The Most Common Google Search Scam That Affects Everyone

The rise of fake customer service numbers on Google has led to a surge in remote access scams, putting users’ privacy and security at risk.

In an age where online searches are often the first step to resolving issues, a troubling trend has emerged: scammers are exploiting Google search results to deceive unsuspecting users. When faced with a problem related to banking or deliveries, many individuals instinctively search for the company’s customer service number. Unfortunately, this common practice has become a significant trap for scammers, resulting in financial loss and compromised personal security.

One alarming account comes from a man named Gabriel, who reached out for help after a distressing experience. He recounted, “I called my bank to check on some charges I didn’t authorize. I called the number on the bank statement, but they told me to go online. I googled the company and dialed the first number that popped up. Some foreign guy got on the phone, and I explained about the charges. Somehow, he took control of my phone, where I didn’t have any control. I tried to shut it down and hang up, but I couldn’t. He ended up sending an explicit text message to my 16-year-old daughter. How do I prove I didn’t send that message? Please help.”

Gabriel’s experience is not an isolated incident. This type of scam, known as a remote access support scam, involves scammers posing as legitimate bank or tech support representatives. They trick victims into installing software that grants them control over the victim’s device. Once they gain access, they can steal sensitive information, send unauthorized messages, or lock users out of their own devices.

Search engines, including Google, often prioritize paid advertisements in their results. Scammers capitalize on this by purchasing ad space to appear above legitimate customer service numbers. These fraudulent listings can look remarkably professional, complete with company logos and seemingly authentic toll-free numbers. When victims call these numbers, they are greeted by scammers who sound knowledgeable and trustworthy, further lowering their defenses.

Once the scammer establishes trust, they typically instruct the victim to download remote access software, such as AnyDesk or TeamViewer. This software allows the scammer to take control of the victim’s device, leading to potentially devastating consequences.

In light of Gabriel’s harrowing experience, it is crucial for individuals to take immediate action if they suspect they have fallen victim to such a scam. The first step is to turn off the compromised device immediately. Restarting the phone in Airplane Mode and avoiding Wi-Fi connections can help prevent further unauthorized access. Running a full antivirus scan with reliable software is also essential to identify and remove any malicious programs.

Victims should use a secure device that has not been compromised to reset passwords for key accounts, including email, cloud storage, and banking logins. Creating strong, unique passwords for each account and enabling two-factor authentication (2FA) can provide an additional layer of security.

It is also advisable to check if the victim’s email has been exposed in previous data breaches. Utilizing a password manager with a built-in breach scanner can help identify if personal information has been compromised. If any matches are found, it is crucial to change reused passwords and secure those accounts with new credentials.

Victims should inform their phone provider about the unauthorized access and request a check for any remote management apps or SIM-swap activity. Additionally, notifying the bank’s fraud department and reporting the fake number found on Google is vital. Keeping records of all communications, including screenshots, can be helpful if local law enforcement needs to be involved.

To further protect against such scams, individuals should always verify customer service numbers by typing the company’s official web address directly into their browser or using the contact information printed on their bank statements or cards. Scammers often create fake numbers that appear in search results, hoping to mislead users.

It is essential to remain calm when faced with urgent requests for action, as scammers often rely on panic to manipulate victims. If someone insists on immediate action or requests the installation of software like AnyDesk or TeamViewer, it is crucial to hang up and verify the situation through official channels.

Installing and regularly updating a trusted antivirus application can help block remote access tools and spyware before they gain access to devices. Regular scans can also detect hidden threats that may already exist on a phone or computer.

As the internet continues to evolve, so too do the tactics employed by scammers. While the convenience of online searches can be beneficial, it also opens the door for fraudulent activities that can compromise personal security. By taking proactive measures and staying informed, individuals can better protect themselves from falling victim to these deceptive schemes.

As the prevalence of fake customer service numbers increases, the question arises: should search engines like Google bear some responsibility for protecting users from these scams? This ongoing debate highlights the need for vigilance and awareness in an increasingly digital world.

Source: Original article

Car Explosion Near Delhi’s Red Fort Kills Eight, Injures 24

A powerful explosion near Delhi’s Red Fort on November 10, 2025, resulted in eight fatalities and 24 injuries, prompting a high alert across the region.

A devastating explosion occurred in a Hyundai i20 car near Gate No. 1 of the Red Fort Metro Station in Delhi on the evening of November 10, 2025. The blast tragically claimed the lives of at least eight individuals and left 24 others injured. The explosion caused extensive damage to nearby vehicles and shattered windows in the bustling area, leading to widespread panic and a swift emergency response.

In response to the incident, seven fire tenders were dispatched to the scene. Teams from the Delhi Police Special Cell, the National Investigation Agency (NIA), the National Security Guard (NSG), and forensic experts quickly arrived to investigate the cause of the explosion. Authorities cordoned off the area and placed Delhi and neighboring regions on high alert.

Union Home Minister Amit Shah reported that the explosion occurred around 7 PM at the Subhash Marg traffic signal, close to the Red Fort. Law enforcement teams reached the site within ten minutes to initiate their investigation. Prime Minister Narendra Modi has been briefed on the situation, expressing condolences and pledging support for the victims. Shah also visited the hospital where the injured were being treated and has maintained communication with intelligence officials as the investigation progresses.

Delhi Police Commissioner Satish Golcha confirmed that the blast took place while the Hyundai i20 was stopped at a traffic light, resulting in damage to several nearby vehicles. As of now, investigations are ongoing, and authorities are exploring all possibilities, including potential links to terrorism. The high-intensity explosion and subsequent fires disrupted traffic and business activities, leading to the closure of the Chandni Chowk market amid heightened security measures.

Officials are urging residents to remain calm and to rely solely on official updates as the investigation unfolds. Delhi’s Chief Minister Rekha Gupta has assured that all necessary assistance is being provided to those affected and has called for public cooperation to prevent the spread of misinformation on social media.

Source: Original article

Experts Highlight Security Risks for Children in Adoption Photos

Experts emphasize the need for reform in America’s adoption process to enhance the safety and rights of vulnerable children awaiting permanent homes.

