software affecting Wireless LAN Controllers. This flaw, identified as CVE-2025-20188, involves a hard-coded JSON Web Token (JWT) which enables unauthenticated…
FBI Issues Warning Regarding Malicious Services Aiming at Outdated Router Systems
Edge devices, particularly routers that no longer receive security updates, have become prime targets for cyber threat actors. Recently, reports from law enforcement have indicated that known vulnerabilities in…
PowerSchool Pays Ransom; Cybercriminals Shift Focus to Educators for Additional Exploitation
In response to a significant data breach, PowerSchool has opted to meet the demands of ransomware perpetrators. This decision has resulted in heightened scrutiny concerning the security protocols of…