Achive.php the cyber shark Archives - Page 10 of 18 - The Cyber Shark

The Ghibli Art Craze: An Adorable Movement with a Secret Danger

Ghibli Art

The Ghibli Art trend has gone viral, turning real-life photos into whimsical animations, but cybercriminals are exploiting it with scams and malware. Authorities warn users to stay cautious and use only trusted platforms. The quirky new trend of Ghibli-style pictures has taken over the internet in recent weeks. From kids and influencers to famous people like Sachin Tendulkar and even official government websites, studio Ghibli’s distinctive animation style is being used to turn everyone’s real-life images into fantastical settings. However, there is a significant cybersecurity risk hidden beneath the idyllic images. The public was recently warned by the Chandigarh Police about the rise in cyber scams that use the Ghibli art craze as a lure. Why is Ghibli’s art so well-liked, and what is it? The renowned Japanese animation studio Studio Ghibli, founded by Hayao Miyazaki, Isao Takahata, and Toshio Suzuki, serves as the model for Ghibli Art. Studio Ghibli, well-known for classic movies like Spirited Away, My Neighbor Totoro, and Howl’s Moving Castle, is praised for its delicate colour schemes, emotionally charged narratives, and hand-drawn characters. Users may now quickly transform ordinary photographs into Ghibli-style illustrations thanks to the development of AI-powered tools. It’s now easier than ever to follow the trend, thanks to platforms like ChatGPT, which allow users to create up to three photos per day. How Did the Trend Go Viral? It all began when Seattle software engineer Grant Slaton created a Ghibli-style picture of his family at the beach using OpenAI’s image-generating tool. When he shared it on X (previously Twitter), it became viral, garnering millions of views and more than 45,000 likes. What started as a private post swiftly became a worldwide sensation, with others sharing their Ghibli-inspired works all across the world. The Dark Side: Cybercrime Hiding in Plain Sight The growing popularity of the fad presented an opportunity for cybercriminals. The Chandigarh Police said that criminals are now tricking people into installing malware or divulging personal information by exploiting phoney Ghibli art portals. Here’s how: Phishing Websites Phishers have created phoney Ghibli art websites that ask visitors to submit pictures. Once submitted, a photo or personal data may be stolen and used maliciously. Phishing emails Phishing emails purporting to be from Studio Ghibli are being sent to some users. These could provide links to “official” art outlets, products, or invitations to contests. However, after being clicked, these URLs have the potential to install malicious software that steals private information, including banking information and passwords. Scam Contests & Giveaways Cybercriminals are promising Ghibli-style artwork in exchange for user information through phoney online competitions and giveaways. It’s only a means of spreading viruses or gathering data. Dangerous Downloads Wallpapers or “Ghibli art packs” are available on some websites, however, the files could be infected with ransomware or viruses that lock down your computer or steal data. False Artist Listings Scammers are also using social media to pose as Ghibli fan artists. They might attempt to deceive users into disclosing personal information or offer phoney artwork.  How to Stay Safe: Tips from Cyber Experts Here are some crucial safety precautions if you’re following the Ghibli trend: When creating Ghibli artwork, only use reputable and authorized sites. Never click on strange links or dubious emails. Refrain from giving strangers access to your personal or financial information online. If a contest or deal looks “too good to be true,” it probably is. Therefore, make sure to check it out first. Inform cybercrime authorities about any dubious emails, profiles, or websites.  Final Thoughts Unquestionably stunning, the Ghibli Art movement is a celebration of creativity in the digital era. Yet, particularly on the internet, beauty frequently comes with risks. While incorporating a little fantasy into everyday life is fantastic, it’s equally crucial to remain vigilant and watchful. Go ahead and take in Ghibli’s magic, but be careful when you click. Art should be joyful, not dangerous.