In a recent discussion, Ashley Brown, the CEO of the Selfless Love Foundation, highlighted the critical need for reform in America’s adoption process, particularly regarding the protection of children in foster care. Despite some progress, she asserts that there remains a significant distance to cover in ensuring the safety and rights of these vulnerable young people.

The Selfless Love Foundation’s National Think Tank serves as a collective of change-makers dedicated to improving the foster care adoption process across the nation. This annual conference, held in October, brings together young individuals who have experienced foster care, along with child welfare leaders and policymakers from over 30 states. The initiative aims to influence both federal policy and state-level actions to transform the adoption process to better serve children.

Following the October 2025 Think Tank, researchers from Chapin Hall at the University of Chicago will develop a roadmap and actionable next steps tailored for each state. In recognition of National Adoption Month this November, Brown shared her insights about the adoption landscape and the challenges it faces.

Brown reflected on the progress made thus far, stating, “As a nation, we’ve made progress, but there’s still a long way to go.” She noted that many people might be surprised to learn that in most states, photos of children available for adoption are publicly posted online. While this method of adoption recruitment may have been appropriate in the past, the evolution of the internet raises significant safety concerns for these young individuals.

In Florida, the Selfless Love Foundation collaborated with youth to successfully pass legislation that protects children’s images from public exposure. This law also grants children aged 12 and older a voice in determining the photos and information shared on adoption websites.

During the National Think Tank, a full day was dedicated to discussing this pressing issue. The conference also addressed adoption recruitment strategies and the importance of post-adoption support for families. Brown emphasized that the goal should not only be child placement but also achieving permanency for these children.

One of the primary obstacles to progress, according to Brown, is the absence of a federal policy designed to protect children’s privacy and ensure they have a say in how they are represented. “Each state is left to make its own decisions, and young people lack concrete rights and protections across the board,” she explained. “They are the experts — and they must be included in the decisions that affect them most.”

Brown pointed out the glaring lack of protection for children within the adoption process. “There is no federal law and very limited state laws that even acknowledge young people’s right to choose how they’re represented in adoption recruitment,” she said. This gap underscores the need for reform and highlights the interconnectedness of rights, recruitment, and post-adoption support. “We can’t fix one without strengthening the others,” she added.

She proposed that the most immediate and achievable step is to support legislation that empowers youth to choose how they are represented in adoption recruitment, thereby safeguarding their privacy, dignity, and safety. Researchers from Chapin Hall will compile a report detailing the key findings from the National Think Tank, which will aid state and federal leaders in understanding the importance of youth rights in the adoption process.

Throughout the discussions at the National Think Tank, a recurring theme emerged: the significance of community support. Brown noted that children in foster care and those who have aged out of the system need to feel that they have support and that others care about their well-being.

Thanks to the generosity of supporters, the Selfless Love Foundation can offer the National Think Tank at no cost, including scholarships to cover travel and accommodation for youth participants. Brown emphasized that the best way for individuals to help is by facilitating more opportunities for young people to attend events like this, where their voices are heard, their experiences valued, and they play an active role in transforming the system.

With no national standard in place, a vulnerable group of children remains without clear protections. Brown concluded by stating, “We already recognize a child’s right to choose adoption. Extending that principle to how they are portrayed is a matter of policy alignment and fairness.” For those interested in supporting this cause or learning more, the Selfless Love Foundation’s website offers additional resources.

Source: Original article

Hackers Launch New Attacks on Online Retail Stores

Hackers are exploiting a vulnerability known as SessionReaper, targeting Magento and Adobe Commerce stores, compromising over 250 sites in a single day and endangering customer data.

A serious security vulnerability has been discovered in the software that powers thousands of e-commerce sites, including Magento and its paid version, Adobe Commerce. The flaw, referred to as SessionReaper, allows hackers to infiltrate active shopping sessions without needing a password. This breach can enable attackers to steal sensitive data, place fraudulent orders, or even gain complete control of the affected online stores.

The vulnerability lies in the system’s communication protocols with other online services. Due to inadequate verification processes, the software sometimes accepts fraudulent session data as legitimate. Cybercriminals exploit this weakness by sending fake session files that the system mistakenly trusts.

Researchers at SecPod have warned that successful exploitation of this vulnerability can lead to significant consequences, including the theft of customer data and unauthorized purchases. Once the method of attack was made public, cybercriminals quickly began to capitalize on it, with security experts at Sansec reporting that more than 250 online stores were compromised within just one day. This rapid spread underscores the urgency of addressing vulnerabilities as soon as they are disclosed.

Adobe took action by releasing a security update on September 9 to address the SessionReaper vulnerability. However, weeks later, approximately 62% of the affected stores had yet to implement the update. Some store owners express concerns that the update might disrupt existing features on their sites, while others may not fully understand the severity of the risk they face.

Each unpatched store remains vulnerable, serving as an open door for attackers looking to steal information or install malicious software. As major companies like Google and Dior have recently experienced significant data breaches, the importance of cybersecurity in e-commerce cannot be overstated.

While store owners bear the responsibility of securing their platforms, consumers can also take proactive measures to protect themselves while shopping online. Being vigilant about website behavior is crucial. If a page appears unusual, loads slowly, or displays error messages, it may indicate underlying issues. Shoppers should always look for the padlock symbol in the address bar, which signifies that the site uses HTTPS encryption. If this symbol is absent or if the site redirects to an unfamiliar page, it is advisable to close the browser tab immediately.

Cybercriminals often employ deceptive promotional emails or ads that mimic legitimate store offers. To avoid falling victim to phishing schemes, it is safer to type the store’s web address directly into the browser rather than clicking on links in emails or ads.

Given that vulnerabilities like SessionReaper can expose personal data to criminal marketplaces, consumers might consider using reputable data removal services. These services continuously scan and delete private information, such as addresses and phone numbers, from data broker sites, thereby reducing the risk of identity theft if personal information is leaked through a compromised online store.

While no service can guarantee complete data removal from the internet, employing a data removal service can provide peace of mind. These services actively monitor and systematically erase personal information from numerous websites, making it harder for scammers to target individuals by cross-referencing data from breaches with information available on the dark web.

