Achive.php cyber crime news Archives - Page 6 of 12 - The Cyber Shark

Open AI CEO Sam Altman claims Chat GPT can now reference and recall all your prior chats

Open AI

Open AI CEO Sam Altman announced that ChatGPT’s memory has been significantly improved, allowing it to recall and reference all prior conversations for more personalized responses. The feature is rolling out to Pro users first, with broader access coming soon, and users can manage or disable memory anytime. ChatGPT’s memory feature has been “greatly improved,” according to OpenAI CEO Sam Altman, who announced on 10 April 2025. This means that it can now recall and refer to all of your previous conversations with it. According to OpenAI, the feature will enable ChatGPT to provide more tailored responses based on your interests and preferences, making it even more useful for writing, learning, and other purposes.  “I think this is a fantastic feature, and it indicates something we are very excited about: AI systems that learn about you for your life and become incredibly helpful and customized,” Altman says. The feature’s rollout has already started. Only ChatGPT Pro members will be allowed to access it at first, and ChatGPT Plus customers will “soon” be able to do the same. In a few weeks, Team, Enterprise, and Edu customers will also have access, according to OpenAI. When or if the feature will be made available to free users is unknown. “EEA, UK, Switzerland, Norway, Iceland, and Liechtenstein” will not be able to use the service, Altman said. ChatGPT already has the memory feature. In September 2024, it was made available to ChatGPT Free, Plus, Team, and Enterprise users. The feature has now been enhanced, though. With the most recent update, OpenAI CEO Sam Altman claims that ChatGPT would be able to recall all of your previous chats with it when previously there were restrictions on how much context the chatbot could recall. This appears to be the beginning of your AI agent. It can now refer to your previous conversations in addition to the previously saved memories to provide answers that seem notably more pertinent and helpful. On X, OpenAI wrote, “New conversations organically build upon what it already knows about you, making interactions feel smoother and uniquely tailored to you.” Users will also have the option to choose not to use the functionality. Of course, you can choose not to participate in this or any recollection at all. In an article about X, OpenAI said, “New conversations organically build upon what it already knows about you, making interactions feel smoother and uniquely tailored to you.”You can go to Settings > Personalization > Memory to turn off the feature. You can switch memory there. Turning it on or off will prevent ChatGPT from remembering anything you discuss in the future. Additionally, you can choose “Manage Memory” to view the memory that is saved or to fully clear it. You have complete control over ChatGPT’s RAM as usual. You can change your settings at any time to stop using memory or previous conversations. By default, you will not be able to access previous conversations if you have already opted out of memory. Just ask in chat if you would want to modify the information that ChatGPT has on you. Use an ephemeral chat if you want to talk without consuming or affecting memory.