Google Gemini Live update brings screen, and camera awareness to these phones

Google Gemini

Google rolls out Project Astra-based camera and screen-sharing features in Google Gemini Live, enhancing real-time interaction on Pixel 9 and Galaxy S25 devices. Older Pixel users can access the features with a Gemini Advanced subscription. Google has started rolling out Project Astra-based cameras and screen-sharing features in the Google Gemini Live interface as part of the most recent Pixel Drop. Devices from the Samsung Galaxy S25 and Google Pixel 9 series come with these features free of charge. The capabilities are also available to users of previous Pixel devices, although they will require a Google Gemini Advanced membership. More participatory and visually aware conversations are made possible by the new Google Gemini Live features, which let users share their device’s screen or camera feed in real-time with the AI assistant. Details of camera and screen sharing with Gemini Live To obtain immediate information, users can utilize the camera on their smartphone to display Google Gemini as a landmark, a store, or a dish. Gemini changes its replies in real time as the camera moves. Similar to this, users can receive assistance during screen sharing based on the content that is shown on their screen, including documents, photographs, and web pages. How to use Gemini Live to share a screen Screen sharing can be enabled in two ways: Using the Gemini App on Mobile: Go to the live interface after launching the Google Gemini app. Press the recently added “Turn on screen sharing” button located at the bottom. Select “Share screen” from the option that appears. Outside of the Gemini app: You can use a voice command or long-press the power button to activate Google Gemini . Press the floating “Share screen with Live” button that shows up above the Gemini overlay. Select “Share screen” from the option that appears. Go back to the Gemini mobile app and select “Turn off screen sharing” to end sharing. As an alternative, press “Stop sharing” on the Screen Sharing card after swiping down from the top edge of the screen. Additionally, if the screen is locked or Live is paused, screen sharing instantly ends. How to use Gemini Live to share a camera Users can show Gemini what they are seeing by using their camera app while screen sharing is enabled. As an alternative: To begin sharing a live feed in Gemini Live, tap the camera icon. To stop, tap it one more. As necessary, switch between the front and rear cameras. According to Google, the camera will switch off on its own in the following circumstances: Gemini Live will automatically restart when it is resumed after being paused. You will have to manually turn the camera back on if your screen locks.

Google Unveiled Sec-Gemini v1, a New AI Model for Cybersecurity

Sec-Gemini v1

Google has launched Sec-Gemini v1, an advanced AI model designed to enhance cybersecurity by aiding in threat analysis, vulnerability assessment, and incident investigation. The model outperforms rivals on key benchmarks and is being offered to select partners for research collaboration. Google has made a huge attempt to counter cyber-attacks by introducing Sec-Gemini v1, an experimental AI model meant to revolutionize cybersecurity. Elie Burzstein and Marianna Tishchenko from the Sec-Gemini team introduced a new AI model designed to help cybersecurity defenders confront the growing complexity of cyber-attacks using advanced AI. The Sec-Gemini team emphasized the fundamental asymmetry in cybersecurity in a blog post: attackers only need to take advantage of one weakness, while defenders must fight against every potential assault. Security experts have long struggled with this imbalance, which makes their work laborious and error-prone. Sec-Gemini v1 uses AI-powered tools to “force multiply” cybersecurity workflows to give defenders the upper hand again. Based on Google’s Gemini model, Sec-Gemini v1 blends state-of-the-art reasoning abilities with near-real-time cybersecurity knowledge. Using a range of data sources, including Google Threat Intelligence (GTI), the Open Source Vulnerabilities (OSV) database, and Mandiant Threat Intelligence, In crucial domains like incident root cause investigation, threat analysis, and vulnerability impact assessment, the model provides unmatched performance. On the CTI-MCQ benchmark, a leading indicator of cybersecurity threat intelligence, it outperformed rivals by at least 11%. On the CTI-Root Cause Mapping (CTI-RCM) benchmark, which assesses a model’s capacity to decipher vulnerability descriptions, identify the underlying causes, and categorize them using the Common Weakness Enumeration (CWE) taxonomy, it scored at least 10.5% better than its competitors. Impact on the Real World and Cooperation Google offers a noteworthy example that demonstrates the usefulness of Sec-Gemini v1. The model provided a thorough explanation enhanced by Mandiant Threat Intelligence data in addition to accurately identifying “Salt Typhoon,” a known threat actor, which is something that not all AI models are capable of. Additionally, using information from OSV and contextualizing it with threat actor insights, Sec-Gemini v1 examined vulnerabilities associated with Salt Typhoon. It is anticipated that this level of research will aid cybersecurity experts in evaluating risks and addressing threats more effectively. Google underlined that the sector must work together to advance AI-driven cybersecurity. A limited number of organizations, institutions, experts, and non-governmental organizations shall have free access to Sec-Gemini v1 for research purposes in order to promote cooperation. Google has given a form for interested parties to use to seek early access. Google is putting itself at the forefront of AI cybersecurity with Sec-Gemini v1, providing a preview of a future in which defenders will be more prepared to fend off attackers. Tools like this could be crucial in levelling the playing field as cyber threats continue to change.

