TRUSTCRYPT
19 subscribers
741 photos
740 links
TrustCrypt – your go-to channel for the latest cybersecurity news, in-depth breach analyses, and practical tips to protect your data
https://trustcrypt.com/
Download Telegram
Hacklink Marketplace Drives Increase in Covert SEO Poisoning Attacks
A growing wave of SEO poisoning attacks is being driven by a black market platform known as Hacklink, which enables cybercriminals to hijack search engine rankings by injecting malicious…
Episource Alerts 5.4 Million Patients Regarding Cybersecurity Incident Occurring in January
Episource, LLC operates as a key business associate delivering innovative healthcare technology and solutions. The organization specializes in medical coding, risk adjustment, and data analytics tailored for health plans…
Scattered Spider Targets U.S. Insurers Following UK Retail Incident, Google Alerts
Scattered Spider has recently shifted its focus to U.S. insurance companies following previous attacks on retail sectors in the United Kingdom. This group employs social engineering techniques to exploit…
WhatsApp Initiates Targeted Advertising Strategies
WhatsApp has announced the introduction of targeted advertisements within the app, specifically appearing under the Updates tab. This new development follows the launch of the Updates tab a…
Paddle Agrees to $5 Million Settlement Regarding Involvement in Technology Support Fraud Schemes
Paddle.com and its American subsidiary have agreed to pay $5 million to the Federal Trade Commission (FTC) to resolve allegations that they enabled misleading tech-support schemes detrimental to numerous…
CISA Issues Alert on Ongoing Exploitation of Linux Kernel Privilege Escalation Vulnerability
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has included a significant security vulnerability affecting the Linux kernel in its Known Exploited Vulnerabilities (KEV) catalog, indicating active exploitation in…
Ransomware Group Qilin Provides Legal Support to Affiliates
The first half of 2025 has witnessed the decline and fall of multiple previously dominant ransomware groups such as LockBit, RansomHub, Everest, and BlackLock. This decline can be attributed…
Department of Justice Data Security Program: Essential Compliance Considerations for Affected Entities
On April 11, 2025, the Department of Justice’s National Security Division (NSD) released a Compliance Guide, an Implementation and Enforcement Policy, and a series of FAQs pertaining to its…
WormGPT Re-emerges Through Enhanced Grok and Mixtral Model Utilization
Cato CTRL has identified emerging WormGPT variants circulating on Telegram, which are powered by unauthorized adaptations of advanced language models, specifically Grok and Mixtral. This research sheds light on…
Fraudulent Bank Advertisements on Instagram Expose Victims to Financial Scams
Fraudulent advertisements on Instagram, including deepfake videos, are impersonating reputable financial institutions such as Bank of Montreal (BMO) and EQ Bank (Equitable Bank) to deceive consumers. These scams utilize…
Microsoft 365 Implements Default Restrictions on File Access Through Legacy Authentication Protocols
Microsoft has announced updates to security defaults for all Microsoft 365 tenants, set to take effect in July 2025, which will disable access to SharePoint, OneDrive, and Office files…
Emerging Malware Campaign Leverages Cloudflare Tunnels for RAT Deployment Through Phishing Strategies
A recent campaign, designated as SERPENTINE#CLOUD by Securonix, exploits Cloudflare Tunnel subdomains to distribute malicious payloads via phishing emails that contain harmful attachments. This attack vector utilizes Cloudflare’s…
Critical Linux Vulnerabilities Identified Enabling Root Access Exploitation
Two new vulnerabilities have been identified in widely used Linux components, posing significant risks by enabling unprivileged users to gain root access across various popular distributions.

The first vulnerability,…
Tallahassee Memorial Healthcare Acknowledges Impact from Cerner/Legacy Oracle Cybersecurity Incident
Tallahassee Memorial Healthcare (TMH) has announced updates related to a cybersecurity incident that occurred earlier this year. A spokesperson confirmed that TMH was recently informed of a cybersecurity breach…
Top 5 Online Environments Posing Significant Scam Risks
Scammers are increasingly leveraging smartphones as a primary means of reaching potential victims. They deploy various deceptive tactics, including sending fraudulent tracking links for nonexistent packages, expressing insincere love…
Pro-Israel Cyber Operatives Compromise Iran’s Nobitex Exchange, Resulting in $90 Million Cryptocurrency Loss
The hacking group known as “Predatory Sparrow,” which is associated with pro-Israel motivations, has reportedly executed a significant cyber operation against Nobitex, Iran’s leading cryptocurrency exchange. The group claims…
Critical Linux Vulnerabilities Allow Full Root Access Through PAM and Udisks in Major Distributions
Cybersecurity researchers have identified two significant local privilege escalation (LPE) vulnerabilities that could potentially allow unauthorized access to root privileges on major Linux distributions.

The vulnerabilities, discovered by Qualys,…
AI Now Constitutes the Predominant Source of Spam and Malicious Emails
Over half (51%) of malicious and spam emails are now generated using AI tools, according to a study conducted by Barracuda in collaboration with researchers from Columbia University and…
Geisinger Cyber Incident: Suspected Hacker to Represent Themselves in Legal Proceedings.
The individual facing allegations of illegally downloading protected information belonging to over 1.2 million patients of the Geisinger Health System in 2023 has opted to represent himself during his…