Additionally, strong antivirus protection is essential for online safety. Consumers should choose reputable software that offers real-time protection, safe browsing alerts, and automatic updates. A robust antivirus program can detect malicious code, block unsafe sites, and alert users to potential threats, adding another layer of defense when visiting online stores that may not be fully secure.

When making purchases, opting for payment services that provide an extra layer of security is advisable. Platforms like PayPal, Apple Pay, or Google Pay do not share card numbers with retailers, minimizing the risk of information theft if a store is compromised. These payment gateways also offer dispute protection in cases of fraudulent transactions.

It is wise to shop from well-known brands that typically have better security measures and quicker response times when issues arise. Before purchasing from a new website, consumers should check reviews on trusted platforms and look for signs of credibility, such as clear contact information and verified payment options. A few minutes of research can prevent weeks of frustration.

Regular updates are one of the most effective ways to safeguard data. Ensuring that computers, smartphones, and web browsers have the latest security patches installed is crucial, as updates often fix vulnerabilities that hackers exploit. Enabling automatic updates can help maintain protection without requiring additional effort.

For those creating accounts on shopping sites, it is essential to use unique, strong passwords for each account. Utilizing a password manager can help generate and store complex passwords, ensuring that if one account is compromised, others remain secure.

Consumers should also check if their email addresses have been exposed in past data breaches. Some password managers include built-in breach scanners that alert users if their credentials have appeared in known leaks. If a match is found, it is vital to change any reused passwords and secure those accounts with new, unique credentials.

Enabling two-factor authentication (2FA) on sites or payment services that offer it adds an additional security layer. This requires a second verification step, such as a code sent to a mobile device, making it more difficult for hackers to access accounts even if they obtain passwords.

Public Wi-Fi networks, commonly found in cafes, airports, and hotels, are often unsecured. Shoppers should avoid entering payment information or logging into accounts while connected to these networks. If necessary, using a mobile data connection or a reliable VPN can help encrypt online activities.

Regularly monitoring financial statements for unusual activity is also essential. Small, unauthorized charges can be early indicators of fraud. Consumers should report any suspicious transactions to their bank or credit card company immediately to prevent further damage.

The SessionReaper attack highlights the speed with which online threats can emerge and the potential consequences of ignoring updates. For retailers, promptly installing security patches is critical. For consumers, remaining vigilant and choosing secure payment methods are the best strategies for protection.

Would you continue to shop online if you knew hackers might be lurking behind a store’s checkout page? Share your thoughts with us at Cyberguy.com.

Source: Original article

What You Need to Know About the Dark Web and Staying Safe

The dark web serves as a hub for cybercrime, where anonymity allows criminals to trade stolen data and services, posing significant threats to individuals and businesses alike.

The dark web often feels like a mystery, hidden beneath the surface of the internet that most people use every day. However, understanding how scams and cybercrimes operate in these concealed corners is crucial for anyone looking to protect themselves from potential threats.

Cybercriminals rely on a structured underground economy, complete with marketplaces, rules, and even dispute resolution systems that allow them to operate away from law enforcement. By learning how these systems function, individuals can better understand the risks they face and take steps to avoid becoming targets.

The internet is generally divided into three layers: the clear web, the deep web, and the dark web. The clear web is the open part of the internet that search engines like Google or Bing can index. This includes news sites, blogs, stores, and public pages. Beneath it lies the deep web, which encompasses pages not meant for public indexing, such as corporate intranets, private databases, and webmail portals. Most of the content in the deep web is legal but restricted to specific users.

The dark web, however, is where anonymity and illegality intersect. Accessing it requires special software such as Tor, which was originally developed by the U.S. Navy for secure communication. Tor anonymizes users by routing traffic through multiple encrypted layers, making it nearly impossible to trace the origin of a request. This anonymity allows criminals to communicate, sell data, and conduct illegal trade with reduced risk of exposure.

Over time, the dark web has evolved into a hub for criminal commerce. Marketplaces that once operated like eBay for illegal goods have shifted to smaller, more private channels, including encrypted messaging apps like Telegram. Vendors use aliases, ratings, and escrow systems to build credibility, as trust is a critical component of business even among criminals.

Every major cyberattack or data leak often traces back to the dark web’s underground economy. A typical attack involves several layers of specialists. It begins with information stealers—malware designed to capture credentials, cookies, and device fingerprints from infected machines. The stolen data is then bundled and sold in dark web markets by data suppliers. Each bundle, known as a log, may contain login credentials, browser sessions, and even authentication tokens, often selling for less than $20.

Initial access brokers purchase these logs to gain entry into corporate systems. With this access, they can impersonate legitimate users and bypass security measures such as multi-factor authentication by mimicking the victim’s usual device or browser. Once inside, these brokers may auction their access to larger criminal gangs or ransomware operators who can exploit it further.

Interestingly, even within these illegal spaces, scams are common. New vendors often post fake listings for stolen data or hacking tools, collect payments, and disappear. Others impersonate trusted members or set up counterfeit escrow services to lure buyers. Despite the encryption and reputation systems in place, no one is entirely safe from fraud, not even the criminals themselves.

For ordinary people and businesses, understanding how these networks operate is key to mitigating their effects. Many scams that appear in inboxes or on social media originate from credentials or data first stolen and sold on the dark web. Basic digital hygiene can significantly reduce the risk of falling victim to these threats.

A growing number of companies specialize in removing personal data from online databases and people search sites. These platforms often collect and publish names, addresses, phone numbers, and even family details without consent, creating easy targets for scammers and identity thieves. While no service can guarantee complete removal of your data from the internet, data removal services can actively monitor and systematically erase your personal information from numerous websites, providing peace of mind.

Using unique, complex passwords for every account is another effective way to stay safe online. Many breaches occur because individuals reuse the same password across multiple services. When one site is hacked, cybercriminals often employ a technique known as credential stuffing, where they take leaked credentials and try them elsewhere. A password manager can help eliminate this problem by generating strong, random passwords and securely storing them.

Additionally, checking if your email has been exposed in past breaches is crucial. Many password managers include built-in breach scanners that alert users if their email addresses or passwords have appeared in known leaks. If a match is found, it is essential to change any reused passwords and secure those accounts with new, unique credentials.