Helpline 1930 links Panchkula cyber victims to prompt action

Helpline 1930

Increased awareness of cybercrime helpline 1930 in Panchkula has led to a rise in fraud reporting, faster recovery of funds, and more arrests. In early 2025, FIRs and recoveries nearly doubled compared to the previous year due to timely reporting. Increased awareness of the National Cybercrime Helpline 1930 has led to a rise in complaints, better recovery of fraudulent payments, and more arrests of scammers, so Panchkula residents are reporting online scams more swiftly. The Union Ministry of Home Affairs (MHA) launched a specialized cybercrime helpline in 2021 to allow victims to report online fraud immediately. This helps to quickly freeze illicit transactions and, eventually, aid in recovery. The Ministry of Home Affairs (MHA) created the Indian Cybercrime Coordination Centre (I4C), which runs the National Cyber Crime Reporting Portal and helpline. In the first three months of 2025, Panchkula cyber police received 911 complaints of fraud totalling ₹7.62 crore. Compared to the same period in 2024, when 807 complaints about losses totalling ₹7.38 crore were received, this indicates a 12% rise. Between January and March of this year, the number of FIRs filed about cyber scams doubled from 21 in 2024 to 43 this year. As evidenced by the fact that ₹32.95 lakh (43%) of the ₹75.53 lakh that were put on hold after the crimes were reported through the helpline was recovered in January–March 2025, more complaints and prompt reporting are also leading to prompt action. Only ₹35,712 (0.31%) of the ₹1.12 crore that had been kept through the helpline during the same time in 2024 was returned. Arrests doubled from the first quarter of 2024 There are also more arrests as a result of the greater awareness. In 2024, nine cybercriminals were apprehended in the first quarter. That figure has increased to 17 this year. Inspector Munish Kumar, who is in charge of the Panchkula cybercrime police station, stressed how important it is to call the 1930 helpline as soon as possible to stop the transaction chain.  “Timely reporting is essential. It maximizes the likelihood of recovery before the money goes down the chain by quickly connecting victims with banks and law enforcement. “Campaigns targeting senior citizens, ex-servicemen, resident welfare associations, market welfare associations, schools, and colleges are being held regularly to raise public awareness about the helpline and to combat cybercrime,” he continued. Furthermore, according to a cyber police official, the 1930 helpline currently receives 90% of Panchkula’s cybercrime reports. In total, 3,615 cyber fraud complaints ttotalling₹11.90 crore were filed with the Panchkula police last year. In addition, 169 FIRs ttotalling₹42.21crorese were filed. After the 1930 helpline helped put ₹10.36 crore on hold, the victims received ₹6.06 crore.

India to host Global Technology Summit in Delhi from April 10-12: Key agendas, theme and other details

Global Technology Summit

India is hosting the 9th Global Technology Summit in New Delhi from April 10–12, focusing on the theme “Sambhavna” (possibilities) to explore innovation and global tech cooperation. Co-hosted by MEA and Carnegie India, the summit will feature over 150 speakers from 40+ countries discussing key issues like AI governance, cybersecurity, and digital infrastructure. The 9th edition of the Global Technology Summit (GTS), which will bring together some of the world’s most brilliant minds, will take place in the nation’s capital from April 10 to April 12. External Affairs Minister Dr S. Jaishankar will make the opening comments and formally introduce the summit during its first session. Co-hosted by Carnegie India and the Ministry of External Affairs (MEA), the GTS is India’s leading forum for high-level discussion on geo technology. Headquartered in New Delhi and Established in 2016, Carnegie India is a member of a strong worldwide network that includes more than 170 researchers. According to a news release from the MEA, the summit intends to bring together leaders from academia, industry, government, and civil society to have crucial discussions on innovation, resilience, and international cooperation in the digital sector. This year’s Global Technology Summit’s topic This year’s Summit has “Sambhavna” as its subject; the Hindi term means possibilities. It will concentrate on how new technologies can be used to strengthen digital governance, encourage cross-border collaboration, and support inclusive growth. The Summit’s Agenda The Global Technology Summit is anticipated to have a jam-packed schedule with over 40 public sessions spread across three days. According to the MEA announcement, attendees can anticipate a diverse range of keynote talks, ministerial-level discussions, expert panels, and strategic dialogues that will address the most important technology concerns facing the globe. More than 150 eminent speakers from over 40 countries, including the US, UK, Japan, Australia, France, Germany, Netherlands, Brazil, UAE, Nigeria, the Philippines, and the European Union, are anticipated to attend the event. The MEA added that by contributing a range of perspectives to the conversation, these global thought leaders will highlight the opportunities and difficulties confronting the digital sector today. Data protection, cybersecurity, space security, artificial intelligence governance, digital public infrastructure, and expanding technological cooperation, especially in the Global South, are just a few of the important topics that will be covered. With its comprehensive and forward-looking agenda, GTS 2025 hopes to be a historic occasion that shapes the direction of international tech innovation and policy. “This year, GTS 2025 will also elevate the voices of the next generation. Students and young professionals from all over India will directly contribute to policy discussions on responsible AI, digital futures, and international tech standards through the GTS Young Ambassadors program,” the MEA continued. About Global Technology Summit The Global Technology Summit (GTS), India’s premier international conference for technology discussion, brings together policymakers, business leaders, academics, and innovators to shape the global dialogue on emerging technologies. The Ministry of External Affairs (MEA) and Carnegie India are co-hosting the summit, which offers a crucial platform for analysing how technology affects development, governance, security, and geopolitics. Held annually in New Delhi, GTS places a strong focus on innovation, resilience, and equitable growth. It brings together speakers from around the globe to discuss pressing issues like cybersecurity, digital infrastructure, AI governance, and cross-border tech collaboration.

