Achive.php thecybershark, Author at The Cyber Shark - Page 5 of 19

Massive Facebook Data Leak Exposes 1.2 Billion User Records, Hacker Claims

Facebook Data

Facebook Data: A hacker claims to have leaked data from 1.2 billion Facebook users, including emails, phone numbers, and more. Researchers verified part of the sample, raising concerns about Meta’s data security and ongoing scraping issues. In response to Cyber News, Facebook’s parent company, Meta, sent a brief message along with a link to a newsroom article from four years ago titled “How we combat scraping.” “This assertion is not new. A Meta representative stated, “We revealed this years ago and have since taken action to stop such events from occurring. Meanwhile, looked into a data sample that had information on 100,000 distinct Facebook user records that the attackers had added to the post. The data seems valid based on the contents of the sample rather than the entire dataset. The team claims that the dataset consists of: User IDs Names Email addresses Usernames Phone numbers Locations Birthdays Genders Researchers advise exercising caution regarding the veracity of the attacker’s claims regarding “1.2 billion Facebook user records,” despite the fact that they are remarkable. For starters, this is only the second post the attackers have ever made that contains alleged Facebook records that were scraped. Although the quantity was substantially smaller, data purportedly collected from Facebook was also included in another attacker’s post. Researchers speculated that after publishing one post, they were able to extract further data to reach 1.2 billion entries. The social networking site would flag another case of user data being scraped in bulk if the Facebook data scrape were verified. According to the team, this calls into doubt the company’s stance on the protection of consumers’ personal information. Recurring incidents indicate a tendency toward reactive security measures as opposed to proactive ones, especially when it comes to safeguarding critical yet publicly accessible data. Millions may be vulnerable to phishing, scams, identity theft, and long-term privacy problems due to the absence of more robust protections and transparency, the researchers stated. A dataset of that size can be used in a variety of ways by threat actors since it makes it simple for hackers to automate attacks, releasing hordes of bots that target each user in the dataset with minimal human intervention. Since malicious actors are aware that the email addresses in the dataset belong to Facebook members, they can utilise one of the several Facebook phishing methods to target Facebook users. Threat actors frequently try to use APIs for malicious ends. Attackers targeted Shopify, GoDaddy, Wix, and OpenAI’s APIs earlier this year. Actors with financial motivations frequently try to misuse the same method to gain access to cryptocurrency wallets. “A pattern of reactive rather than proactive security measures is evident in repeated incidents, especially when it comes to safeguarding sensitive but publicly visible data.” Since APIs enable communication between various services, the majority of well-known services would not be possible without them. Attackers, however, manage to leverage lawful APIs for malicious ends, such as retrieving significantly more data than the software applications were designed to do. Facebook data scraping is not unheard of. For instance, Meta acknowledged last year that it had used publicly available Facebook and Instagram data to train its AI virtual assistant. In 2021, however, a different hacker shared details about more than 500 million Facebook users, including locations and phone numbers. The Irish Data Protection Commission (DPC), the European Union’s top data privacy body, fined Meta €265 million ($266 million) for the leak.

Google Experiments with Gemini AI to Help Users Get Instant App Insights on the Play Store

Gemini AI

Gemini AI: Google is testing a new AI feature on the Play Store called “Ask Play about this app,” allowing users to ask app-related questions and receive answers powered by Gemini. Currently, the feature is available to a limited number of users and only for select popular apps. In the Play Store, Google has started testing a new AI-powered feature that allows customers can ask questions about apps and get replies from Google’s Gemini. A new “Ask Play about this app” section has been showing up for some users on the information pages of specific apps, even though the functionality has not been publicised. This suggests that it is presently undergoing restricted testing. The “Ask Play about this app” option on Google: What’s new? The feature adds a new section called “Ask Play about this app” to app listing pages. A text input form and some pre-made sample queries pertinent to the particular app being examined are included. Questions like “How do I change my username?” along with “What do people like most about this app?” To get answers, users can either tap on one of the suggested questions or enter their own. Answers show up right beneath the text area, and as the sample queries change dynamically depending on past exchanges, you can ask follow-up questions. With the help of this conversational interface, consumers should find it simpler to obtain comprehensive information without having to read through app descriptions or reviews. The feature is probably driven by one of Google’s Gemini AI models, as seen by the section’s notable Gemini star emblem. Only a small number of users seem to have access to the feature thus far. Business Standard evaluated three Android smartphones, but only one of them had the “Ask Play about this app” feature.  Additionally, it only appears for a select few popular apps, such as WhatsApp, Spotify, X (formerly Twitter), Uber, and a few others.

