Achive.php cyber news Archives - The Cyber Shark

ED raids in Gujarat, Maharashtra in cyber fraud probe over ₹100 cr scam

ED raids in Gujarat, Maharashtra in cyber fraud probe over ₹100 cr scam

On 25 June 2025, the Enforcement Directorate (ED) carried out raids in Gujarat and Maharashtra as part of a money laundering probe linked to cyber frauds worth over ₹100 crore. The operation targeted individuals allegedly involved in digital arrest scams, crypto frauds, and fake law enforcement threats, with money funnelled abroad using hawala routes. According to ED sources, searches were conducted in Mumbai, Ahmedabad, and Surat under the Prevention of Money Laundering Act (PMLA). The probe was based on an FIR filed by the Gujarat Police against multiple accused, including Makbul Doctor, Kaashif Doctor, Bassam Doctor, Mahesh Desai, and Maaz Abdul Raheem Nada. The fraudsters allegedly: Used fake USDT (cryptocurrency) trading schemes. Orchestrated “digital arrests”, impersonating law agencies. Sent fake notices to threaten and extract money from victims. Collected funds through accounts opened with forged or dummy KYCs. Converted black money into cryptocurrency via Angadiya (hawala) operators. Transferred over ₹100 crore abroad, officials suspect. “This is a deeply rooted cyber laundering network involving identity theft, crypto misuse, and psychological extortion,” said a senior ED official. The investigation is ongoing, with digital evidence, devices, and suspicious bank transactions being examined. Key Highlights: ₹100 crore cyber scam involved fake arrests, crypto fraud, and hawala transfers. The ED conducted raids in several Gujarati and Maharashtra cities. FIR filed against key suspects with a link to forged KYC accounts. Cyber Safety Advice: Never trust calls or emails claiming law enforcement without verification. Avoid crypto investments from unknown or unregulated sources. Secure your identity documents and avoid sharing KYC info online. Call 1930 or report questionable transactions or scams to cybercrime.gov.in.

Artificial Intelligence Will Reshape the Workforce, Skills, and Communication, Warns LinkedIn CEO

Artificial Intelligence Will Reshape the Workforce, Skills, and Communication, Warns LinkedIn CEO

In a recent interview with Bloomberg, LinkedIn CEO Ryan Roslansky discussed how artificial intelligence is changing workplace communication, skill development, and the job market. This week’s interview demonstrates how AI technologies are affecting top executives at Microsoft and other organisations, as well as entry-level job applicants. According to Roslansky, artificial intelligence is both disrupting and facilitating advancement in fields including self-paced skill development, remote learning, and entrepreneurship. As AI transforms traditional roles and work expectations, he emphasised the necessity of ongoing reskilling. “A lot of uncertainty and disruption are going to occur. But in the long term, it’s advantageous,” Roslansky told Bloomberg. As an example of how AI tools are now helping even senior leadership with communication, he acknowledged in a light-hearted moment that he had used Microsoft’s Co-pilot AI to improve the tone of his emails to Microsoft CEO Satya Nadella. LinkedIn trends reveal: Surge in AI-related job listings. More users are adding AI skills to their profiles. LinkedIn is rolling out AI resume builders and job analysis tools. However, users remain cautious. Overuse of AI-generated posts and profiles has affected credibility, prompting LinkedIn to roll out ID and work email verification tools. Roslansky stated that while LinkedIn is implementing an “AI-first mindset” throughout all organisations going forward, the layoffs were not connected to AI. Advice Key Highlights: AI is both disrupting and enabling the job market. In the AI era, flexibility and retraining are crucial. LinkedIn is using AI technologies to improve communication and job readiness. Career Advice in the AI Age: Take tech-focused and AI-focused courses to keep your abilities up to date. Don’t seem robotic when using AI tools, such as resume builders. Verify your LinkedIn profile to boost trust. Keep up with the latest developments in AI that affect your sector. AI should be used as a tool, not a substitute.

