1. Retired Entrepreneur Duped of ₹22 Crore in City’s Biggest Cyber Fraud Case
A retired entrepreneur has lost ₹22 crore in what police describe as the largest cyber fraud reported in the city so far. The victim was allegedly manipulated through sustained digital deception, with funds transferred to multiple accounts as investigators probe the fraud’s scale and network.
2. Operation ‘Mule Hunt’: Nine Arrested for Allowing Bank Accounts to Route Cyber Fraud Proceeds
Under Operation ‘Mule Hunt’, police have arrested nine individuals for allowing their bank accounts to be used to route proceeds of cyber fraud. Officials said the accused acted as money mules, facilitating rapid movement of illicit funds for organised cybercrime networks.
3. Gujarat CID Arrests Eight Cyber Fraud Accused Following Delhi FIU Tip-Off
The Gujarat CID has arrested eight persons involved in cyber fraud following a tip-off from the Delhi Financial Intelligence Unit. Investigators said financial trails and suspicious transactions led to the arrests, highlighting inter-agency coordination in tracking and disrupting organised cybercrime operations.
Certified Cyber Crime Investigator Course Launched by Centre for Police Technology
4. Police Launch Operation ‘Mule Hunt,’ Arrest 10 in Cyber Fraud Cases
Police have launched Operation ‘Mule Hunt’ to crack down on cyber fraud and arrested 10 accused linked to multiple cases. Authorities said the suspects enabled fraudsters by providing bank accounts and digital access, helping launder money obtained through online scams.
5. Kotputli Police Bust International Cyber Fraud Syndicate
Kotputli police have busted an international cyber fraud syndicate operating across borders and arrested several accused. Officials said the gang was involved in online scams and financial fraud, with investigations underway to identify overseas links, trace money trails, and locate additional suspects.
INTERNATIONAL
6. Google Gemini Prompt Injection Flaw Leaked Private Calendar Data Through Malicious Invites
Security researchers revealed a prompt injection flaw in Google Gemini that exposed users’ private calendar data through malicious meeting invites. Attackers embedded hidden instructions in invitations, causing the AI to disclose sensitive scheduling information, raising concerns over AI safety, prompt isolation, and enterprise data protection.
7. Hidden Costs of DevOps and SaaS Downtime Expose Risks for Cloud-First Businesses
Experts warn that DevOps and SaaS outages carry significant hidden costs for cloud-first businesses, beyond immediate service disruption. Downtime can lead to revenue loss, compliance risks, reputational damage, and cascading operational failures, highlighting the need for stronger resilience planning and real-time monitoring across cloud environments.
Certified Cyber Crime Investigator Course Launched by Centre for Police Technology
8. New ‘StackWarp’ Hardware Vulnerability Undermines AMD SEV-SNP Protections on Zen CPUs
Researchers have disclosed a new hardware flaw dubbed StackWarp that weakens AMD SEV-SNP protections across Zen 1 to Zen 5 processors. The vulnerability could allow attackers to bypass memory isolation, raising serious concerns for confidential computing and cloud workloads relying on trusted execution environments.
9. CrashFix Chrome Extension Spreads ModeloRAT Using Fake Browser Crash Lures
Cybersecurity analysts have identified a malicious Chrome extension called CrashFix that delivers the ModeloRAT malware. The extension uses fake browser crash alerts to trick users into installation, enabling attackers to gain remote access, steal data, and maintain persistence on compromised systems through deceptive social engineering tactics.
10. Security Flaw in StealC Malware Panel Lets Researchers Monitor Threat Actor Activity
A security vulnerability in the StealC malware control panel has allowed researchers to secretly observe threat actor operations. The flaw exposed internal dashboards, victim statistics, and command activity, providing rare insight into cybercriminal infrastructure and highlighting operational weaknesses within widely used malware-as-a-service platforms.
