In the past few months, many people have started receiving messages on Telegram offering simple online tasks with daily earnings. At first glance, these offers look harmless—“like a video,” “subscribe to a channel,” or “send a screenshot and earn ₹100–₹500.” But behind this simple setup is a carefully planned scam that has already trapped thousands of users. This is not just another online fraud. It is a trust-building scam, where criminals slowly gain your confidence before taking your money. How the Scam Actually Works It usually starts with a random message from an unknown person on Telegram. The profile may…

Read More

The ongoing investigation into the ₹590 crore bank fraud linked to AU Small Finance Bank has taken a significant turn, with former regional head Arun Sharma now emerging as a key figure in the case. Authorities allege that Sharma received approximately ₹10 crore in exchange for facilitating fraudulent activities connected to the wider network. According to submissions made by investigating agencies before the court, Sharma is suspected of playing an active role in enabling the fraud by leveraging his position within the bank. Officials claim that his knowledge of internal banking systems and procedures was used to bypass standard checks…

Read More

Pune has reported a concerning case of cyber fraud where a senior citizen was duped of ₹3.10 lakh while attempting to purchase an electric stove online. The incident, which occurred in the Kothrud area, highlights how cybercriminals are exploiting the ongoing gas shortage to target unsuspecting individuals. With a noticeable shortage of LPG cylinders in several cities, including Mumbai and Pune, many households have begun searching for alternative cooking solutions. Electric stoves have emerged as a popular option, leading to a surge in online searches and purchases. Cybercriminals appear to have taken advantage of this demand by posting deceptive advertisements…

Read More

In a serious cybersecurity alert issued on March 21, 2026, the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) warned about an ongoing phishing campaign targeting users of popular messaging applications like Signal and WhatsApp. The campaign is believed to be linked to threat actors associated with Russian intelligence services and has already resulted in the compromise of thousands of accounts worldwide. Unlike traditional cyberattacks that exploit software vulnerabilities, this campaign relies entirely on social engineering techniques. Instead of breaking encryption or hacking the platform itself, attackers manipulate users into giving away access to their…

Read More

Apple has issued an urgent security warning to iPhone users worldwide, advising them to update their devices immediately after the discovery of advanced hacking tools targeting older iOS versions. Security researchers have identified two powerful exploit frameworks, known as DarkSword and Coruna, which are capable of gaining deep remote access to vulnerable devices. Critical Vulnerabilities Targeting Outdated iOS According to cybersecurity findings, these tools are designed to bypass standard security protections and allow attackers to access sensitive information stored on a device. This includes personal messages, call history, browser activity, saved passwords, and even location data. In more advanced cases,…

Read More

A sophisticated phishing operation has been identified targeting a senior executive at Outpost24, a Sweden-based cybersecurity firm. The campaign stands out for its structured, multi-stage design and its use of globally trusted brands such as Cisco, JPMorgan Chase, and Microsoft to increase credibility and bypass conventional security controls. The attack began with a carefully crafted email presented as part of an existing conversation, reducing suspicion and encouraging engagement. The message appeared to originate from JPMorgan and contained a document review link. Rather than directing the target immediately to a malicious page, the link initiated a multi-layered redirection chain designed to…

Read More

The United Kingdom has introduced stricter cybersecurity reporting rules for financial institutions following a sharp rise in cyber incidents and system disruptions. The new requirements have been confirmed by the Financial Conduct Authority (FCA) in coordination with the Bank of England and the Prudential Regulation Authority (PRA), aiming to strengthen the resilience of the country’s financial ecosystem. The updated framework requires firms to identify, classify, and report significant operational incidents, including those caused by third-party service providers such as cloud platforms, IT vendors, and infrastructure partners. This move comes after regulators observed that more than 40% of cyber incidents reported…

Read More

AI voice scams, also known as deepfake voice fraud, have become one of the fastest-growing cyber threats in 2026. With the help of artificial intelligence, attackers can now replicate a person’s voice with surprising accuracy and use it to manipulate victims into transferring money or revealing sensitive information. Unlike traditional scams, this method relies on trust, familiarity, and urgency, making it significantly more effective and harder to detect. This threat is no longer limited to a specific country. Cases are being reported globally, including India, the United States, and Europe, where individuals, employees, and even business owners have been targeted…

Read More

A significant cyberattack has disrupted the internal systems of Stryker, one of the largest medical technology companies in the United States. Security officials and cybersecurity analysts believe the incident may be linked to hackers associated with Iran, raising concerns about the increasing use of cyber operations in geopolitical conflicts. According to reports, the breach caused widespread disruption across Stryker’s global digital infrastructure, forcing thousands of employees to disconnect their devices from company networks while cybersecurity teams worked to isolate and contain the attack. The disruption affected internal systems and operational processes, though investigations are still ongoing to determine the full…

Read More

Cybersecurity today is not only about protecting networks and devices. Most modern attacks target web applications — websites, APIs, cloud platforms, and online services used daily by businesses and governments. Because web applications handle sensitive data such as user accounts, financial information, health records, and government services, they have become a major target for attackers. To help organizations understand and prevent the most common web security risks, the cybersecurity community widely relies on OWASP Top 10. This list is considered one of the most important security standards in the world. It is used by security professionals, companies, and government projects…

Read More