NCCF Hosts Cybersecurity Training for Cooperatives Ahead of IYC 2025

NCCF Hosts Cybersecurity Training for Cooperatives Ahead of IYC 2025

The National Cooperative Consumers’ Federation of India Ltd. (NCCF) held a cybersecurity training session this week in India as part of preparations for the International Year of Cooperatives (IYC) 2025. Organised under the Ministry of Cooperation, the session aimed to equip cooperative officials with the tools to combat rising cyber threats, ensure cyber hygiene, and enhance digital safety. The training focused on Cyber Security Awareness and Cyber Swachhata (Cyber Cleanliness), teaching cooperative officials how to protect sensitive data, recognise scams, and adopt safer digital practices. According to NCCF sources, the program covered topics such as: Cyber hygiene measures such as software updates and creating secure passwords. Data protection protocols. Phishing and scam awareness. The Ministry of Cooperation, which guided the training, praised the effort as a key milestone in securing cooperative systems and boosting digital literacy. “Cyber awareness is the foundation of secure cooperative growth in the digital age,” said an NCCF spokesperson. The initiative aligns with India’s broader digital goals, ensuring that even grassroots cooperative institutions are protected from cybercrime threats. Experts from cybersecurity teams and cooperative boards jointly facilitated the program. Advice Key Highlights: In front of IYC 2025, NCCF began offering cyber training. Aim: Strengthen cyber safety across India’s cooperatives. The Ministry of Cooperation supports the initiative. Cyber Safety Advice: Use strong, unique passwords for official systems. All cooperative accounts should have two-factor authentication enabled. Never open dubious attachments or URLs. Report any suspicious activity to cybercrime.gov.in.

Shoplifters are apprehended by this AI technology before they even steal anything

Shoplifters are apprehended by this AI technology before they even steal anything

A Paris-based start-up, Veesion, has created an AI surveillance system that can detect suspicious gestures before shoplifting occurs. Launched in 2018, the tech is now used in over 5,000 stores across Europe, the US, and Canada, helping retailers prevent theft before it happens. Without keeping personal information or utilising biometrics, Veesion’s gesture-recognition AI examines body movement to identify questionable behaviour.  The solution delivers personnel real-time notifications through a mobile app and connects with current CCTV setups. “The algorithm is indifferent to people’s appearance.  As stated by Benoit Koenig, a co-founder of Veesion, “It only cares about how your body parts move over time.” It detects actions like concealing items or irregular handling of products, and immediately alerts the security team with video evidence. Within three months, a shop in the United States reduced losses in the health and beauty department by fifty per cent. The startup recently raised ₹373 crore ($43 million) in Series B funding to expand globally. The tech also helps detect employee theft, which accounts for similar losses as customer shoplifting. “It acts as a deterrent. Staff know AI is watching,” Koenig added. Advice: Veesion’s AI shows how gesture-based surveillance could revolutionise theft prevention in physical stores, without invading privacy. Security Insights for Retailers: Upgrade to AI-enhanced CCTV systems Train staff to respond to real-time alerts Use non-biometric solutions to respect privacy laws Regularly audit security footage for internal theft

Lucknow police bust ₹80 lakh crypto fraud racket, eight arrested

Lucknow police bust ₹80 lakh crypto fraud racket, eight arrested

Lucknow Police uncovered a ₹80 lakh crypto fraud and arrested 8 people involved in illegal USDT trading via Telegram. In a breakthrough against digital fraud, Lucknow Police arrested eight individuals on June 21, 2025, for siphoning off nearly ₹80 lakh through fake USDT (Tether) crypto trading. The racket operated from Lucknow and nearby districts, exploiting loopholes in crypto laws and bank verification systems, as revealed by the Cyber Crime Police. The accused were part of a well-organised cyber racket that transferred illicit money via anonymous Telegram channels operated by Chinese handlers, according to a press release by the Cyber Crime Police Station, Lucknow. They used TRC-20 blockchain network wallets, bypassing Indian legal scrutiny by avoiding KYC. Local “mule” accounts were created to receive money via NEFT, RTGS, and IMPS, withdraw the same day and convert into USDT through peer-to-peer crypto brokers. “These criminals exploited P2P wallets that function without verification, making it nearly impossible to trace funds,” said Inspector Brijesh Kumar Yadav, Cyber Crime Police. During raids, police recovered: ₹1.85 lakh in cash 16 mobile phones 2 laptops and a tablet 4 cars Cheque books and bank passbooks The arrested include youth aged 21–40 years from Lucknow, Basti, Rae Bareli, Gonda, and Barabanki. The accused failed to present any valid crypto exchange records or KYC documents, which confirmed the illegitimacy of their operations. Police booked them under BNS Sections 317(2), 318(4), 61(2), and 111(2) (B) and IT Act Sections 66C and 66D, commonly used for cyber and identity-related fraud. Security Advice: This case exposes how cross-border digital scams are being run under the cover of “crypto trading,” exploiting unregulated platforms and mule accounts in India. Stay protected with these tips: Avoid P2P crypto deals without KYC Do not share bank details or receive suspicious deposits Always verify apps and trading platforms Enable two-factor authentication Report fraud at: www.cybercrime.gov.in