Meet the Teen “Cyberterrorist” Who, During Operation Sindoor, Waged a Digital War Against India

Cyberterrorist

Cyberterrorist: An 18-year-old from Gujarat was arrested for leading over 50 cyberattacks on Indian government websites during Operation Sindoor. Authorities suspect online radicalisation and possible foreign influence behind the coordinated digital assault. AHMEDABAD Jasim Shahnawaz Ansari, an 18-year-old from Nadiad, was detained by the Gujarat Anti-Terrorism Squad (ATS) for reportedly planning more than 50 assaults on Indian government websites, a development that has shocked the country’s cybersecurity scene. After India began Operation Sindoor in May 2025 as a military response after a terror incident in Pahalgam, the attacks allegedly became more intense. Officials claim that Ansari and other young people organised Distributed Denial of Service (DDoS) attacks using free tools obtained from websites such as GitHub and Termux in a group named AnonSec on Telegram. Among the targets were important government agencies in the fields of finance, urban development, aviation, and defence. On hacked websites, they frequently displayed anti-national statements such as “India may have started it, but we will be the ones to finish it.” Open-Source Weapons: A Cybercrime How-To According to investigators, the group learned Python programming and carried out attacks using open-source software and YouTube tutorials. Ansari allegedly overloaded government servers with digital traffic using programs like PyDroid. According to the ATS, the group boasted about their crimes in internet chat rooms after learning how to use websites like checkhost.net to confirm the effectiveness of their attacks. Even though many of the attacks were simple, intelligence services were alarmed by their sheer number and timing, which coincided with Operation Sindoor. After detecting discussion on online forums about India’s military operations, the Gujarat ATS began surveillance and monitoring. Eventually, they concentrated on the Telegram channels where attack plans were publicly discussed. Radicalisation, Recruitment, and the Juvenile Web Investigators have been taken aback not only by the attacks’ boldness but also by the target demographic. Ansari, a science student in class twelve who failed recent tests, is among an increasing number of young people engaged in cyber subversion. At least one further 17-year-old kid is being investigated, according to ATS officials. The ATS is currently investigating whether these kids acted on their initiative or with the support of foreign operators. “There is a chance that hostile outside forces could have an impact. A top ATS official stated, “We are looking at digital footprints to find any deeper affiliations.” Cyberterrorism-related FIRs have been submitted following Sections 43 and 66F of the IT Act. The arrest of a teenager responsible for such coordinated cyberattacks raises alarming concerns about online radicalisation, national resilience, and the ease with which the young and enraged can weaponise digital India is confronted with a complex threat matrix that includes both digital and physical fronts in its conflict.