Financial frauds top Mizoram cybercrimes, over half of total cases filed

Financial frauds

Financial frauds is the most common cybercrime in Mizoram, accounting for over 56% of the 321 cases reported since 2020. Authorities have recovered ₹1.42 crore, with 113 arrests and 40 convictions made in cybercrime cases during this period. According to official data, financial fraud accounted for 56.38 per cent of the 321 cases that were filed between January 2020 and March 11 of this year, making it the most prevalent cybercrime in Mizoram. According to data from the state cybercrime police station, 181 occurrences of financial crimes were reported during that time, mostly online banking fraud and impersonation deception. Identity theft (32 incidents), child pornography (16), harassment on social media (nine), copyright infringement (seven), false rumours (five), and hacking (one) are among the other offences. According to the archives, 2022 saw the greatest number of financial crimes, with 107 incidents documented. Approximately Rs 1.42 crore was recovered in financial frauds cases between 2021 and March 11, 2025. Records show that the state had the highest number of cybercrimes in 2022 (158 incidents), followed by 2023 (72 cases). Of the 41 cybercrime instances that occurred in 2024, 15 involved sexual harassment and 17 involved financial offences. Thirteen cases of cybercrime were recorded as of March 11 of this year, including six cases of sexual harassment and four cases of financial frauds. According to the records, since 2021, 113 people—including eight minors—have been arrested in cybercrime cases, and 40 of them have been found guilty.

Tech Mahindra and Nuix Collaborate to Provide Improved Data Investigation and Cybersecurity Tools

Tech Mahindra and Nuix Collaborate

Tech Mahindra and Nuix , an Australian software company, have partnered to offer better data protection, fraud detection, and regulatory compliance solutions. The partnership combines Nuix’s AI-powered investigative and data analytics tools with Tech Mahindra’s expertise in digital engineering, cyber risk management, and artificial intelligence (AI). Tech Mahindra has partnered with Australian firm Nuix to enhance data investigation and cybersecurity solutions by integrating Nuix’s AI-powered analytics tools into its services. The collaboration aims to help businesses manage data breaches, fraud, and compliance, starting in the Asia Pacific and Japan regions. The main goal of the collaboration is to include Nuix’s Neo platform within Tech Mahindra and Nuix service portfolio. Businesses will be able to better manage data breaches, safeguard sensitive information, and react to fraud and regulatory concerns as a result, especially those in industries with stringent compliance requirements like banking, insurance, telecommunications, and government. Large amounts of structured and unstructured data can be processed by Nuix’s technologies, which then make the data searchable and actionable for legal examinations and investigations. “We will enable our clients to put in place reliable, economical, and incredibly scalable security solutions for the future. According to Harshvendra Soin, President of Asia Pacific and Japan Business at Tech Mahindra, “this partnership will accelerate our ability to deliver exceptional value, especially during critical moments like data breach incidents where rapid response is essential.” Before going worldwide, the collaborative endeavour will initially concentrate on clients in the Asia Pacific and Japan regions. Mahindra and Nuix will offer its knowledge of digital investigations and data privacy, while Tech Mahindra will assist with worldwide sales and delivery. In the wake of escalating cybersecurity concerns, the partnership is anticipated to assist both companies in increasing their footprints in regulated markets and providing more reliable solutions for handling digital evidence and personal data. Tech Mahindra and Nuix will collaborate to help businesses bolster their defences against fraud, data breaches, and regulatory risk. Through the partnership, customers will have access to some of Nuix’s most advanced data privacy, investigative, and legal solutions, such as Nuix Neo Data Privacy, Nuix Neo Investigations, and Nuix Neo Legal, which will help safeguard sensitive information (like personally identifiable information), expedite investigations, and oversee the curation of vast amounts of digital evidence for legal cases, according to Jonathan Rubinstein, CEO of Nuix.