Police in Tamil Nadu issued a warning about the possible dangers of creating Ghibli art online

Tamil Nadu

The Tamil Nadu Police Cyber Crime Wing has warned against using Ghibli AI Art generators, citing risks of data theft, identity fraud, and malware. Users uploading selfies to unofficial sites may unknowingly expose personal information to scams and cybercrimes. People have been alerted by the Tamil Nadu police to the possible dangers of creating “Ghibli AI Art” by sharing pictures or selfies. According to a statement from the State Police’s Cyber Crime Wing, the public’s use of Ghibli AI Art has alarmingly increased in recent days. The Ghibli AI Art generators created anime-like representations from user-uploaded images or selfies based on the user’s facial features. Users frequently overlook or undervalue the risks associated with this, though. The AI system would examine and record the surroundings, faces, and facial expressions. Without the user’s express consent, these uploads are utilized to train the AI. As stated in the announcement, “continuous uploading [of photos or selfies] will increase the system’s knowledge base.” Concerns were raised about the users’ inability to quickly remove the data they had submitted. There was no sure-fire method to ask for deletion in the case of image uploads. According to the police, users who distribute and use Ghibli’s artwork on internet platforms without permission, especially if they get it through dubious or unofficial means, run the possibility of falling victim to cybercrimes. Photographs uploaded on any dubious link could result in issues like data leaks or data being sold to unidentified advertising companies. A lot of websites that provided Ghibli artworks for free downloads were fronts for scams. Data loss and identity theft may result from users downloading content from these sources and unintentionally infecting their devices with malware, viruses, or ransomware. Popular Ghibli characters and artwork can be used by scammers as bait in phishing con games. Fake giveaways, competitions, or links to free Ghibli art downloads are frequently a part of these fraudulent efforts. If you click on these links, you could lose money or have your bank information and personal information stolen, the police said.

Hackers Deploy Neptune RAT via YouTube, Telegram & GitHub in Global Cyberattack

Neptune RAT

Hackers are spreading a powerful new malware, Neptune RAT, via YouTube, Telegram, and GitHub to steal passwords, and cryptocurrencies, and control Windows PCs undetected. Experts warn of its ransomware, spying, and data-wiping features, urging users to avoid suspicious links and strengthen cyber protection. The Neptune RAT, frequently referred to as the “Most Advanced RAT” (or remote access Trojan) ever, is a new strain of malware that hackers are using to infect vulnerable Windows PCs in a recent onslaught. The goal of this cyberattack is to hold victims hostage while stealing cryptocurrency and passwords. The Neptune RAT is quite sophisticated, according to a Cyber News report, and it can spy on the owner of the device, take over Windows devices, and do a lot more without being discovered by even the most effective antivirus program. The aforementioned malware strain is presently making the rounds on YouTube, Telegram, and GitHub, according to cybersecurity firm CYFIRMA. Similar to other malware strains, Neptune RAT operates on a malware-as-a-service basis, allowing any hacker to utilize it in their assaults for a monthly subscription. Everything you need to know about this new malware that targets Windows computers is provided here, along with some advice on how to protect your computer and data from the Neptune RAT. What can the Neptune RAT do? The Neptune RAT is a very powerful remote access program with a wide range of malevolent capabilities, according to CYFIRMA. A crypto clipper that tracks cryptocurrency transactions and substitutes wallet addresses under the control of attackers, rerouting cash without the victim’s awareness, is one of its most alarming characteristics. Apart from focusing on digital assets, Neptune RAT also has a password-stealing module that can retrieve login information from more than 270 programs, including popular web browsers like Chrome. The stolen data can be used to gain access to financial platforms, compromise social media accounts, and enable more attacks. The powers of the software go beyond simple stealing. One of its components is ransomware, which encrypts files and requests payment to unlock them. The system’s capacity to identify or react to the infection may be diminished if Windows Protector and other antivirus software are disabled. Additionally, Neptune RAT has screen tracking capabilities that let attackers see user activity in real-time. Data exploitation, blackmail, and spying are made possible by this. Neptune RAT contains a data destruction function that enables the attackers to fully erase the compromised system and leave no trace behind if they determine the virus has fulfilled its objective. How can one be safe? Since GitHub, Telegram, and YouTube are now the sites where Neptune RAT is being spread, users may want to avoid these sites as much as possible or exercise extreme caution while downloading files from them or clicking on links. Additionally, buying the best identity theft protection is encouraged as it will assist consumers in recovering money that has been lost due to an assault. These protection plans frequently include insurance, which is advantageous if an impacted user decides to replace their PC entirely.