OLX Fraud: The Hidden Threat in Online Bargains

OLX Fraud

OLX Fraud: OLX is one of the most popular websites to buy and sell used items. It is now the world’s most popular digital marketplace, with over 300 million users every month. However, fraud and scam incidents have increased along with its popularity. Cybercriminals deceive individuals into paying money by using fictitious postings and identities. The specifics of OLX scams are examined in this article, along with self-defence tips. OLX fraud: what is it? The term “OLX Fraud” describes a range of untrustworthy activities that happen on the OLX platform and related online classified sites, such as Click India and Quikr. The sale of fictitious goods like cars, bikes, furniture, and home electronics is the most prevalent scam.  This is how it usually goes: A scammer publishes a phoney advertisement offering a product at an oddly cheap cost. The advertisement makes use of photographs and descriptions that have been taken from real listings. The scammer explains the necessity to mail the items by claiming to be based in a foreign state or be a member of the army when a buyer contacts them. To start shipping, the con artist then asks for an upfront payment. The fraudster vanishes as soon as the money is transferred through internet banking or UPI. Due to the allure of a fantastic deal, many customers fall victim to these well-planned scams despite OLX’s cautions and notifications. Who Is Responsible for OLX Frauds? OLX frauds are usually committed by people or organisations using fictitious identities. They frequently: To gain trust, pretend to be army men. To seem legitimate, use stolen photos and phoney identification. Function beyond national or even global boundaries. To evade detection, these scammers frequently change their bank accounts and phone numbers. They occasionally participate in broader criminal networks that engage in a variety of cybercrimes. On the other hand, victims might be anyone from tech-savvy children to senior citizens, with an increasing number of incidents involving older people who are less knowledgeable about digital safety procedures. When Do Frauds on OLX Happen?  Although OLX frauds can occur at any time, they frequently increase during specific times: Holiday seasons, when bargains are sought after. Sales periods are at the end of the month or year. Lockdowns and pandemics, when it is less likely that physical verification will occur. Usually, the deception happens during a brief period of interaction. Scammers frequently create a sense of urgency by demanding cash and action right once. Where Do OLX Frauds Take Place? These frauds are not limited by geography. However, there is evidence that online shopping is more prevalent in urban areas. Major cities like Bengaluru, Mumbai, Delhi, Hyderabad, and Chennai are the places where cases are most commonly recorded. Internet classifieds sites like: Websites like Olx.com, Quikr.com, and Click India are commonly used by scammers, and fraud-related behaviour can migrate to social networking sites that advertise similar goods. What Leads to Fraud on OLX?  The primary reasons why OLX frauds occur so frequently are as follows: Lack of Awareness: Many consumers are unaware of how these scams operate. Simplicity of Anonymity: Scammers can easily build fake profiles. The Allure of a Bargain: Low prices inspire consumers to take quick action. Lack of Regulations: Online classified ads are not heavily regulated. Delayed Legal Action: It may be challenging to find and capture internet offenders. As cybercrimes get more sophisticated, users need to be better equipped with knowledge and defence tools. How Can OLX Fraud Be Spotted and Avoided? The following are a few warning signs and precautions: Warning Signs: Exceptionally affordable prices. The need to make an upfront payment. The seller states that they are stationed abroad or in the military. Asks for payment by QR codes, internet banking, or UPI. Refusal to allow product inspection or to meet in person.  Advice for Prevention: Always demand that the item be inspected before payment is made. Never divulge private banking information. Steer clear of transactions that call for scanning QR codes. Instead of using third-party messengers, use the OLX chat feature. Check for reviews and validate the seller’s profile. Where and How Can I Report Cyber Fraud?  Take these actions if you or someone you know has fallen victim to OLX fraud: Keep records on everything: Take screenshots of the product listing, the payment information, and the chat. Report to Cybercrime Authorities: To submit an online report, go to https://cybercrime.gov.in. For prompt assistance, dial the cybercrime helpline at 1930. Go to the police station or cybercrime cell that is closest to you. Use ISAC and T4C Assistance: Account freezing assistance is available from the Telangana Cyber Crimes Coordination Centre (T4C). To obtain immediate assistance, utilise the ISAC Cop Connect App. Real Case Example A Bengaluru man lost more than Rs. 2 lakh in an OLX QR code fraud in September 2024. The scammer pretended to be a buyer and deceived the victim into scanning a QR code to obtain money instead of sending it. Rather, money was taken out of the victim’s account. This example is a clear warning that cunning tactics can fool even tech-savvy people. About OLX: Company Overview Full Name:                Online exchange Founded:                  2006 Headquarters:          Amsterdam, Netherlands Founders:                 Alec Oxenford and Fabrice Grinda Parent Company:     Prosus (a division of Naspers) CEO (India):             Amit Kumar OLX India CIN:         U74900HR2009PTC053732 Employees:              2,500 globally Revenue:                  $2.98 billion (2022) Presence:                 Over 30 countries The Reaction of OLX to Fraud  OLX has put in place several security procedures, including: Verification of buyers and sellers. Safe chat capabilities. Reminders and cautions against paying in advance. Instruments for reporting questionable postings.  The best defence is still user vigilance despite them. If a deal seems too good

