What's Hot
₹11 Lakh Insurance Scam in Surat: Cyber Police Probe Fraud Using Forged Documents and Fake Officials
A fresh case of cyber fraud has emerged from Surat, where a 62-year-old woman was allegedly cheated out of ₹11.03 lakh through a well-orchestrated insurance scam involving forged documents and impersonation of officials. The incident highlights the growing sophistication of financial frauds targeting individuals through social engineering and misuse of personal data. According to the complaint filed with cybercrime authorities, the victim had been holding an insurance policy since 2018 and was regularly paying her premiums without any issues. The situation took a turn in 2021 when she received a phone call from an individual claiming to represent an insurance…
As organizations continue to shift their operations to the cloud, cybersecurity experts are warning of a sharp increase in attacks targeting cloud accounts and infrastructure. Recent investigations and threat intelligence reports indicate that attackers are actively exploiting weak configurations, stolen credentials, and session hijacking techniques to gain unauthorized access to cloud environments. Cloud platforms such as Microsoft 365, AWS, and Google Cloud have become prime targets due to their widespread adoption across businesses, startups, and government organizations. While these platforms offer strong built-in security features, misconfigurations and poor access management practices are creating opportunities for attackers. One of the most…
In a significant international law enforcement operation, authorities from the United States and Indonesia have successfully dismantled a large-scale phishing network responsible for facilitating fraud attempts exceeding $20 million. The coordinated action highlights the growing sophistication of cybercrime ecosystems and the increasing need for cross-border collaboration to combat digital threats. The investigation uncovered a highly organized operation built around a phishing toolkit that enabled cybercriminals to compromise user accounts on a global scale. Unlike traditional phishing campaigns, this network operated as a structured service, providing tools, infrastructure, and support to individuals seeking to carry out credential theft and financial fraud.…
In a major breakthrough against organized cybercrime, Delhi Police have dismantled a sophisticated mule account network operating across the Delhi-NCR region, arresting 14 individuals involved in facilitating large-scale financial fraud. The operation highlights the growing role of mule accounts as a backbone for modern cybercriminal activities, including investment scams and fake job rackets. The arrests were made following a detailed financial and technical investigation into suspicious banking transactions linked to multiple fraud complaints. Authorities identified a pattern of fund movement across several bank accounts, which ultimately led them to uncover a coordinated syndicate providing essential infrastructure to cybercriminals. According to…
A new feature in Google Pay, often referred to as “Pocket Money” or “UPI Circle,” has recently triggered concern among users in India. Several posts circulating on social media claim that the feature is linked to unauthorized transactions or unexpected deductions. These claims have led to confusion, with some users calling it a potential scam. However, a closer look shows that the issue is less about fraud and more about misunderstanding how the feature works. What is the “Pocket Money” Feature? The feature is part of Google Pay’s effort to expand controlled payment access within families or trusted groups. It…
Artificial intelligence has quickly become part of everyday life. People now use it to write emails, solve problems, analyze images, and even make personal decisions. It is fast, convenient, and often very helpful. But with this growing dependence, one important question is often ignored — what happens to the information we share with these systems? In many cases, users are unknowingly sharing sensitive details such as personal data, login information, or confidential documents. Understanding how to use AI safely is now just as important as understanding how to use the internet securely. Why People Are Sharing More Data with AI…
Microsoft has issued a warning about an ongoing large-scale phishing campaign that is compromising hundreds of organizations every day. The campaign uses advanced automation and artificial intelligence to target corporate email accounts, particularly those running on Microsoft 365. According to Microsoft’s security research team, the activity has been active since mid-March 2026 and continues to evolve, with attackers launching multiple campaigns daily. The scale and sophistication of the operation have raised concerns across the cybersecurity community. Daily Campaigns Targeting Organizations Globally Security researchers report that between 10 and 15 phishing campaigns are being launched every 24 hours, each targeting hundreds…
Cybersecurity agencies in the United Kingdom have issued a warning over an ongoing campaign linked to Russian state-aligned threat actors targeting internet routers. The activity is believed to be part of a broader espionage effort aimed at gaining persistent access to networks used by both individuals and organizations. Officials have described the campaign as a significant risk, particularly because routers serve as the primary gateway to internet-connected systems, making them a valuable entry point for attackers. Targeting Network Infrastructure The campaign focuses on compromising internet routers, including devices used in homes, small businesses, and enterprise environments. By gaining control of…
Artificial intelligence company Anthropic has introduced a new AI model, Claude Mythos Preview, while deliberately restricting its public release due to concerns over its cybersecurity capabilities. The company has positioned the model as both a powerful tool for identifying software vulnerabilities and a potential indicator of evolving cyber risks. The announcement reflects a growing tension within the AI industry between rapid technological advancement and the need to manage emerging security risks. Restricted Access and Industry Collaboration Rather than releasing the model broadly, Anthropic has opted to provide access through a controlled industry initiative known as Project Glasswing. The program includes…
Iran sustained cyber campaign is emerging as a major global cybersecurity concern, as a new report from the Center for Strategic and International Studies (CSIS) highlights a clear shift in Iran’s cyber strategy. The analysis indicates that Iran is no longer relying on isolated or short-term cyberattacks, but is instead adopting a sustained and structured approach targeting critical infrastructure sectors. This development reflects a broader transformation in cyber warfare, where nation-states increasingly use digital operations as a strategic tool alongside traditional military capabilities. Iran Sustained Cyber Campaign Explained The CSIS report explains that Iran sustained cyber campaign is focused on…