TRUSTCRYPT
19 subscribers
741 photos
740 links
TrustCrypt – your go-to channel for the latest cybersecurity news, in-depth breach analyses, and practical tips to protect your data
https://trustcrypt.com/
Download Telegram
Federal Authorities Conclude Operation Against BidenCash Carding Market and Its Cryptocurrency Revenues
After three years of operating as a major marketplace for illicitly obtained data, BidenCash, a notorious cybercrime platform, has been taken offline. Law enforcement agencies have conducted operations against…
Critical Chrome Vulnerability Mitigated: Urgent Update Recommended
Google has implemented an important update for the Chrome browser, addressing an actively exploited security vulnerability.

This update upgrades the Stable channel to versions 137.0.7151.68/.69 for Windows and Mac,…
Microsoft Launches Complimentary Cybersecurity Initiative for European Governments
Microsoft has introduced a new initiative, the European Security Program, aimed at enhancing cybersecurity for governmental entities across Europe. This initiative is an extension of Microsoft’s existing Government Security…
Severe Cisco ISE Authentication Bypass Vulnerability Affects Cloud Deployments on AWS, Azure, and OCI
Cisco has released critical security patches to address a significant vulnerability in the Identity Services Engine (ISE). If exploited, this flaw could enable unauthenticated attackers to perform malicious actions…
#Securing Endpoints Remains Crucial in the Face of Evolving Threats
Endpoint devices, including PCs, mobile phones, and connected IoT equipment, continue to present significant security risks. This challenge persists as cybercriminals enhance their focus on other areas of enterprise…
Impending Threat to the United States Power Grid
For several years, the cybersecurity community, along with regulatory bodies and governmental organizations, has issued persistent alerts regarding the potential repercussions of a malicious cyberattack on the United States…
ClickFix Security Advisory: Malicious Booking.com Emails Distributing Malware
Cofense Intelligence has identified a significant increase in ClickFix email scams that impersonate Booking.com. These malicious emails have been found to deliver Remote Access Trojans (RATs) and information-stealing malware.…
Germany Imposes $51 Million Penalty on Vodafone for Privacy and Security Violations
The German Federal Data Protection Authority (BfDI) has imposed a fine of €45 million (approximately $51.4 million) on Vodafone GmbH, the German subsidiary of the multinational telecommunications company, in…
Critical Vulnerabilities in Widely Used Chrome Extensions: Exposing API Keys and User Data Through HTTP and Hardcoded Credentials
Cybersecurity researchers have identified multiple popular Google Chrome extensions that transmit data using HTTP and contain hard-coded secrets within their code, thereby exposing users to significant privacy and security…
DNS Hijacking: A Significant Cybersecurity Threat to the UK Government
Cyber threat actors, including both nation-state and criminal groups, are increasingly hijacking internet domains to further their malicious agenda.

Nick Woodcraft, Service Owner for Vulnerability Monitoring at the UK…
New Evidence Establishes Connection Between Persistent Hacking Group and Indian Government
Researchers have identified new connections between the persistent threat actor known as Bitter and the Indian government. In a comprehensive two-part investigation published recently, security researchers from Proofpoint, a…
Data Breach: Unsecured Database Compromises Information of 3.6 Million Passion.io Creators
A significant data breach has compromised the personal information of over 3.6 million app developers, influencers, and entrepreneurs. This incident underscores the vulnerabilities present in data management systems and…
Access to Pornhub, RedTube, and YouPorn Restricted in France, Anticipated Surge in VPN Utilization
VPNs have gained significant traction in France, primarily due to the recent accessibility issues of major adult websites such as Pornhub, RedTube, and YouPorn. This surge in interest is…
Allegations of Exceptional Coding Capability Surround Google’s Upcoming Gemini Kingfall
Google continues to push the boundaries of artificial intelligence with the anticipated introduction of a new model, referred to as “Gemini Kingfall.” This development marks an assertive stride in…
Analysis of APT Tactics Evolution and Geographic Expansion
The threat actor identified as Bitter has been assessed as a state-sponsored hacking group tasked with intelligence gathering that aligns with the objectives of the Indian government. This assessment…
Ransomware Victims Encouraged to Actively Engage to Regain Control
Opening lines of communication with ransomware actors is crucial for achieving a favorable resolution during an incident that could significantly disrupt operations, according to Dan Saunders, Director of Incident…
Zaporizhzhia Cyber Police Uncovers Cybercriminal Responsible for Significant Financial Losses Through Cryptocurrency Mining Activities
A 35-year-old individual has been apprehended for unlawfully accessing over 5,000 customer accounts of a renowned global hosting provider to utilize the organization’s server resources for cryptocurrency mining. This…
Approximately 94 Billion Compromised Cookies Discovered on the Dark Web
Cybersecurity experts are sounding the alarm regarding a significant risk of data exposure following a recent investigation that unveiled an alarming prevalence of internet cookies in various online environments.…
Law Enforcement Apprehends 20 Individuals in Connection with Distribution of Child Sexual Abuse Material
Law enforcement agencies from more than a dozen countries have apprehended 20 individuals as part of a coordinated international effort aimed at combatting the production and distribution of child…
Enhancing User Empowerment and Safeguarding Against GenAI Data Loss
With the widespread availability of generative AI tools in late 2022, employees in various sectors quickly recognized the potential of these technologies to enhance productivity, streamline communication, and expedite…