Antivirus software remains one of the most effective ways to detect and block malicious programs before they can steal personal information. Modern antivirus solutions do much more than just scan for viruses; they monitor system behavior, detect phishing attempts, and prevent infostealer malware from sending credentials or personal data to attackers.

Outdated software is another significant entry point for attackers. Cybercriminals often exploit known vulnerabilities in operating systems, browsers, and plugins to deliver malware or gain access to systems. Installing updates as soon as they are available is one of the simplest yet most effective forms of defense. Enabling automatic updates for your operating system, browsers, and critical applications can further enhance security.

Even if a password gets leaked or stolen, two-factor authentication (2FA) adds an additional layer of protection. With 2FA, logging in requires both a password and a secondary verification method, such as a code from an authentication app or a hardware security key. Identity theft protection services can also provide early warnings if personal information appears in data breaches or on dark web marketplaces.

While the dark web thrives on the notion that anonymity equals safety, law enforcement and security researchers continue to monitor and infiltrate these spaces. Over the years, many large marketplaces have been dismantled, and hundreds of operators have been caught despite their layers of encryption. The takeaway for everyone is that the more you understand how these underground systems function, the better prepared you are to recognize warning signs and protect yourself.

Source: Original article

Louvre Director Faces Scrutiny Over Major Security Failures

The director of the Louvre Museum has acknowledged significant security failures that allowed thieves to steal over $100 million worth of jewels, prompting a national outcry.

Laurence des Cars, the director of the Louvre Museum in Paris, is under intense scrutiny following a brazen heist that resulted in the theft of more than $100 million in jewels. In her first public address since the incident, des Cars described the security lapses as a “terrible failure,” stating, “Despite our efforts, despite our hard work on a daily basis, we failed,” as reported by The Guardian.

Des Cars admitted that the museum’s perimeter security was inadequate, revealing that the only camera monitoring the outside of the museum was positioned away from the balcony that led to the gallery housing the stolen treasures. Despite this glaring oversight, she confirmed that all of the museum’s alarms were operational during the burglary.

“We failed these jewels,” des Cars lamented, according to the BBC. She emphasized that no institution is immune to the threat of “brutal thieves — not even the Louvre.”

According to Paris prosecutor Laure Beccuau, the thieves executed their plan using a truck-mounted electric furniture lift, which they acquired by masquerading as movers. This strategic deception allowed them to bypass security measures and gain access to the museum. Beccuau noted that selling the stolen jewels for their full value would be challenging if the thieves chose to dismantle or melt the pieces.

The stolen items included eight significant pieces, such as a sapphire diadem, a necklace, and a single earring linked to 19th-century queens Marie-Amélie and Hortense. Additionally, the thieves made off with an emerald necklace and earrings associated with Empress Marie-Louise, the second wife of Napoleon Bonaparte, as well as a reliquary brooch. Among the most notable items taken were Empress Eugénie’s diamond diadem and her large corsage-bow brooch, both of which are renowned for their exquisite craftsmanship.

French President Emmanuel Macron expressed his outrage over the theft, stating in a post on X, “The theft committed at the Louvre is an attack on a heritage that we cherish, for it is our history. We will recover the works, and the perpetrators will be brought to justice. Everything is being done, everywhere, to achieve this, under the leadership of the Paris prosecutor’s office.”

The heist has sparked a national reckoning, drawing comparisons to the 2019 fire at Notre Dame Cathedral. Beccuau revealed that the investigative team has expanded from 60 to 100 members, highlighting the case’s significance on both national and international levels.

As the investigation unfolds, the Louvre Museum faces mounting pressure to enhance its security measures and restore public confidence in its ability to protect its invaluable collection.

Source: Original article

Trump Hosts Roundtable on Combating Cartels and Human Trafficking

President Trump will host a roundtable at the White House to discuss the achievements of Homeland Security Task Forces in combating criminal cartels and human trafficking.

President Donald Trump is set to host a roundtable at the White House on Thursday afternoon, bringing together law enforcement and administration officials to review the accomplishments of the Homeland Security Task Forces (HSTFs). These task forces were established on the president’s first day in office as part of a concerted effort to combat threats posed by criminal cartels operating within the United States.

White House spokeswoman Abigail Jackson spoke to Fox News Digital about the significance of the event, stating, “The President’s Homeland Security Task Forces are a landmark achievement that highlight what the federal government can achieve with a leader like President Trump who is willing to slash red tape, increase coordination and put the safety of the American people first.” She emphasized that the Trump administration has made significant strides in removing lethal drugs, illegal weapons, and dangerous individuals from American communities, asserting that “the American people are safer today because of the HSTFs — and they’re just getting started.”

The creation of the HSTFs was formalized through an executive order titled “Protecting the American People from Invasion,” issued on January 20. This order directed Attorney General Pam Bondi and Secretary of Homeland Security Kristi Noem to establish task forces in each state, focusing on dismantling cartels and human trafficking networks operating on U.S. soil.

The executive order outlined several key objectives for the task forces, including the eradication of criminal cartels, foreign gangs, and transnational criminal organizations throughout the United States. It also aimed to dismantle cross-border human smuggling and trafficking networks, with a particular emphasis on protecting children from such offenses. The order called for the utilization of all available law enforcement tools to enforce U.S. immigration laws effectively.

During Thursday’s roundtable, administration officials will provide updates on the progress made by the task forces. Notable attendees will include Deputy Chief of Staff and Homeland Security Advisor Stephen Miller, Secretary Noem, Attorney General Bondi, Deputy Attorney General Todd Blanche, Secretary of War Pete Hegseth, FBI Director Kash Patel, and Director of National Intelligence Tulsi Gabbard.

Reports indicate that the task forces became fully operational nationwide at the end of August and have since resulted in thousands of arrests, as well as the removal of dangerous drugs and illegal firearms from U.S. streets. According to sources, more than 3,000 foreign terrorists and cartel members have been apprehended, including individuals affiliated with notorious gangs such as the Sinaloa Cartel, MS-13, and Cartel Jalisco Nuevo Generacion.

In addition to arrests, the task forces have recovered approximately two million fentanyl pills and seven tons of other deadly narcotics. They have also seized $3 million in currency and confiscated over 1,000 illegal firearms from communities across the country.