16 Billion Logins Stolen In Mega Data Breach Threatening Apple, Google and More

16 Billion Logins Stolen In Mega Data Breach Threatening Apple, Google and More

In a massive global data breach, hackers have leaked 16 billion login credentials, exposing users of platforms like Apple, Google, Facebook, GitHub, and even government services, according to Forbes. The breach was uncovered this week by cybersecurity researchers who found the records in 30 unprotected datasets, some containing up to 3.5 billion entries each. Cybersecurity experts first noticed a mysterious open database containing 184 million records, which has now proven to be only a small part of a much larger breach. Researchers have since confirmed 30+ datasets leaked online, containing VPN logins, social media accounts, and developer platform access. The breach is not a recycling of old data but fresh, high-value information collected throughout 2025, making it dangerous and exploitable for phishing attacks, account takeovers, and business email compromise (BEC) schemes. “This is not just a leak — it’s a blueprint for mass exploitation,” warned the research team cited in Forbes. Darren Guccie, CEO of Keeper Security, emphasised that the leak’s scale and nature pose “far-reaching risks” to users across sectors. Google has responded by urging users to move beyond traditional passwords and 2FA, and instead adopt passkeys, which are biometric login systems using fingerprint or facial recognition. “Passkeys are phishing-resistant and safer than passwords,” Google stated. Advice: This mega breach highlights how credential leaks remain one of the top cyber threats globally. The fact that the stolen logins are fresh and tied to major platforms increases the urgency for users to act. Cyber Safety Tips: Switch to Passkeys or biometric login methods wherever possible Update your passwords immediately, especially for sensitive accounts Enable multi-factor authentication (MFA) Avoid clicking on suspicious links or emails asking for logins Report scams or suspicious activity at cybercrime.gov.in

IIT graduate among 15 held in Telangana for circulating child porn

IIT graduate among 15 held in Telangana for circulating child porn

TGCSB arrests repeat offenders in state-wide operation; links to trafficking uncovered. Telangana Police arrested 15 individuals, including an IIT graduate, on 18 Jun 2025 for the possession and circulation of child sexual abuse material (CSEAM). The operation followed 57 cyber tip-offs, resulting in 34 FIRs across multiple districts, with cases registered under the IT Act and POCSO laws. The Telangana Cyber Security Bureau (TGCSB), acting on inputs from the Cyber Tip line and in collaboration with NCMEC, ICMEC, and I4C, carried out a coordinated state-wide crackdown. Offenders were arrested from Hyderabad, Warangal, Karimnagar, Jagtial, Jagadgirigutta, and Yadagirigutta. The arrested individuals, aged between 19 and 50, largely belonged to working or middle-class backgrounds. Shockingly, an IIT graduate from Nizamabad, employed at a reputed company, was among those caught. Investigators revealed that the content was being downloaded, stored, and sometimes shared via encrypted platforms. Many of the accused were repeat offenders, tracked using digital forensic evidence and shared intelligence. Further investigation uncovered human trafficking links, with tribal women from remote Telangana mandals like Kerameri and Tiryani being targeted and sold to brothels. One victim managed to escape from Madhya Pradesh and returned home last month. In a related case, Asifabad police arrested six people, including a police constable, while three more remain absconding. Constable Haridas, one of the accused, had prior involvement in similar crimes. Quote from Official: “This is a warning that online child abuse will not go unpunished. We are using every resource to trace and prosecute offenders,” said a senior TGCSB official. Advice: This case highlights the alarming rise in online child exploitation and trafficking, even involving educated individuals and repeat offenders. TGCSB’s CPU unit, launched in February 2025, has already registered 294 FIRs and made 110 arrests, a sharp increase from prior years. Public Safety Tips: Report suspicious online content or activity involving children on cybercrime.gov.in (Women & Child tab) or dial helpline 1930 Do not download or forward any explicit or suspicious content — it’s illegal Educate children and parents about online safety, digital boundaries, and privacy settings Enable parental controls and monitor app permissions regularly

Tea stall owner loses Rs 2.36 lakh in UPI fraud; cyber police nab accused in North-East Delhi

Tea stall owner loses Rs 2.36 lakh in UPI fraud; cyber police nab accused in North-East Delhi