Ghibli glam or privacy scam? Chandigarh Cyber Cell issues advisory

Ghibli

The Chandigarh Police Cybercrime Cell has warned against rising online frauds involving fake Ghibli artwork and merchandise. Users are advised to stay alert, verify sources, and avoid suspicious links or offers to protect their data and finances. The Chandigarh Police Cybercrime Cell has issued a warning about possible frauds that pose as Ghibli artwork or items. Ghibli’s artificial intelligence (AI)-generated graphics have garnered a lot of attention in the past week. According to a Cybercrime Cell statement, these crimes can take many different forms, and both authors and fans should be mindful of the possible dangers that exist in the digital realm. Cybercriminals frequently create phoney internet shops or auction platforms that purport to sell Ghibli artwork or authentic items. These websites have the potential to send fake goods, steal personal information, or vanish after a transaction. Before making a purchase, always confirm the legitimacy and authenticity of websites, according to DSP (Cyber Cell) Venkatesh. According to the DSP, who briefed on several cyber scams that may involve Ghibli, phishing emails may be sent by fraudsters posing as Ghibli news or offers. These emails may contain links to phoney social media profiles or retail locations. The DSP warned that clicking on these links could result in the download of malware or the loss of personal data. According to reports, phoney Ghibli-related competitions or prizes are frequently employed as a means of obtaining user information or persuading users to download harmful programs. Additionally, some cybercriminals pass off malware or ransomware as downloaded content (like Ghibli wallpapers or art packs), which is how hazardous software is camouflaged as Ghibli art. According to the Cyber Cell, if a person downloads the content, harmful software may be placed on their device, which might lock or steal data. Regarding identity theft, the DSP stated that cybercriminals may fabricate websites or social media profiles that pose as artists, particularly fan artists, to obtain admirers’ personal information or even to sell phoney artwork. When interacting with creators or fan communities, exercise caution at all times. The Cyber Cell advised using platforms that let users confirm their identity, including verified social media accounts, and refraining from disclosing private information, such as credit card numbers unless you have faith in the platform. The Cyber Cell provided information on how to confirm authenticity, stating that you should always make sure that websites or accounts that sell Ghibli artwork, products, or content are authentic. Report any stolen Ghibli artwork or fake goods you come across to the appropriate authorities or websites. Purchase genuine goods and downloads from reputable, official websites to avoid fraud, DSP Venkatesh said. Furthermore, it’s best to avoid falling for offers that seem too good to be true, Especially when they come from unknown websites or unwanted emails. According to the DSP, you may safeguard your work and yourself against cybercrime involving Ghibli art by remaining aware and alert.

