TRUSTCRYPT
19 subscribers
741 photos
740 links
TrustCrypt – your go-to channel for the latest cybersecurity news, in-depth breach analyses, and practical tips to protect your data
https://trustcrypt.com/
Download Telegram
Malicious AI Video Generation Tools Target Facebook and LinkedIn Users for Malware Distribution
Cybercriminals are exploiting the increasing public interest in Artificial Intelligence (AI) by delivering malware through fraudulent text-to-video tools.

Recent findings by security researchers indicate that these criminals are creating…
1
Victoria’s Secret Suspends Website Operations Following Security Incident
Fashion retailer Victoria’s Secret has temporarily suspended its website and some in-store services in response to an ongoing security incident. The company operates around 1,380 retail locations across nearly…
1
Emerging Windows RAT Successfully Bypasses Detection Mechanisms for Extended Periods Through Manipulated DOS and PE Headers
Cybersecurity researchers have unveiled a sophisticated cyber attack deploying malware characterized by corrupted DOS and PE headers. These components are critical to the functioning of Windows PE files, which…
1
ConnectWise Confirms Cybersecurity Breach Impacting a Limited Number of Customers
ConnectWise, the developer of the remote access and support software ScreenConnect, has confirmed that it was targeted by a cyber-attack attributed to a nation-state threat actor.

In a statement,…
1
Potential Ransomware Attack Impacts Operations at Covenant Health Facilities in Maine and New Hampshire
A cyber incident impacting multiple hospitals in Maine is currently under investigation. Covenant Health reported connectivity issues affecting the organization, which became apparent on Monday. In response, the health…
1
Malicious Downloads of Impersonated ChatGPT and InVideo AI Distribute Ransomware
Cisco Talos has identified a new strain of malware, including CyberLock ransomware, Lucky_Gh0$t, and Numero, which are designed to disguise themselves as legitimate software and artificial intelligence tool installers.…
1
Investigation into Adult Websites for Non-Compliance with Minors’ Access Restrictions
Four adult websites are currently under investigation by the European Commission in accordance with the Digital Services Act (DSA) for purportedly inadequate age verification measures for their users.

The…
ConnectWise Suffers Cybersecurity Breach Attributed to Nation-State Hacking Group
ConnectWise, an IT management software provider, has reported a breach linked to a sophisticated cyberattack believed to be state-sponsored. The breach specifically targeted a limited number of customers using…
1
Malware-Laden Installers Disguised as Popular Tools Threaten AI User Security
Fake installers for widely-used artificial intelligence (AI) tools, including OpenAI ChatGPT and InVideo AI, are being exploited to spread a variety of threats, among which are CyberLock and Lucky_Gh0$t…
1
Emerging Browser Exploit Technique Erodes Phishing Detection Capabilities
A new browser-based phishing technique has emerged, complicating the detection of malicious websites according to recent cybersecurity research.

The method, known as Fullscreen Browser-in-the-Middle (BitM) attack, discovered by SquareX,…
1
ConnectWise Investigates Potential State-Sponsored Cyberattack Impacting ScreenConnect Clients
IT management software firm ConnectWise has identified a suspected state-sponsored cyberattack that has compromised its environment, impacting a limited number of ScreenConnect customers. The company reported that it recently…
1
Restore Control Over Your Browsing Experience—Malwarebytes Browser Guard Enhances Protection Against Search Hijacking Threats
Search hijacking, also known as browser hijacking, is a sophisticated tactic employed by cybercriminals to alter a user’s browser settings without permission. This malicious activity can lead users to…
1
Restore Control Over Your Browsing Experience—Malwarebytes Browser Guard Enhances Protection Against Search Hijacking Threats
Search hijacking, also known as browser hijacking, is a sophisticated tactic employed by cybercriminals to alter a user’s browser settings without permission. This malicious activity can lead users to…
1
Mozilla Announces Update 139.0.1 for Firefox to Address Artifacts on Nvidia GPU Systems
Mozilla has announced the release of Firefox version 139.0.1, addressing graphical artifact issues that occurred after the previous release on May 27. This update was necessitated by user reports…
1👍1🔥1
China-Linked Threat Actors Target SAP and SQL Server Vulnerabilities in Operations Across Asia and Brazil
The recent exploitation of a critical security vulnerability in SAP NetWeaver has been linked to a state-sponsored threat actor based in China, which has extended its attack campaign to…
1
FBI Identifies Philippine Technology Firm as Key Player in Cryptocurrency Scam Infrastructure
The FBI has issued a warning regarding the activities of a Philippines-based company identified as Funnull Technology Inc. (Funnull), which is believed to operate an infrastructure that facilitates a…
1
Bradford Health Systems Identifies Unusual Network Activity; Issuance of Breach Notifications Initiated This Week.
Bradford Health Systems in Alabama has issued a security notice regarding an incident that has impacted employee and patient data. On December 8, 2023, Bradford Health identified unusual activity…
1
Threat Actor Allegedly Breaches TikTok, Puts 428 Million Records Up for Auction
A threat actor known as “Often9” has claimed to sell the personal records of 428 million TikTok users on a dark web forum. This significant data breach allegedly includes…
1👍1
Law Enforcement Disrupts AVCheck Platform Exploited by Cybercriminals for Malware Assessment
An international law enforcement operation has successfully dismantled AVCheck, a service utilized by cybercriminals for testing the detection capabilities of their malware against commercial antivirus solutions prior to its…