Aadhaar Seva Kendra staff with access to data of thousands of visitors on cybercrime net

Aadhaar Seva Kendra

Two men from Haryana, including a former Aadhaar Seva Kendra staffer, were arrested by CID for forging Aadhaar and PAN cards to create fake firms and commit a ₹43 lakh Bitcoin scam. The accused misused the Aadhaar data of thousands of visitors, prompting a cybersecurity alert. CID investigators revealed that one of the two individuals detained from Haryana about a cyber scam purportedly led by bank management had previously worked at an Aadhaar Seva Kendra. The database of thousands of visitors to the centre was available to him. Officers from the state CID’s cyber police investigated a complaint from a resident of Chandernagore and discovered that several fake Aadhaar cards were used to register shell firms and related bank accounts. Himanshu Solanki, 32, and Praveen Kumar, 29, of Faridabad, Haryana, were detained by the state CID on 06 April 2025 suspicion of fabricating Aadhaar Seva Kendra and PAN cards as well as fictitious businesses using forged documents. Praveen Kumar altered his name to create several Aadhaar cards. He is identified as Paresh Kumar in one, Praveen Kumar in another, and Pratap Kumar in the third. Despite having different identities, they all share the same Aadhaar number, an officer stated. CID detectives believe that the gang, which has been falsifying the information of visitors to Aadhaar Seva Kendra, has other members. “It is best to mask your Aadhaar card so that the number will not be visible to anyone else, even if you use a photocopy,” a CID officer advised. To send an alert to the holder’s cell phone if someone attempts to commit any fraudulent conduct with their Aadhaar number, the police also suggested tying the Aadhaar to that number. According to CID officers, the accused defrauded the complainant of ₹43 lakh by enticing him to make a Bitcoin investment. On social media, he had seen the investment scheme’s marketing. A branch manager of a nationalized bank and his wife, who was stationed in Murshidabad, received the proceeds of the crime, the police discovered later in the investigation. The manager of the branch has already been taken into custody. He is being held by the police.