BFSI and Tech Lead India’s Cyber Insurance Surge Amid Growing Attacks

India’s Cyber Insurance

Cyber insurance adoption in India is surging, driven by rising cyberattacks, with BFSI and tech sectors holding a 70% market share. Nearly 100% policy renewals and increased first-time buyers highlight its growing role in ensuring business continuity and regulatory compliance. In India, cyber insurance is expanding at an unprecedented rate, with 100% of policies being renewed as companies realize how often cyberattacks are becoming. With a combined 70% market share, the BFSI (35–40%) and technology (30%) sectors are driving uptake, per a survey by Policy Bazaar for Business. The survey also shows that business interruptions caused by data breaches account for 45% of all cyber insurance claims, underscoring the critical role that cyber coverage plays in preserving business continuity. According to the report, the largest penetration of cyber insurance is found in mid-to-large firms with annual sales of at least ₹10 crore, suggesting a better awareness of regulatory requirements and cyber hazards. The following is the adoption breakdown by industry: BFSI (35-40%) – Financial institutions are the biggest buyers of cyber insurance due to increased financial fraud, regulatory scrutiny, and customer data protection requirements. Technology & IT (30%) – IT and internet companies are giving risk mitigation through insurance top priority because of their data-heavy operations and high vulnerability to cyberattacks. Start-ups (25%) – Adoption among rapidly expanding firms is being driven by venture capital investors and contractual responsibilities. Healthcare (5%) – More and more hospitals and healthcare organizations are protecting themselves from ransomware and data intrusions. Logistics (5%) – Logistics companies are investing in coverage as a result of the increased cyber dangers brought about by the growth of digital supply chains. According to the survey, a notable change has also occurred, with 30–35% of companies acquiring cyber insurance for the first time. This implies that individuals are becoming increasingly conscious of the operational and financial risks associated with cyberattacks, especially for start-ups and mid-sized enterprises. More and more businesses are adopting a proactive strategy, acquiring coverage before an attack, in place of a reactive one. What’s driving cyber insurance claims? The survey also sheds light on the reasons why companies are submitting cyber insurance claims, with the biggest percentage (45%) citing business disruptions brought on by data breaches. Claim Type Percentage of Claims Business Interruption from Data Breach 45% Social Engineering Attacks (Phishing, CEO Fraud) 25% Ransomware Incidents 20% Other 10% Businesses are using insurance to cover both direct financial losses and operational disruption as a result of the increase in ransomware attacks and social engineering scams. According to the report, growing contractual duties and regulatory constraints have caused the cyber insurance market to expand rapidly over the past 12 to 24 months. Regulatory compliance: Businesses are being forced to strengthen their cyber resilience in response to more stringent cybersecurity regulations and data protection rules. Contractual requirements: As part of their risk management framework, businesses, particularly in the BFSI and IT sectors, now demand that partners and vendors obtain cyber insurance. Risk assessments: Businesses are aggressively detecting weaknesses and obtaining insurance before problems arise. Eva Saiwal, Head of Liability Insurance at Policy Bazaar for Commercial, notes that “cyber insurance has evolved from a niche product to a business necessity.” The nearly 100% renewal rate suggests that businesses consider it essential. Cyber insurance is now a crucial component that facilitates business continuity in addition to financial recovery. Building a robust digital ecosystem will require incorporating insurance into cyber risk management plans as cyber threats increase.

Maharashtra Cyber Corporation was formed to audit govt and Pvt. Firms’ preparedness for fraud

Maharashtra Cyber Corporation

The Maharashtra government has transformed its Cyber Command Center into the Maharashtra Cyber Corporation to strengthen cybersecurity readiness. It will audit and guide government and private firms on cyber fraud prevention. On April 1, 2025, the Maharashtra government formally transformed its Maharashtra Cyber Corporation Command Center into a cyber corporation that will investigate the state’s overall readiness for cyber security. It will serve as a guide for public and commercial organizations, as well as government departments, on safe cyber practices and cyber security. At a cabinet meeting last month, the idea to turn the MMaharashtra Cyber Corporation Police into a company was accepted. Maharashtra Cyber, which operated off of a floor at Cuffe Parade, received an upgrade last year when the state government invested Rs 838 crore and gave it the entire Mahape building in Navi Mumbai. An official added, “We will be guiding government and private companies in matters of cyber security. To make sure they don’t become victims of cyber fraud, this will be done. Private businesses will be subject to yearly audits and need to adhere to the security protocols established by the Corporation. According to the Government Resolution, the state government will own all of the corporation when it is formed under the Companies Act. The Corporation’s authorized share capital will be Rs 200 crore. The entire paid-up and subscribed share capital will come from the state government. This will cover the corporation’s first year’s necessary administrative costs, and any further administrative costs will be covered by the corporation’s revenue, the GR stated.

