1. CBI Raids Multiple Locations in South India, Arrests Three in Major Cyber Fraud Case
The Central Bureau of Investigation (CBI) conducted raids across several South Indian cities, arresting three suspects linked to a large-scale cyber fraud operation. Officials said the gang defrauded victims nationwide using fake investment and job portals. Seized materials include laptops, digital wallets, and documents tied to money laundering networks.
2. ED Returns Flats to Homebuyers in Syndicate Bank Fraud Case in Udaipur
The Enforcement Directorate (ED) restituted residential flats to homebuyers affected by the Syndicate Bank fraud case in Udaipur. The properties were previously attached under the Prevention of Money Laundering Act. Officials said the action ensures justice for victims defrauded through bank loan diversions and forged real estate documentation.
FCRF Launches CCLP Program to Train India’s Next Generation of Cyber Law Practitioners
3. Police Uncover China-Linked Investment Scam After Woman Reports Fraud
Police uncovered a major China-based cyber fraud network following a complaint by a woman duped in an investment scheme. Investigations revealed that scammers operated through fake apps and overseas-controlled accounts. Authorities said such transnational frauds are becoming increasingly sophisticated, using cross-border financial channels to evade detection.
4. Delhi Man Arrested for ₹23 Lakh Forex Trading Fraud
Delhi police arrested a man accused of defrauding investors of ₹23 lakh through a fake forex trading platform. The suspect promised high returns on currency trades and manipulated screenshots to deceive victims. Investigators said the case highlights the growing number of unregulated online investment scams targeting urban professionals.
5. 76-Year-Old Woman Loses ₹57 Lakh in Combined Investment and ‘Digital Arrest’ Scams
A 76-year-old woman lost ₹57 lakh after falling victim to back-to-back scams involving fake investment opportunities and a “digital arrest.” Fraudsters impersonated law enforcement to extort funds after the initial fraud. Police said criminals increasingly combine multiple scam tactics to extract maximum money from vulnerable victims.
INTERNATIONAL
6. US Authorities Seize $15 Billion in Bitcoin Linked to Global ‘Pig-Butchering’ Scam
US federal agents seized over $15 billion in Bitcoin tied to an international “pig-butchering” scam, marking one of the largest crypto seizures in history. The operation involved fake online romances and investment schemes targeting thousands. Authorities said the recovery underscores global efforts to dismantle large-scale cryptocurrency fraud networks.
7. Microsoft Restricts Internet Explorer Mode in Edge After Zero-Day Exploit Detected in Chakra Engine
Microsoft imposed new limits on Internet Explorer Mode within Edge after detecting active exploitation of a zero-day vulnerability in its Chakra scripting engine. The flaw enabled remote code execution via compromised websites. Security analysts urged users to apply patches immediately and transition to updated, secure browser frameworks.
The First Firm to Assess Your DFIR Capability Maturity and Provide DFIR as a Service (DFIRaaS)
8. New ‘Pixnapping’ Android Vulnerability Allows Malicious Apps to Steal 2FA Codes Without User Permissions
Researchers discovered a critical Android flaw, dubbed “Pixnapping,” allowing rogue apps to capture two-factor authentication (2FA) codes without requiring explicit permissions. The vulnerability abuses overlay and accessibility features to bypass security layers. Google acknowledged the issue and has begun rolling out patches to safeguard users from credential theft.
9. ‘RMPocalypse’ Exploit: Single 8-Byte Write Compromises AMD SEV-SNP Confidential Computing Security
Security researchers revealed a severe flaw, nicknamed “RMPocalypse,” affecting AMD’s SEV-SNP confidential computing technology. The exploit allows attackers to corrupt memory integrity with a single 8-byte write, undermining isolation guarantees. AMD released firmware updates to mitigate the threat, emphasizing the need for prompt patching in cloud and enterprise environments.
10. Researchers Detail TA585’s MonsterV2 Malware, Revealing Advanced Capabilities and Attack Chain
Cybersecurity experts analyzed TA585’s MonsterV2 malware, uncovering its advanced capabilities for credential theft, persistence, and lateral movement. The malware employs sophisticated obfuscation and modular payload delivery. Researchers warn it targets financial institutions and corporate networks, reflecting the increasing complexity of financially motivated cyber espionage campaigns.