The Ghibli Art Craze: An Adorable Movement with a Secret Danger

Ghibli Art

The Ghibli Art trend has gone viral, turning real-life photos into whimsical animations, but cybercriminals are exploiting it with scams and malware. Authorities warn users to stay cautious and use only trusted platforms. The quirky new trend of Ghibli-style pictures has taken over the internet in recent weeks. From kids and influencers to famous people like Sachin Tendulkar and even official government websites, studio Ghibli’s distinctive animation style is being used to turn everyone’s real-life images into fantastical settings. However, there is a significant cybersecurity risk hidden beneath the idyllic images. The public was recently warned by the Chandigarh Police about the rise in cyber scams that use the Ghibli art craze as a lure. Why is Ghibli’s art so well-liked, and what is it? The renowned Japanese animation studio Studio Ghibli, founded by Hayao Miyazaki, Isao Takahata, and Toshio Suzuki, serves as the model for Ghibli Art. Studio Ghibli, well-known for classic movies like Spirited Away, My Neighbor Totoro, and Howl’s Moving Castle, is praised for its delicate colour schemes, emotionally charged narratives, and hand-drawn characters. Users may now quickly transform ordinary photographs into Ghibli-style illustrations thanks to the development of AI-powered tools. It’s now easier than ever to follow the trend, thanks to platforms like ChatGPT, which allow users to create up to three photos per day. How Did the Trend Go Viral? It all began when Seattle software engineer Grant Slaton created a Ghibli-style picture of his family at the beach using OpenAI’s image-generating tool. When he shared it on X (previously Twitter), it became viral, garnering millions of views and more than 45,000 likes. What started as a private post swiftly became a worldwide sensation, with others sharing their Ghibli-inspired works all across the world. The Dark Side: Cybercrime Hiding in Plain Sight The growing popularity of the fad presented an opportunity for cybercriminals. The Chandigarh Police said that criminals are now tricking people into installing malware or divulging personal information by exploiting phoney Ghibli art portals. Here’s how: Phishing Websites Phishers have created phoney Ghibli art websites that ask visitors to submit pictures. Once submitted, a photo or personal data may be stolen and used maliciously. Phishing emails Phishing emails purporting to be from Studio Ghibli are being sent to some users. These could provide links to “official” art outlets, products, or invitations to contests. However, after being clicked, these URLs have the potential to install malicious software that steals private information, including banking information and passwords. Scam Contests & Giveaways Cybercriminals are promising Ghibli-style artwork in exchange for user information through phoney online competitions and giveaways. It’s only a means of spreading viruses or gathering data. Dangerous Downloads Wallpapers or “Ghibli art packs” are available on some websites, however, the files could be infected with ransomware or viruses that lock down your computer or steal data. False Artist Listings Scammers are also using social media to pose as Ghibli fan artists. They might attempt to deceive users into disclosing personal information or offer phoney artwork.  How to Stay Safe: Tips from Cyber Experts Here are some crucial safety precautions if you’re following the Ghibli trend: When creating Ghibli artwork, only use reputable and authorized sites. Never click on strange links or dubious emails. Refrain from giving strangers access to your personal or financial information online. If a contest or deal looks “too good to be true,” it probably is. Therefore, make sure to check it out first. Inform cybercrime authorities about any dubious emails, profiles, or websites.  Final Thoughts Unquestionably stunning, the Ghibli Art movement is a celebration of creativity in the digital era. Yet, particularly on the internet, beauty frequently comes with risks. While incorporating a little fantasy into everyday life is fantastic, it’s equally crucial to remain vigilant and watchful. Go ahead and take in Ghibli’s magic, but be careful when you click. Art should be joyful, not dangerous.