Trump’s campaign has prominently featured the promise to remove violent illegal immigrants and reduce crime in U.S. communities. In a speech before Congress in March 2025, he highlighted the dangers posed by cartels, stating, “The territory to the immediate south of our border is now dominated entirely by criminal cartels that murder, rape, torture and exercise total control. They have total control over a whole nation, posing a grave threat to our national security.” He declared, “The cartels are waging war in America, and it’s time for America to wage war on the cartels.”

The upcoming roundtable coincides with ongoing military operations targeting suspected drug cartel vessels in the Caribbean and eastern Pacific. These strikes, which began in September, are part of Trump’s broader strategy to dismantle transnational cartels through force.

Earlier this month, Trump held a similar roundtable at the White House, inviting independent journalists who have experienced violence from Antifa to share their stories. This event was part of the administration’s efforts to address protests outside immigration facilities and the recent designation of Antifa as a “domestic terrorist organization.”

As the roundtable approaches, the administration continues to emphasize its commitment to combating the threats posed by criminal organizations and ensuring the safety of American citizens.

Source: Original article

She Aided North Korea in Infiltrating U.S. Tech Firms

Christina Chapman operated a covert hub from her Arizona home, facilitating North Korean operatives’ infiltration of U.S. companies, resulting in over $17 million in stolen salaries.

In a quiet neighborhood of Litchfield Park, Arizona, Christina Chapman, 50, ran a covert operation that enabled North Korean operatives to infiltrate American firms, amassing a staggering $17 million in stolen salaries.

This scenario is not a plot from a new Netflix series; it is a real-life case that unfolded just a short drive from Phoenix. Chapman appeared to be an ordinary suburban woman, but her home served as a secret cyber operations center aimed at assisting North Korean IT workers in acquiring equipment and tools for their military.

Due to international sanctions, North Korean workers cannot legally apply for jobs at major American companies like Google, Amazon, or Meta. Instead, they resort to stealing the identities of real Americans, including names, birth dates, and Social Security numbers. Using this stolen information, they impersonate remote IT workers, slipping into U.S. companies unnoticed.

However, when these companies send out laptops and phones to their new “remote hires,” the devices cannot be shipped to North Korea. Over three years, Chapman transformed her suburban residence into a covert hub for North Korea’s elite cybercriminals, receiving more than 100 laptops and smartphones from various U.S. companies.

These were not just any companies; they included major American banks, top-tier tech firms, and at least one U.S. government contractor, all of which believed they were hiring legitimate remote workers. Unbeknownst to them, they were onboarding North Korean operatives.

Upon receiving the equipment, Chapman connected the devices to virtual private networks (VPNs) and remote desktop tools like AnyDesk and Chrome Remote Desktop. She even employed voice-changing software to create the illusion that the North Koreans were logging in from within the United States.

Chapman also shipped 49 laptops and other devices supplied by U.S. companies to overseas locations, including multiple shipments to a city in China bordering North Korea. These fake employees participated in daily activities, submitting code, answering emails, and attending meetings, all while actually operating from halfway around the world. In reality, they were siphoning U.S. technology and cash directly into Kim Jong Un’s regime.

When human resources teams requested video verification, Chapman did not hesitate. She appeared on camera herself, sometimes in costume, impersonating the individuals listed on the resumes. She managed the entire operation like a talent agency for cybercriminals, staging fake job interviews, coaching operatives on their responses, and laundering their salaries through U.S. banks.

Chapman reportedly took home at least $800,000 in “service fees,” while the total amount stolen for North Korea exceeded $17 million, according to the FBI, which labeled the scheme a national security threat. Chapman referred to her actions as “helping her friends.”

Eventually, the elaborate scheme began to unravel. Investigators detected unusual patterns, such as numerous remote hires all linked to the same Arizona address and company systems being accessed from countries the workers had never visited.

Chapman was arrested and sentenced in July 2025 to 102 months in federal prison. The most astonishing aspect of this case? She orchestrated the entire operation from her living room, exemplifying a new era of remote work.

Source: Original article

Google Releases Update for Chrome to Address Zero-Day Vulnerability

Google has issued an urgent update for Chrome to address a critical zero-day vulnerability, marking the sixth such incident in 2025, as hackers exploit security flaws in the browser.

Google has released an urgent update for its Chrome browser to address a newly discovered zero-day security flaw that is currently being exploited by hackers. This incident marks the sixth zero-day vulnerability that Chrome has faced in 2025, underscoring the rapid pace at which attackers are able to exploit hidden weaknesses in software.

The vulnerability, identified as CVE-2025-10585, originates from a type confusion issue within Chrome’s V8 JavaScript engine. The flaw was discovered by Google’s Threat Analysis Group (TAG), which reported the issue on Tuesday. The company promptly rolled out a fix the following day, as reported by Bleeping Computer.

Google confirmed that this flaw is actively being exploited in the wild, although it has not disclosed specific technical details or identified the groups responsible for the attacks. TAG has a history of uncovering zero-day vulnerabilities linked to government-sponsored spyware campaigns, often targeting high-risk individuals such as journalists, opposition leaders, and dissidents.

The patch has been delivered through Chrome version 140.0.7339.185/.186 for Windows and macOS, and version 140.0.7339.185 for Linux. These updates will gradually reach all users in the Stable Desktop channel over the coming weeks.

While Chrome typically updates automatically, users can manually apply the patch by navigating to the ‘About Google Chrome’ section. Google has chosen to withhold full technical details until a majority of users have installed the update, a precaution aimed at preventing further exploitation of unpatched systems.

This latest vulnerability is part of a concerning trend, as it is the sixth zero-day flaw that Google has patched in Chrome this year. Earlier this year, in March, Google addressed CVE-2025-2783, a sandbox escape bug that was exploited in espionage attacks against Russian organizations. In May, the company released emergency updates for CVE-2025-4664, which allowed attackers to hijack user accounts. In June, another flaw in the V8 engine, CVE-2025-5419, was patched after being identified by TAG. July saw the release of a fix for CVE-2025-6558, which enabled attackers to bypass Chrome’s sandbox protection.

As Google continues to address these vulnerabilities, it is clear that the company is racing to secure its browser against rapidly emerging threats. Updating Chrome is a quick process, whether on Mac or Windows, and users are encouraged to take action immediately.

