North Korea–linked operators are actively using LinkedIn as a recruitment and access channel to infiltrate private companies worldwide. Instead of fake-looking profiles, these actors rely on real or convincingly impersonated professional identities, complete with verified work histories, endorsements, and long-term activity to build credibility. Their approach is patient and deliberate. They connect as software engineers, security researchers, or contractors, apply for remote roles, and gradually earn trust through technical discussions and collaboration offers. Once engaged, they aim to secure legitimate access to corporate systems such as internal repositories, cloud environments, VPNs, or development platforms. Investigations show that this is not…

Read More

Brussels, Europe —The European Commission has confirmed a cybersecurity incident involving its Mobile Device Management (MDM) system, resulting in the exposure of limited internal staff data. The breach has raised concerns about the security of enterprise mobility platforms used by large government institutions. What Happened According to official disclosures, unauthorized access was detected in a system used to manage and secure mobile devices issued to European Commission personnel. MDM platforms typically control device configurations, security policies, and access permissions for smartphones and tablets used for official work. Investigations revealed that certain staff-related information stored within the MDM environment was accessed…

Read More

A high-value cyber investment fraud has come to light in Aligarh, Uttar Pradesh, after a retired senior banker was cheated of over ₹1.10 crore in a fake stock market investment scheme that has now prompted police action across multiple states. The victim, Dinesh Kumar Sharma, a retired Deputy General Manager from Punjab National Bank, was approached in early November via a WhatsApp message urging him to invest in stocks promising unusually high returns. The link led him to what appeared to be a legitimate investment portal, and the fraudsters used persuasive messaging and fabricated profits to convince him to transfer…

Read More

Cybersecurity is a responsibility-driven profession that combines technology, critical thinking, discipline, and ethics.If this foundation is not clear, confusion follows later. First, a Reality Check (Important) Cybersecurity is not: Core Skills (Required for Every Role) Regardless of the domain, these skills are essential: Tools matter, but understanding matters more. Domain-Wise Skills (Role Specific) SOC Analyst (Blue Team) Best suited for: beginners and analytical thinkers VAPT / Ethical Hacking Best suited for: curious problem-solvers Cloud Security Best suited for: cloud and DevOps-oriented roles GRC (Governance, Risk, Compliance) Best suited for: documentation and decision-making roles Incident Response / DFIR Best suited for:…

Read More

A ransomware attack has disrupted operations at BridgePay Network Solutions, a U.S.-based payment processing platform used by merchants, local governments, and service providers across the country. The incident caused a widespread outage, preventing businesses from processing card payments and accessing key transaction systems. The disruption began when multiple BridgePay services suddenly went offline, including payment gateways, hosted checkout pages, reporting dashboards, and merchant management portals. As the outage continued, the company confirmed that the cause was a cybersecurity incident involving ransomware. According to BridgePay, the attack resulted in system encryption, not a routine technical failure. The company stated that it…

Read More

In recent days, multiple websites, social media posts, and shared links have claimed to provide access to so-called “Epstein Files” or “Epstein Emails.” Some of these claims specifically reference domains such as email.epstein, presenting them as official or government-released sources. These claims are false and unverified. From a cybersecurity and information-integrity perspective, the spread of such links represents a growing risk, as trending global topics are increasingly used to distribute misinformation, phishing content, and malicious files. What Is Actually Verified All legitimate information related to the case involving Jeffrey Epstein exists only through formal legal and government channels. There has…

Read More

In recent days, the phrase “Korean Love Game” has drawn national attention after being linked to multiple disturbing online incidents, including a case under investigation in Ghaziabad, Uttar Pradesh. Despite the name, officials and cybercrime experts have clarified that there is no officially recognised game or mobile application called “Korean Love Game.” The term is being used to describe a pattern of online interaction involving emotional manipulation, role-play, and task-based influence that takes place through private digital channels, not public gaming platforms. What Is the “Korean Love Game”? The so-called Korean Love Game is not a downloadable app, not a…

Read More

Seoul, South Korea:Coupang has confirmed that personal data of around 165,000 users was exposed in a security incident, expanding the scope of an earlier disclosed breach. The company said the additional affected users were identified during a follow-up internal investigation. According to Coupang, the exposed information includes customer names, phone numbers, and delivery addresses. The company clarified that passwords, payment details, and financial information were not compromised. Coupang stated that the incident involved unauthorized access to internal systems, after which further analysis revealed the wider data exposure. Following the discovery, the company began notifying affected users and took steps to…

Read More

Maryland, United States:A major cybercrime investigation in Maryland has uncovered a large-scale international fraud operation linked to three call centres operating from India, with financial losses estimated to exceed ₹400 crore. U.S. authorities say the case highlights how organized cyber fraud networks are exploiting trust, fear, and technology to target victims across borders. The investigation began after a Maryland resident reported losing a massive sum in what initially appeared to be an isolated tech-support scam. As investigators dug deeper, they found a pattern connecting hundreds of similar complaints to the same overseas operation. How the Fraud Operation Worked According to…

Read More

Cybercriminals in India carefully choose file names that feel routine and believable. These files are designed to match what people commonly receive during different situations and seasons. During the wedding season, many people receive files named like Marriage Invitation.pdf, Wedding Card.jpg, or Marriage Video.mp4. Since such files are frequently shared on WhatsApp and email, users often open them without verification. Another widely misused theme is RTO and traffic-related messages. Files arrive with names such as RTO Challan.pdf, Traffic Fine Notice.docx, or Vehicle Penalty Details.html. Because traffic challans are common and sometimes urgent, people tend to open these files quickly out…

Read More