Mumbai News: Man Arrested In ₹67 Lakh Cyber Fraud Targeting Elderly Sisters; Hunt on for Mastermind

Cyber Fraud

Mumbai Police arrested Mohit Bhojraj in a ₹67 lakh cyber fraud case targeting two elderly sisters, with the mastermind Salid Mohammed Shaikh still at large. The victims were lured through a fake investment scheme on WhatsApp, promising high returns. A man from Dahisar has been taken into custody by the Mumbai Police’s South Cyber Cell about a ₹67 lakh cyber scam involving two elderly sisters. Mohit Akash Bhojraj has been recognised as the offender who was apprehended. Officials claim that Mohit maintained continuous communication with Salid Mohammed Shaikh, a well-known cyber fraudster who lives in Bengaluru, Karnataka, and is currently a sought-after suspect in the investigation. According to investigations, Mohit gave Shaikh access to 19 bank accounts, which were purportedly used to embezzle the stolen money. The cyber cell’s investigation to find the fugitive mastermind and follow the cash trail is still ongoing. The complaint claims that after investing in a financing company, the victims, two sisters living in Girgaon with their mother, were joined to a WhatsApp group in January 2025. A lady named Shruti Baheti ran the organisation and frequently shared information about profitable investment possibilities. Shruti posted conversation logs and screenshots purporting to show off earnings from prior investments in an attempt to win members’ trust. With the promise of large returns, Shruti persuaded one of the sisters to participate in a “block share deal” via direct messaging on January 21. The woman made a sizable investment after opening an account with the finance company. Following the first profits, her sister joined the organisation and invested as well. The sisters contributed a total of 67.15 lakh rupees. Their investment portfolio was reported to have increased to ₹1.88 crore shortly after. However, the transaction failed when they tried to withdraw ₹50 lakh. When asked, Shruti stated that before the money could be released, a tax payment was necessary. The sisters realized they had been duped at that point and filed a formal complaint. Mohit Bhojraj has been taken into custody by the cyber cell, which is also actively pursuing the other defendants, including the mastermind Salid Mohammed Shaikh. Investigations are still under progress.

Microsoft wants AI ‘agents’ to work together and retain information

Microsoft

Microsoft envisions AI agents collaborating across companies and improving memory retention using structured retrieval augmentation. At its Build conference, it plans to promote open standards like the Model Context Protocol to foster an interconnected “agentic web.” Microsoft’s top technologist said Sunday, ahead of the company’s annual software development conference, that the company envisions a future when its AI agents may work together with agents from other companies and remember past contacts more clearly. At its Build conference in Seattle on May 19, analysts expect Microsoft to unveil its latest tools for developers building AI systems. Microsoft is dedicated to encouraging the adoption of industry-wide standards that will allow agents from different manufacturers to collaborate, Chief Technology Officer Kevin Scott told reporters and analysts at the company’s Redmond, Washington, headquarters before to the conference.  Agents are AI systems that are able to do specific activities, like fixing a software defect, on their own. Scott claims that Microsoft is backing the open-source Model Context Protocol (MCP) technology, which was first introduced by Google-backed Anthropic. According to Scott, MCP could lead to the development of an “agentic web” in a manner akin to how hypertext protocols facilitated the internet’s growth in the 1990s. “It means that your imagination gets to drive what the agentic web becomes, not just a handful of companies that happen to see some of these problems first,” Scott stated. According to Scott, Microsoft is working to improve AI agents’ recall of tasks that customers have requested of them, but as of right now, “most of what we’re building feels very transactional.” However, because it requires more computing power, enhancing an AI agent’s memory is costly.  Microsoft is focusing on a new approach called structured retrieval augmentation, where an agent provides a roadmap of the subjects discussed by summarising each turn in a user discussion. “This is a core part of how you train a biological brain – you don’t brute force everything in your head every time you need to solve a particular problem,” Scott stated.