In addition to updating Chrome, users can take further steps to protect themselves from potential attacks. Many zero-day exploits are delivered through malicious websites or email attachments, so it is crucial to avoid clicking on unknown links or downloading files from unverified sources. Using strong antivirus software can provide an additional layer of defense, helping to detect malicious code that may attempt to run through compromised browsers.

Even if attackers manage to steal login credentials through a browser exploit, enabling two-factor authentication (2FA) can significantly hinder their ability to access accounts. Users are advised to utilize an authenticator app instead of SMS for stronger protection. Additionally, employing a password manager can help keep credentials secure and generate unique, complex passwords, preventing a domino effect if one account is targeted.

It is also advisable for users to check if their email addresses have been exposed in previous data breaches. Many password managers include built-in breach scanners that can alert users if their information has appeared in known leaks. If a match is found, it is essential to change any reused passwords and secure those accounts with new, unique credentials.

While Chrome updates are critical, it is important to remember that attackers can also exploit vulnerabilities in operating systems such as Windows, macOS, Android, or iOS. Regular updates to these systems can patch vulnerabilities across the board, reducing the likelihood of a browser exploit spreading further.

The frequency of zero-day attacks on Chrome this year highlights the relentless nature of cyber threats and the serious gaps that can exist in even the most widely used software. These vulnerabilities represent not just bugs, but opportunities for hackers to exploit millions of users before fixes can be deployed. The growing sophistication of threat actors, including state-sponsored groups targeting high-risk individuals, further complicates the landscape of online security.

As the battle to secure popular software continues, users are encouraged to stay vigilant and proactive in protecting their personal information. Do you think Google is responding quickly enough to safeguard your data? Share your thoughts with us.

Source: Original article

Inside a Scammer’s Day: Targeting Victims in the Digital Age

Scammers utilize personal data from public records and data brokers to create convincing narratives, enhancing their chances of successfully targeting potential victims through calls and emails.

Imagine sipping your morning coffee when your phone rings. A number you don’t recognize appears on the screen. On the other end, a voice claims to be from your bank, asking you to “confirm a recent charge.” This scenario is all too familiar for many.

Scammers do not rely on luck. They do not randomly select numbers from a phone book in hopes of finding a target. Instead, their calls, texts, and emails are meticulously planned. They often possess a wealth of information about you before they ever reach out, making their pitches sound credible and tailored.

So, what does a typical day look like for a scammer? Let’s take a closer look.

Scammers begin their day not by hacking into secure databases but by accessing data broker sites—dubious online directories that trade personal information like collectibles. These platforms provide a comprehensive profile of individuals, including details such as addresses, email addresses, voter registrations, and even criminal histories, whether accurate or not.

With this information at their fingertips, scammers can construct narratives that seem custom-made for their targets. They do not fabricate details; rather, they borrow from your life, which is why their communications can feel so believable.

Even without social media, scammers can effectively target individuals. Once they have crafted their story, they deploy auto-dialing software to send out thousands of calls daily. By acquiring personal and contact details from various data brokers, they can repeatedly target the same individuals. If you hang up or ignore the call, scammers log your number as “active,” ensuring you remain on their list for future attempts.

Scammers do not need every target to fall for their tricks; they only require a small percentage to succeed. This is a numbers game, and the abundance of personal data significantly increases their odds. At the end of the day, scammers continue their operations by feeding the information they have gathered back into the data cycle, perpetuating the cycle of victimization.

Now, consider a scenario where scammers cannot find your data online. Without access to personal information, they would lack storylines, details to exploit, and the means to personalize their attacks. Removing your data from people-search sites and data broker databases not only cleans up your online presence but also effectively shuts the door on scammers’ tactics.

However, the process of removing your data can be tedious. You could spend hours navigating various sites, filling out opt-out forms, and sending emails while trying to track compliance. The challenge is that data brokers do not cease their operations; new ones emerge weekly, and old ones often reintroduce your data.

This is where data removal services come into play. While no service can guarantee complete removal of your data from the internet, utilizing a data removal service is a wise choice. Although these services may come at a cost, they provide peace of mind by actively monitoring and systematically erasing your personal information from numerous websites.

By limiting the information available about you, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it more challenging for them to target you.

Scammers do not accidentally stumble upon your phone number. They meticulously map out your life, one data point at a time. Therefore, protecting your information online is the most effective step you can take to reduce the likelihood of scam calls, phishing emails, and identity theft.

Remember, every piece of personal data you remove is one less tool in a scammer’s arsenal. What’s the most convincing scam attempt you’ve ever received? Share your experiences with us.

Source: Original article

North Korean Hackers Employ AI Technology to Create Fake Military IDs

North Korean hackers have leveraged generative AI tools like ChatGPT to create convincing fake military IDs, raising concerns about the evolving landscape of cyber threats.

Generative AI has significantly lowered the barriers for sophisticated cyberattacks, as hackers increasingly exploit tools like ChatGPT to forge documents and identities. A North Korean hacking group known as Kimsuky has recently been reported to have used ChatGPT to generate a fake draft of a South Korean military ID. These forged IDs were then attached to phishing emails that impersonated a South Korean defense institution responsible for issuing credentials to military-affiliated officials.

This alarming campaign was revealed by South Korean cybersecurity firm Genians in a recent blog post. Although ChatGPT has safeguards designed to block attempts to generate government IDs, the hackers managed to trick the system. Genians noted that the model produced realistic-looking mock-ups when prompts were framed as “sample designs for legitimate purposes.”

Kimsuky is not a small-time operator; the group has been linked to a series of espionage campaigns targeting South Korea, Japan, and the United States. In 2020, the U.S. Department of Homeland Security indicated that Kimsuky was “most likely tasked by the North Korean regime with a global intelligence-gathering mission.”

The fake ID scheme underscores the transformative impact of generative AI on cybercrime. “Generative AI has lowered the barrier to entry for sophisticated attacks,” said Sandy Kronenberg, CEO and founder of Netarx, a cybersecurity and IT services company. “As this case shows, hackers can now produce highly convincing fake IDs and other fraudulent assets at scale. The real concern is not just a single fake document, but how these tools are used in combination.” Kronenberg emphasized that an email with a forged attachment could be followed by a phone call or even a video appearance that reinforces the deception.

