TRUSTCRYPT
19 subscribers
741 photos
740 links
TrustCrypt – your go-to channel for the latest cybersecurity news, in-depth breach analyses, and practical tips to protect your data
https://trustcrypt.com/
Download Telegram
Phishing Attempt Concealed in Deceptive DocuSign Email
On a routine security assessment, a phishing attempt was identified that employed a clever delivery mechanism. What appeared to be a standard DocuSign notification evolved into a sophisticated deception…
Scattered Spider Cyber Threat Actors Redirect Operations Towards Aviation and Transportation Industries
Threat actors associated with the “Scattered Spider” group have broadened their operational scope to encompass the aviation and transportation sectors, following prior assaults on insurance and retail industries.

Employing…
Exploitation of Over 1,000 SOHO Devices Linked to LapDogs Cyber Espionage Campaign with Chinese Ties
Threat hunters recently identified a substantial network of over 1,000 compromised small office and home office (SOHO) devices, which have been instrumental in supporting a long-running cyber espionage campaign…
Exploitation of CitrixBleed 2 Vulnerability
A critical vulnerability has been identified in Citrix NetScaler ADC and Gateway devices, echoing the notorious CitrixBleed flaw from 2023. This newly discovered issue, referred to as CitrixBleed 2,…
Security Advisory: Scattered Spider Expands Target List to Include North American Airline and Transportation Sectors
ALERT: Scattered Spider has expanded its target list to include North American airline and transportation organizations. Mandiant, a division of Google Cloud, has identified several incidents within the airline…
Experts Caution That Free VPN Services May Compromise US Data Security to Foreign Entities
The Tech Transparency Project has raised significant concerns regarding the presence of Chinese-owned VPNs, such as Turbo VPN and X-VPN, within the Apple and Google app stores. This situation…
Exploitation of Citrix Bleed 2 Vulnerability Confirmed in Ongoing Cyber Attacks
A critical vulnerability identified in the NetScaler ADC and Gateway, referred to as “Citrix Bleed 2” (CVE-2025-5777), is currently believed to be exploited in attacks. Reports from cybersecurity firm…
FBI Issues Alert Regarding Scattered Spider’s Increasing Threats to Airlines Through Social Engineering Tactics
The U.S. Federal Bureau of Investigation (FBI) has identified the cybercrime group Scattered Spider expanding its operations to the airline sector. As part of its response, the FBI is…
Texas Centers for Infectious Disease Associates Issues Data Breach Notification to Affected Individuals in 2024
Texas Centers for Infectious Disease Associates (TCIDA) has announced that it detected a network breach in July 2024, with initial signs of the intrusion observed on July 19. Following…
Qilin Ransomware Incident Impacting NHS Linked to Patient Fatalities in the UK
A recent ransomware attack attributed to the Qilin ransomware group has been directly linked to the unfortunate death of a patient. This incident, occurring in June 2024, severely disrupted…
New AI Tool from Facebook Requests Photo Uploads for Story Generation, Raising Privacy Issues
Facebook, a division of Meta Platforms, is seeking user participation by prompting them to upload images from their mobile devices. This initiative aims to utilize artificial intelligence (AI) for…
Allegations of Hacker Involvement in Compromising FBI Sources and Witnesses in El Chapo Investigation: Insights from Watchdog Report
A recent report from a Justice Department watchdog has uncovered significant breaches of surveillance and intimidation tactics employed by a hacker linked to the Sinaloa drug cartel. The individual…
Emergence of Malicious AI Models Driving a New Surge in Cybercrime, According to Cisco Talos
Cybercriminals are increasingly leveraging sophisticated artificial intelligence (AI) models to develop malware and craft phishing scams, as highlighted by recent findings from Cisco Talos. The emergence of uncensored and…
Battlefords Union Hospital Informs Patients of Unauthorized Access to Medical Records by Employee
Today’s reminder of the insider threat emerges from the Battlefords Union Hospitals located in Canada. Recent reports indicate that between October 1, 2024, and April 4, 2025, an operating…
Horizon Healthcare RCM Reports December Ransomware Incident
Attacks targeting revenue cycle management (RCM) and debt collection firms present significant risks, as these breaches can yield extensive personal and protected health information (PHI). Compromising a single billing…
Google Introduces Veo 3 Video Generation Tool – Explore Complimentary Access with Credit Allocation
Google has announced the rollout of Veo 3, an advanced video generation tool now available to all users of Vertex AI, Google Cloud’s machine learning testing platform.

Veo 3…
Former IT Employee Sentenced for Cyber Attack in Huddersfield
The West Yorkshire Police have issued an important reminder regarding the insider threat within organizations, emphasizing the critical need for timely termination of access and credentials prior to the…
Ahold Delhaize Acknowledges Data Breach Impacting 2.2 Million Records in Relation to Recent Ransomware Allegations
Grocery retailer Ahold Delhaize USA experienced a significant data breach impacting the personal information of more than 2.2 million employees. The breach has raised serious concerns regarding the security…
Weekly Security Report: June 23 – June 29
Last week, significant developments in cybersecurity were observed, highlighting various threats that users and organizations must be aware of.

- Cybercriminals have successfully bypassed Gmail’s multi-factor authentication, enabling targeted…
Vulnerabilities in Bluetooth Technology May Enable Unauthorized Audio Surveillance
Vulnerabilities in a widely used Bluetooth chipset have been identified, posing risks of eavesdropping and data theft. This chipset, found in over 29 audio devices from notable manufacturers such…