New e-Zero FIR system will expedite the capture of cybercriminals: Amit Shah

e-Zero FIR system

Union Home Minister Amit Shah launched the e-Zero FIR system to auto-convert major cybercrime complaints into FIRs, starting with a ₹10 lakh threshold in Delhi. The initiative, led by the I4C, aims to accelerate cybercriminal tracking and will soon expand nationwide. On May 19, 2025, Union Home Minister Amit Shah announced that the Indian Cybercrime Coordination Centre (I4C) of the Ministry of Home Affairs had started the new e-Zero FIR project to catch cybercriminals faster than ever before. According to him, the new mechanism, which was introduced as a trial project for Delhi, will automatically convert cyber financial crimes reported on the National Cybercrime Reporting Portal (NCRP) and hotline number 1930 to FIRs, first surpassing the threshold of Rs 10 lakh. The effort will soon be expanded throughout the entire country, according to the minister. “To apprehend any criminal with previously unheard-of speed, the MHA’s Indian Cybercrime Coordination Centre (I4C) launched the new e-Zero FIR scheme. “The new system, which was first implemented as a pilot project for Delhi, will automatically convert cyber financial offences reported to the NCRP or 1930 to FIRs, initially exceeding the 10 lakh threshold limit. The new technology, which will speed up investigations and crack down on cybercriminals, will soon be available to the entire nation,” Shah wrote on ‘X’. The home minister said the Modi government is bolstering the cybersecurity grid to build a cyber-secure Bharat. The I4C was established by the New Delhi MHA to provide law enforcement agencies with a framework and setting for coordinating and fighting cybercrime in its entirety. It is intended that the I4C will serve as the focal point for reducing cybercrime in the nation.

CLAT Counselling 2025: NLIU Bhopal adds a BSc LLB Cyber Security Hons program to the seat matrix

CLAT Counselling 2025

CLAT Counselling 2025: NLIU Bhopal has introduced a new BSc LLB (Hons) in Cyber Security program in the CLAT 2025 seat matrix, open only to science stream students. CLAT 2025 counselling registration began on May 17 and will continue until May 21 at 5 PM. CLAT Counselling 2025: The National Law Institute University (NLIU), Bhopal’s seat matrix has been revised, according to the Consortium of National Law Universities (CNLU). According to the announcement, NLIU has added a new program to its list of courses offered through the Common Law Admission Test (CLAT) 2025: BSc LLB (Honours) in Cyber Security. Additionally, the updated CLAT UG 2025 results were released. The consortium advised candidates who wish to apply for the recently introduced program to include it on their list of preferences when they go through the CLAT UG 2025 counselling procedure. Notably, only applicants who took the science stream in their 12th grade are eligible for this course. The NLIU, Bhopal brochure, which is accessible on the Consortium’s official website, has also been recommended to candidates. The authorities have made it clear that after the deadline, requests for preference adjustments will not be considered. Candidates can email the helpdesk at clat@consortiumofnlus.ac.in or phone 08047162020 between 10:00 am and 5:00 pm on all working days if they have any questions or need any assistance. The new seat matrix for CLAT UG applicants is shown below: Vertical Reservation B.A.LL.B. B.Sc.LL.B. All India General/Unreserved 52 26 All India EWS 12 6 All India SC 16 8 All India ST 20 10 All India OBC 14 7 Horizontal Reservation General/Unreserved of MP 26 13 SC of MP 8 4 ST of MP 10 5 OBC of MP 7 4 Women 30 15 All India PWD 5 3 NRI/NRI Sponsored 18 9 J & K Resident 2 2 Here is the revised CLAT PG seat matrix: Vertical Reservation LL.M All India General/Unreserved 30 All India SC 10 All India ST 12 All India OBC 8 Horizontal Reservation 15 SC of MP 5 ST of MP 6 OBC of MP 4 Women 18 All India PWD 3 The CLAT 2025 results were revealed by the Consortium in the meantime, and admissions counselling registration opened on 17 May at 4 PM. Until 21 May at 5 PM, candidates can still finish the registration procedure by logging into their official accounts.