Experts warn that traditional defenses against phishing attacks may no longer be effective. “For years, employees were trained to look for typos or formatting issues,” explained Clyde Williamson, senior product security architect at Protegrity, a data security and privacy company. “That advice no longer applies. They tricked ChatGPT into designing fake military IDs by asking for ‘sample templates.’ The result looked clean, professional, and convincing. The usual red flags—typos, odd formatting, broken English—weren’t there. AI scrubbed all that out.”

Williamson advocates for a reset in security training, urging organizations to focus on context, intent, and verification. “We need to encourage teams to slow down, check sender information, confirm requests through other channels, and report anything that feels off. There’s no shame in asking questions,” he added. On the technological front, companies should invest in email authentication, phishing-resistant multi-factor authentication (MFA), and real-time monitoring to keep pace with evolving threats.

North Korea is not the only nation employing AI for cyberattacks. Anthropic, an AI research company and creator of the Claude chatbot, reported that a Chinese hacker used Claude as a full-stack cyberattack assistant for over nine months. This hacker targeted Vietnamese telecommunications providers, agriculture systems, and even government databases. Additionally, OpenAI has noted that Chinese hackers have utilized ChatGPT to develop password brute-forcing scripts and to gather sensitive information on U.S. defense networks, satellite systems, and ID verification systems.

Cybersecurity experts express alarm over this shift in tactics. AI tools enable hackers to launch convincing phishing attacks, generate flawless scam messages, and conceal malicious code more effectively than ever before. “News that North Korean hackers used generative AI to forge deepfake military IDs is a wake-up call: The rules of the phishing game have changed, and the old signals we relied on are gone,” Williamson stated.

To navigate this new landscape, both individuals and organizations must remain vigilant. Cybersecurity measures should include verifying requests through trusted channels, employing strong antivirus software, and regularly updating operating systems and applications to patch vulnerabilities. Users should also scrutinize email addresses, phone numbers, and social media handles for discrepancies that may indicate a scam.

As AI continues to evolve, so too must our defenses against its misuse. The tools available to hackers are becoming cleaner, faster, and more convincing, making it imperative for companies to update their training and strengthen their defenses. Everyday users should cultivate a habit of questioning the legitimacy of digital requests and double-checking before taking action.

In conclusion, the rise of AI in cybercrime presents significant challenges. The responsibility to combat these threats lies not only with AI companies but also with everyday users who must adapt to this rapidly changing environment. As the landscape of cybersecurity evolves, staying informed and proactive is essential for safeguarding personal and organizational data.

Source: Original article

Massive WWII Bomb Prompts Evacuation of 6,000 Residents

Experts successfully neutralized a massive World War II bomb in Hong Kong’s Quarry Bay, prompting the evacuation of approximately 6,000 residents amid challenging weather conditions.

In a dramatic overnight operation, thousands of residents in Hong Kong were evacuated as experts worked to defuse a massive World War II bomb discovered in the Quarry Bay neighborhood. The nearly five-foot-long, 1,000-pound bomb was unearthed at a construction site early Saturday morning, raising significant safety concerns for the surrounding community.

The U.S.-made bomb, which contained 500 pounds of TNT, was confirmed to date back to World War II by police officials. Andy Chan Tin-Chu, a representative of the Hong Kong police, reported that due to the “exceptionally high risks associated with its disposal,” approximately 1,900 households, involving around 6,000 individuals, were urged to evacuate swiftly.

As the operation unfolded, the Hong Kong Police issued a statement detailing the challenges faced by the bomb disposal team. They worked from around 2 a.m. until nearly noon, braving adverse weather conditions caused by a typhoon. The team successfully neutralized the bomb by 11:48 a.m., ensuring the safety of the public without any reported injuries.

The police emphasized the importance of public safety, stating, “Given the high risks involved in the handling of the bomb that officers from our Explosive Ordnance Disposal Bureau believe to still be in good condition, the Hong Kong Police Force devised the emergency evacuation plan upon the discovery of the bomb.” This plan was implemented to protect residents living near the construction site located at No. 16-94 Pan Hoi Street.

This incident is not the first of its kind in Hong Kong. In 2018, another 1,000-pound World War II bomb was defused at a construction site in the city’s business district, marking the third such discovery that year. The historical context of these findings is significant, as Hong Kong was occupied by Japanese forces during the war and was a target of U.S. air raids.

Authorities continue to monitor the situation closely, and residents have been advised to stay informed about any further developments regarding the bomb disposal and safety measures in the area.

According to the Associated Press, the successful handling of this bomb reinforces the ongoing challenges posed by unexploded ordnance from the war, which remains a concern in various parts of the world.

Source: Original article

From Uri Attack to New Doctrine: India’s Evolving Counter-Terror Strategy

India’s counter-terrorism strategy underwent a significant transformation following the 2016 Uri attack, marking a shift from restraint to proactive military responses against terrorism.

On September 18, 2016, four heavily armed terrorists attacked an Army installation in Uri, Jammu and Kashmir, resulting in the deaths of 19 soldiers. This incident marked a pivotal moment in India’s approach to counter-terrorism, as it prompted a shift away from the longstanding policy of restraint that had characterized New Delhi’s responses to similar provocations. Historically, concerns over nuclear escalation and potential international intervention had guided India’s cautious stance. However, the Uri attack catalyzed a new direction.

The surgical strike that followed, authorized by India within ten days of the attack, was a bold move. Conducted on the night of September 28-29, the operation targeted terrorist launch pads in Pakistan-occupied Kashmir. The announcement of the strikes by the Director General of Military Operations highlighted not only military precision but also a newfound political will. By publicly acknowledging the operation, India reframed both domestic expectations and global perceptions, breaking the precedent of silence that had previously surrounded such covert actions.

The 2016 surgical strikes laid the groundwork for a doctrine of limited punitive action under the looming nuclear threat. This doctrine was put to the test in February 2019, following a suicide bombing in Pulwama that killed 40 CRPF personnel. In response, India escalated its military actions by conducting airstrikes on a Jaish-e-Mohammed training facility in Balakot, deep within Pakistan’s Khyber Pakhtunkhwa province. This operation marked a significant escalation, demonstrating India’s willingness to extend its military response beyond the Line of Control (LoC) and target terrorist infrastructure directly.