Google Gemini Live update brings screen, and camera awareness to these phones

Google Gemini

Google rolls out Project Astra-based camera and screen-sharing features in Google Gemini Live, enhancing real-time interaction on Pixel 9 and Galaxy S25 devices. Older Pixel users can access the features with a Gemini Advanced subscription. Google has started rolling out Project Astra-based cameras and screen-sharing features in the Google Gemini Live interface as part of the most recent Pixel Drop. Devices from the Samsung Galaxy S25 and Google Pixel 9 series come with these features free of charge. The capabilities are also available to users of previous Pixel devices, although they will require a Google Gemini Advanced membership. More participatory and visually aware conversations are made possible by the new Google Gemini Live features, which let users share their device’s screen or camera feed in real-time with the AI assistant. Details of camera and screen sharing with Gemini Live To obtain immediate information, users can utilize the camera on their smartphone to display Google Gemini as a landmark, a store, or a dish. Gemini changes its replies in real time as the camera moves. Similar to this, users can receive assistance during screen sharing based on the content that is shown on their screen, including documents, photographs, and web pages. How to use Gemini Live to share a screen Screen sharing can be enabled in two ways: Using the Gemini App on Mobile: Go to the live interface after launching the Google Gemini app. Press the recently added “Turn on screen sharing” button located at the bottom. Select “Share screen” from the option that appears. Outside of the Gemini app: You can use a voice command or long-press the power button to activate Google Gemini . Press the floating “Share screen with Live” button that shows up above the Gemini overlay. Select “Share screen” from the option that appears. Go back to the Gemini mobile app and select “Turn off screen sharing” to end sharing. As an alternative, press “Stop sharing” on the Screen Sharing card after swiping down from the top edge of the screen. Additionally, if the screen is locked or Live is paused, screen sharing instantly ends. How to use Gemini Live to share a camera Users can show Gemini what they are seeing by using their camera app while screen sharing is enabled. As an alternative: To begin sharing a live feed in Gemini Live, tap the camera icon. To stop, tap it one more. As necessary, switch between the front and rear cameras. According to Google, the camera will switch off on its own in the following circumstances: Gemini Live will automatically restart when it is resumed after being paused. You will have to manually turn the camera back on if your screen locks.

Google Unveiled Sec-Gemini v1, a New AI Model for Cybersecurity

Sec-Gemini v1

Google has launched Sec-Gemini v1, an advanced AI model designed to enhance cybersecurity by aiding in threat analysis, vulnerability assessment, and incident investigation. The model outperforms rivals on key benchmarks and is being offered to select partners for research collaboration. Google has made a huge attempt to counter cyber-attacks by introducing Sec-Gemini v1, an experimental AI model meant to revolutionize cybersecurity. Elie Burzstein and Marianna Tishchenko from the Sec-Gemini team introduced a new AI model designed to help cybersecurity defenders confront the growing complexity of cyber-attacks using advanced AI. The Sec-Gemini team emphasized the fundamental asymmetry in cybersecurity in a blog post: attackers only need to take advantage of one weakness, while defenders must fight against every potential assault. Security experts have long struggled with this imbalance, which makes their work laborious and error-prone. Sec-Gemini v1 uses AI-powered tools to “force multiply” cybersecurity workflows to give defenders the upper hand again. Based on Google’s Gemini model, Sec-Gemini v1 blends state-of-the-art reasoning abilities with near-real-time cybersecurity knowledge. Using a range of data sources, including Google Threat Intelligence (GTI), the Open Source Vulnerabilities (OSV) database, and Mandiant Threat Intelligence, In crucial domains like incident root cause investigation, threat analysis, and vulnerability impact assessment, the model provides unmatched performance. On the CTI-MCQ benchmark, a leading indicator of cybersecurity threat intelligence, it outperformed rivals by at least 11%. On the CTI-Root Cause Mapping (CTI-RCM) benchmark, which assesses a model’s capacity to decipher vulnerability descriptions, identify the underlying causes, and categorize them using the Common Weakness Enumeration (CWE) taxonomy, it scored at least 10.5% better than its competitors. Impact on the Real World and Cooperation Google offers a noteworthy example that demonstrates the usefulness of Sec-Gemini v1. The model provided a thorough explanation enhanced by Mandiant Threat Intelligence data in addition to accurately identifying “Salt Typhoon,” a known threat actor, which is something that not all AI models are capable of. Additionally, using information from OSV and contextualizing it with threat actor insights, Sec-Gemini v1 examined vulnerabilities associated with Salt Typhoon. It is anticipated that this level of research will aid cybersecurity experts in evaluating risks and addressing threats more effectively. Google underlined that the sector must work together to advance AI-driven cybersecurity. A limited number of organizations, institutions, experts, and non-governmental organizations shall have free access to Sec-Gemini v1 for research purposes in order to promote cooperation. Google has given a form for interested parties to use to seek early access. Google is putting itself at the forefront of AI cybersecurity with Sec-Gemini v1, providing a preview of a future in which defenders will be more prepared to fend off attackers. Tools like this could be crucial in levelling the playing field as cyber threats continue to change.