LinkedIn co-founder claims AI should be taught at colleges, and 30% of South Korean schools utilise AI-powered textbooks

LinkedIn co-founder

LinkedIn co-founder claims AI should be taught at colleges, Nearly 30% of South Korean schools have adopted AI-powered textbooks, showcasing a national push toward digital education. LinkedIn co-founder Reid Hoffman urges colleges to integrate AI into curricula and assessments to stay relevant in evolving educational landscapes. According to reports, South Korea is implementing AI in regular classrooms as part of its aggressive efforts to transform traditional education. Nearly 30% of South Korean schools, ranging from elementary to high school, have already implemented AI-powered digital textbooks since March, according to Nikkei Asia, marking a significant shift in the way that pupils learn. This week’s APEC education ministers’ summit, which was held in South Korea for the first time in nine years, featured the proposal. Using the platform, the nation showcased its digital transformation in schools, especially the introduction of AI-based math and English textbooks for specific grade levels nationwide. Andeok Elementary School in Jeju, which was selected by the government last year as a model for digital-first learning, provided a preview of this change. In a fourth-grade arithmetic session, kids worked through problems on tablets while their scribbled solutions were shown in real time on a digital board. A clear image of how AI is being utilised to make lessons more interactive and responsive was provided by the class, which was attended by international dignitaries. Nevertheless, there have been challenges associated with South Korea’s quick adoption. Among the urgent issues the nation must confront are regional disparities in digital access and the requirement to upskill educators. A analogous debate is developing in higher education around the world as South Korea concentrates on integrating AI in early education. Reid Hoffman, a co-founder of LinkedIn, brought up an issue that many educators are now starting to address: AI is here to stay, and colleges must change. In an interview on his podcast “Possible,” Hoffman stated that as more students use generative AI tools to finish their projects, the conventional format of college exams—particularly essays—is no longer dependable. He thinks universities should reconsider how learning is evaluated and think about incorporating AI into the evaluation process itself rather than opposing it. Hoffman proposed that AI might be used as a co-examiner in future exams or that they might even shift more toward oral exams, which need a deeper level of comprehension. He pointed out that while AI-generated essays are frequently generic, teachers could use them as models for students to follow, encouraging them to set greater goals. Avoiding AI in the classroom, he added, just postpones the inevitable. You can’t “ignore the new tool,” Hoffman said, adding that giving kids the skills they need to collaborate with AI will be essential to their future employment. He cautioned that unless they aggressively embrace change, many colleges risk slipping behind as they continue to use antiquated teaching techniques.

“Informing Customers” claims that Dior’s client data was stolen in a cyberattack

Dior

Dior confirmed a cyberattack compromised client data, excluding financial details, and is notifying affected customers. This follows a wave of cyberattacks targeting major European retailers, including Marks and Spencer and Harrods. Dior stated that no financial data, including bank card details, was on the database accessed, but it did not specify the number of clients implicated. On May 14, 2025, the French luxury brand Dior declare that client data had been taken by cyber criminals, but they assured that no financial information was compromised. A number of well-known European retailers have been the victim of cyberattacks, with the major LVMH subsidiary being the most recent. Following the announcement by the Le Monde newspaper that Asian clientele had informed them of the alleged January information breach, Dior issued a statement. “The House of Dior has learned that some of our client data was accessed by an unauthorised third party. “We took immediate action to contain this incident,” the statement read. Dior stated that no financial data, including bank card details, was on the database accessed, but it did not specify the number of clients implicated. “Dior teams are still looking into and responding to this situation with the help of top cybersecurity specialists. All pertinent regulatory bodies are being notified,” it continued. “We are in the process of informing customers affected by this incident.” Le Monde claims that client names, email addresses, postal addresses, and phone numbers were among the stolen data. According to HSBC bank, Dior, one of LVMH’s two main brands along with Louis Vuitton, generated 8.7 billion euros ($9.7 billion) in revenue in 2024. Cyber gangs have been increasingly targeting new high-end brands and retailers in recent months. British company Marks and Spencer announced on May 13, 2025, that weeks of interruptions to its online services had resulted from a cyberattack that had exposed some of its customers’ personal information. The high-end department store Harrods and the Co-op food chain have also been affected in recent weeks.