What's Hot
Author: Zeel_Cyberexpert
Across India, cybercrime investigations have revealed a serious and growing issue — individuals allowing others to use their bank accounts for a small commission. Many believe it is harmless or temporary. In reality, it can result in account freezes, police investigation, and even criminal charges. This article explains the full process — how it happens, why accounts are frozen, what “lien” and “hold” mean, and what legal risks are involved. How the Scam Usually Starts Most cases begin with: The person is told: In many cases, the funds originate from: Sometimes the money even comes from foreign accounts before being…
Google’s Threat Intelligence Group (GTIG), in collaboration with Mandiant and other industry partners, has successfully disrupted a large-scale cyber espionage campaign that targeted government institutions and telecommunications providers across the globe. The campaign has been attributed to UNC2814, a highly persistent threat group that has been active since at least 2017. Security researchers believe the group operates in alignment with strategic intelligence-gathering objectives linked to the People’s Republic of China (PRC). According to Google’s findings, the operation impacted 53 confirmed victims across 42 countries, spanning four continents, making it one of the more extensive espionage campaigns observed in recent years.…
The Ahmedabad Cyber Crime Branch has uncovered a major stock market investment fraud worth ₹1.54 crore, exposing a network linked to a Chinese cyber fraud gang. The investigation revealed the direct involvement of bank officials, including branch managers of a reputed private bank. Police have arrested five accused in connection with the case. How the Fraud Was Executed According to police officials, the fraud began in December 2025. The victim was added to a WhatsApp group named “91 BARCLAYS – Stock Market Pioneer”, where members were lured with promises of high returns through IPOs and stock market investments. The victim…
Cybersecurity researchers have identified a sophisticated cyberattack attempt targeting a globally deployed enterprise network firewall, allegedly linked to a Russian-speaking threat actor.The incident has gained attention due to the suspected use of artificial intelligence (AI)–assisted techniques to enhance reconnaissance and exploitation efforts. What Was Observed According to threat intelligence observations, the attacker focused on a firewall solution that is widely used across corporate networks, cloud environments, and data centers worldwide.Researchers detected automated scanning activity and adaptive attack behavior, suggesting the use of advanced tooling rather than traditional manual techniques. At this stage, no confirmed large-scale data breach or mass compromise…
Murshidabad, West Bengal:West Bengal Police’s Special Task Force (STF) has arrested two men from Murshidabad district in connection with an alleged OTP trafficking scam that may have links to Pakistan-based operators. The arrests come after a sustained investigation revealed that the accused shared WhatsApp verification OTPs of Indian SIM cards with handlers abroad in exchange for money. According to police officials, the suspects — identified as Juhab Sheikh and Suman Sheikh, both residents of Gudhia in Murshidabad — reportedly procured SIM cards using identity documents and created WhatsApp accounts. They then sent the one-time verification codes (OTPs) generated during account…
New Delhi | Mann Ki Baat – Episode 131 Prime Minister Narendra Modi addressed the nation in the 131st episode of ‘Mann Ki Baat’, where he spoke about Artificial Intelligence (AI), India’s growing global role in technology, and rising cybercrime threats such as digital arrest scams. During his address, PM Modi referred to the AI Summit held in New Delhi, calling it the largest AI summit ever hosted in modern India. He said the summit witnessed participation from global delegates who closely observed India’s rapidly advancing AI capabilities. The Prime Minister highlighted that international guests were especially impressed by how…
The Biggest Beginner Mistake in Cybersecurity Today, cybersecurity is one of the most popular career choices. Social media reels, movies, and web series often show hacking as something flashy—one click, green screens, fast typing, and instant access.Because of this, many beginners believe that real hacking means only running tools. This is where the biggest mistake begins. Most beginners skip Linux basics and jump directly to hacking tools. This approach creates confusion, weak skills, and false confidence. Why Social Media & Movies Create Wrong Expectations What you see in movies or reels is not real hacking. In reality: Movies focus on…
India has taken a significant step toward strengthening its cybersecurity ecosystem as Bharti Airtel partnered with global cloud security company Zscaler to launch an AI-powered Cyber Threat Research Center in the country.The initiative aims to enhance India’s ability to detect, analyze, and respond to advanced cyber threats targeting critical infrastructure. The research center will focus on using artificial intelligence and advanced analytics to study emerging cyber risks, including sophisticated malware, ransomware, phishing campaigns, and attacks on cloud and enterprise networks. With cyberattacks becoming more complex and frequent, the collaboration is expected to improve real-time threat intelligence and proactive defense strategies.…
Adidas is investigating a potential data breach after threat actors claimed to have accessed approximately 815,000 user records, allegedly obtained through a third-party licensing partner. The incident has renewed concerns around supply-chain security and the growing risks posed by external vendor access in large enterprises. According to multiple cybersecurity reports, the exposed data may include user account information such as email addresses, usernames, and other related metadata. At this stage, there is no public confirmation that financial details were compromised, but the investigation remains ongoing. What Is Known So Far The breach claim surfaced on underground forums, where attackers posted…
A newly identified Linux malware variant has been discovered in the wild, designed to secretly communicate with its operators through encrypted command-and-control (C2) traffic, significantly increasing the difficulty of detection and analysis. Security researchers confirmed that this updated malware variant is an evolution of a previously known Linux threat, but with enhanced stealth capabilities, specifically focused on hiding its C2 communications within encrypted network traffic. This allows attackers to maintain long-term access to compromised systems without triggering traditional security alerts. How the malware operates Once deployed on a Linux system, the malware establishes persistence and begins communicating with a remote…