Cyber Police arrest a 21-year-old in North-East Delhi for exploiting a lost SIM card to drain the victim’s bank account via UPI. After his SIM card vanished, a tea shop owner in Seelampur, New Delhi, lost ₹2.36 lakh in a UPI scam.  On June 19, a 21-year-old suspect was taken into custody by the North-East District Cyber Police of Delhi, who also retrieved important evidence, such as SIM cards and a cell phone used in the scam. On June 4, days after discovering unauthorised UPI transactions from his wife’s bank account, the victim, Gareeb Nath Gupta, reported the crime.  His Samsung keypad phone with an active SIM card vanished on May 27. Fraudulent transactions were conducted using the lost SIM between May 28 and June 2. To link the activity to an Airtel Payments Bank account, a special cybercrime unit under the direction of Inspector Rahul Kumar and overseen by ACP Mangesh Gedam employed digital forensics and technical surveillance. The culprit, Md. Monish, a mobile phone repairer from Delhi’s Janta Mazdoor Colony, acknowledged buying stolen phones with SIM cards still in working order.  He transferred money using UPI apps and accessed connected bank accounts using them. One cell phone and two SIM cards have been found by the police, and ₹35,000 has been frozen. They are now investigating a wider network, possibly involved in similar cybercrimes. Quote: “This case shows how even basic phone users are vulnerable. People must immediately block SIM cards if lost and monitor bank accounts closely,” said an official from Cyber PS, North-East Delhi. Advice: The instance demonstrates how low-tech thefts, such as lost phones, can be taken advantage of online, particularly with SIM cards connected to UPI. It also demonstrates how cybercriminals target non-technical individuals as well. Cyber Safety Tips: If your SIM card is lost or stolen, block it right away. Make sure all UPI and banking apps have two-factor authentication (2FA) enabled. Don’t store bank account information or UPI credentials on outdated or unprotected phones. Observe bank statements regularly and report any questionable activity on cybercrime.gov.in.

Google rolls out budget-friendly Gemini 2.5 Flash Lite, opens 2.5 Flash and Pro to all

Google rolls out budget-friendly Gemini 2.5 Flash Lite, opens 2.5 Flash and Pro to all

New model offers high-speed, low-cost performance; Gemini 2.5 Flash and Pro now open to all users. Google has launched a new AI model, Gemini 2.5 Flash-Lite, on June 18, 2025, making it the fastest and most affordable in the Gemini 2.5 series. Available via Google AI Studio and Vertex AI, it supports multimodal tasks with low latency and cost, catering to developers and enterprise users who require scalable AI solutions. The Gemini 2.5 Flash-Lite is designed for high-volume, latency-sensitive tasks such as translation, classification, and reasoning, offering improved performance over its predecessor, the 2.0 Flash-Lite. Google claims it delivers superior accuracy in coding, science, and multimodal benchmarks while being cost-efficient. Despite being a “lite” version, it includes advanced features such as a 1 million-token context window, tool integration (like Google Search and code execution), and flexible compute scaling based on budget. Google has also announced the general availability of Gemini 2.5 Flash and Pro, previously limited to select users. Firms like Snap and SmartBear have already integrated them into their production systems with success. These models are now accessible via Google AI Studio, Vertex AI, and the Gemini app, expanding usage beyond developers to general users through tools like Search. Quote: “Gemini 2.5 Flash-Lite is designed to bring scalable, affordable, and high-performance AI to everyone — from individual developers to large enterprises,” said a Google spokesperson in the launch statement. Advice: Google’s move to open Gemini 2.5 models, especially the new Flash-Lite, offers a powerful AI toolkit for cost-conscious developers and businesses. Its lightweight design doesn’t compromise capability, making it ideal for fast, real-world deployment. Tips for AI users: Choose models based on task latency and cost requirements Explore Google AI Studio or Vertex AI for hands-on testing Use Flash-Lite for rapid classification, translation, and large prompt processing Review Google’s documentation to integrate AI efficiently and securely

Cyber sexual predator arrested in Karnataka after a two-year manhunt

Cyber sexual predator arrested in Karnataka after a two-year manhunt

The accused created fake profiles, shared explicit content, and targeted women using over 90 email IDs and 13,500 stolen images. A 25-year-old man from Karnataka’s Ballari area was caught by Mumbai Police after he had eluded detection for two years.  He had been harassing and defaming women online by posing as them, making phoney profiles, and posting sexual material. His arrest was made in Sandur following a complaint filed by a Mumbai-based student. When authorities found the culprit, Shubham Kumar Manoj Prasad Singh, he was employed in Sandur as a security guard. A female student in Mumbai filed a complaint after discovering pornographic content uploaded under her identity, sparking the start of the criminal probe. Shubham allegedly made more than 90 email accounts and more than ten phoney social media identities to harass and mimic women. Police recovered a massive cache of over 13,500 images of women, many obtained without consent, stored on his mobile phone. He used video calls to trap women, then edited and circulated the footage on social media, according to investigators. His digital trail was traced through technical inputs from Google, leading to his location. A senior cyber officer stated, “This arrest highlights the dangerous reach of digital predators and the need for public vigilance online.” The accused holds a diploma from Delhi and had managed to avoid arrest for over two years while continuing his activities in secrecy. Advice: The growing danger of cyber sexual offences and the pressing necessity for understanding digital safety are highlighted by this instance. Mumbai Police are continuing their investigation to identify more victims. Online Safety Tips: Never share personal videos or sensitive content online Enable two-factor authentication on social media accounts Report impersonation or harassment immediately on cybercrime.gov.in Be cautious of suspicious friend requests and video calls from strangers