Gift Card Scams: Protect Yourself from Fraudsters

Gift cards

Scammers use gift cards to trick victims into making fraudulent payments, often by posing as government agencies or businesses. Always remember—gift cards are for gifts, not payments. Gift card are for gifts not for payments. Scammers are the only ones who will advise you to purchase a gift card and provide them with the card’s back numbers.  You will never be told to purchase a gift card to pay a reputable government agency or business. Government agencies, such as the IRS, Treasury Department, FBI, or local police departments, will not accept any form of gift card as payment and will not ask you for gift card information, especially over the phone. You should never be asked to pay your utility bills, bail money, debt collection, or hospital bills with gift cards. If you are, it’s a scam. Gift cards should never be used to settle debt collection, utility bills, bail money, or medical bills. It is a scam if someone makes such a demand. How Gift Card Scams Work Scammers try to convince victims to purchase Gift cards and reveal the numbers by contacting them by phone, text, email, or social media. These are the typical strategies employed: Scammers will say it’s urgent They will warn that if you don’t pay them immediately, dire consequences will ensue. Resist the pressure to act immediately. Slow down and talk with someone you trust. Don’t pay. It’s a scam. Specifying Which Gift Card to Buy They might instruct victims to purchase a particular brand of Gift Card and sometimes even specify where to buy it. To avoid detection, scammers may direct victims to multiple stores. Some fraudsters remain on the phone with victims while they purchase the cards. If this happens, hang up immediately. Asking for Gift Card Numbers and PINs The scammer requests the numbers and PIN codes on the back of the Gift Card to access the money. Never share these details with anyone. Common Gift Card Scams Gift Card scams are usually part of larger fraudulent schemes. Scammers use different stories to manipulate victims into buying gift cards. These are a few of the most prevalent kinds: Government Impersonation Scams Fraudsters claim overdue taxes or fines by impersonating representatives of organizations such as the IRS, FBI, or local police. Gift cards are never required as payment by government entities. Tech Support Scams Scammers believe there is a problem with your computer and pose as representatives of an IT company. They may ask for remote access or demand payment via gift card for a fake repair. Legitimate tech support services never contact customers this way. Emergency Scams Someone pretending to be a friend or relative says they are in desperate need of assistance because of money problems. To sound like a loved one, some people employ voice cloning. Before answering a request, be sure everything is in order. Fake Prize Scams Scammers say you won something, but you have to use a gift card to pay taxes or other costs. Reputable awards never demand payment in advance. Utility Company Scams Fraudsters pose as representatives of water or electricity providers and threaten to cut off service unless a gift card is paid right away. This is not how utility companies work. Romance Scams Scammers build relationships on the internet before requesting gift cards as payment. Never give someone you haven’t met in person money or presents. Fake Check Scams Victims receive a check for an excessive amount and are asked to return the difference using a gift card. The check later bounces, leaving the victim out of money. How to Respond If You Gave a Scammer a Gift Card If you realize you have been scammed, act quickly: Notify the gift card company of the scam right away. Even if the scam happened some time ago, report it. Your chances of getting your money back are better the sooner you take action. Request a refund Some companies have measures in place to help scam victims recover lost funds. Always ask. Report fraud to the FTC Visit ReportFraud.ftc.gov to file a complaint. Your report helps authorities track down scammers. Contacting Gift Card Companies If you have the gift card and purchase receipt, contact the company that issued it. Below are the customer service numbers for major gift card providers: Amazon: 1-888-280-4331 American Express: 1-877-297-4438 Apple/iTunes: 1-800-275-2273 Best Buy: 1-888-237-8289 eBay: Customer Support Chat Google Play: Report fraud to Google MoneyPak: Fraud claim submission on their website ReloadIt: 1-888-633-9434 Sephora: 1-877-737-4672 Steam: Report fraud via Steam Support Target: 1-800-544-2943 Vanilla: 1-833-322-6760 Visa: 1-800-847-2911 Walmart: 1-888-537-5503 Look for your card issuer’s customer service details online or on the back of the card if they are not on the list.  How to Buy and Use Gift Cards Securely Use these precautions to avoid fraud: Purchase from reliable merchants Don’t buy from online auction sites because the cards can be stolen or counterfeit. Inspect the card before purchase Make sure the PIN is hidden and the protection stickers are still in place. Select an alternative card and notify the store employees if anything appears to be incorrect. Keep records of your purchase Save the gift card and store receipt. Take a photo of both as proof of purchase. These details will help if you need to report fraud or recover funds. Final Reminder: Stay Alert! Gift cards are for gifts, not payments. Never follow instructions to purchase a gift card. It’s a fraud if someone asks you to pay using a Gift Card. Gift card fraud can be prevented for both you and other people by remaining vigilant and knowledgeable.