India’s actions in Balakot sent a clear message: Pakistan could no longer dictate the terms of escalation or rely on its nuclear arsenal as a shield against retaliation. The operation was framed as a counter-terrorism measure rather than an act of war, allowing India to secure tacit international acceptance of its actions. Balakot thus became more than just a military strike; it was a calculated signal to Pakistan, the Indian public, and the international community.

Despite these actions, Pakistan continued to test India’s thresholds, as evidenced by a series of infiltration attempts along the LoC from 2020 onward. In June 2020, Indian forces thwarted an infiltration bid in Kupwara, while November of the same year saw the foiling of a planned mass-casualty attack in Jammu and Kashmir, resulting in the deaths of four Jaish-e-Mohammad terrorists. Intelligence reports indicated that Pakistan was acquiring military equipment to support these infiltration attempts, further escalating tensions.

Throughout these years, India strengthened its security measures, including the implementation of a hybrid model of a ‘smart’ fence along the LoC. While many infiltration attempts were thwarted, those that succeeded were met with swift retaliation. By 2023, the melting snow opened up infiltration routes, leading to a resurgence of incursion attempts. However, Indian Special Forces, bolstered by drone surveillance and enhanced border security, successfully neutralized militant threats before they could materialize.

The shift in India’s counter-terrorism strategy extended beyond its borders. Where previous policies relied on surveillance and post-attack pursuits, India adopted a proactive approach aimed at preempting terrorist actions. This evolution can be traced back to the 2016 Uri attack and the subsequent surgical strikes, which set a precedent for future military responses.

By 2025, India’s counter-terrorism playbook had further evolved with Operation Sindoor, which integrated cyber disruption, precision strikes, and information campaigns into a coordinated effort. Terror networks faced communication disruptions and financial constraints, while unmanned systems targeted launch pads. Simultaneously, India worked to control the narrative surrounding these operations, ensuring that the message was driven by New Delhi rather than Islamabad.

These strategic changes were not merely ad hoc responses but were formally codified in military doctrine. The Joint Doctrine of the Armed Forces, released in 2017, explicitly included surgical strikes and limited punitive actions as viable military options. This codification provided a legitimate framework for planners and reassured political leadership of institutional backing for such actions. The Land Warfare Doctrine of 2018 further emphasized the need for swift and precise retaliation, supported by air power and other military enablers, while also recognizing the importance of information warfare in modern conflicts.

Nearly a decade after the Uri attack, its legacy continues to influence India’s deterrence posture. The strikes established a credible threat of punishment that altered Pakistan’s strategic calculus, even if they did not completely eradicate terrorism. Each infiltration attempt now carries the risk of immediate retaliation, and any significant terrorist strike risks provoking a broader strategic response from India.

Moreover, the strikes effectively dismantled Pakistan’s long-standing denial strategy. By compelling Islamabad to either deny culpability and lose credibility or acknowledge its involvement and face international pressure, India gained a strategic advantage. Importantly, India framed its actions within the context of globally accepted counter-terror norms, insulating itself from potential diplomatic backlash.

Perhaps most crucially, these military actions introduced a level of flexibility into India’s counter-terrorism strategy. New Delhi is no longer constrained by a binary choice between inaction and all-out war. Instead, it possesses a spectrum of options, ranging from covert operations to overt retaliatory actions, and from preemptive strikes to multi-domain responses. This flexibility is essential in navigating the complexities of a nuclearized and asymmetric security environment.

As India continues to adapt its counter-terrorism strategy, the events of 2016 serve as a reminder of the importance of decisive action in the face of persistent threats. The evolution from restraint to proactive engagement reflects a broader understanding of the challenges posed by terrorism and the necessity of maintaining a credible deterrent.

Source: Original article

FBI Issues Warning About QR Code Scam in Mystery Packages

Federal authorities warn that scammers are sending unexpected packages containing QR codes that can lead to identity theft and malware, exploiting curiosity to trick victims into revealing personal information.

Scammers are increasingly using QR codes in a new scheme that involves sending unexpected packages to unsuspecting individuals. These packages contain QR codes that, when scanned, can redirect victims to fraudulent websites or download malicious software designed to steal sensitive information.

Once considered a convenient tool for checking menus or making payments, QR codes have now become a weapon in the hands of criminals. The latest warning from federal authorities highlights the extent of these tactics, which include fake delivery texts, counterfeit payment links, and malicious codes that replace legitimate ones.

In this latest scam, criminals send packages that recipients never ordered. Inside these boxes is a QR code that, when scanned, can lead to stolen personal details, drained bank accounts, or malware that operates silently in the background of a victim’s phone.

The FBI has issued a public notice regarding this scam, stating, “The FBI warns the public about a scam variation in which criminals send unsolicited packages containing a QR code that prompts the recipient to provide personal and financial information or unwittingly download malicious software that steals data from their phone.” The agency notes that scammers often ship these packages without sender information to entice victims into scanning the QR code.

This scheme is a variation of what is known as a brushing scam. Traditionally, brushing scams involved online sellers sending products to strangers and then using the recipients’ details to post fake reviews. While brushing scams were more of a nuisance, this new approach has escalated to deliberate fraud. Instead of receiving a product, victims often find only a printed QR code that leads to fraudulent websites asking for sensitive personal information, such as banking details, credit card numbers, or login credentials.

Some QR codes go even further, installing malicious software that can track activity and steal data directly from the device. The consequences of falling victim to such scams can be severe, as fake websites may harvest names, addresses, and financial details, while malware can monitor accounts, log keystrokes, or even target cryptocurrency wallets. Often, victims do not realize they have been compromised until they notice unauthorized charges or suspicious withdrawals, by which time their information may already be in the hands of criminals.

Scammers exploit curiosity and convenience to trick individuals into scanning malicious QR codes. To avoid becoming a target, it is essential to adopt a few simple habits. First, avoid scanning QR codes from mystery deliveries, random flyers, or stickers on public signs. A QR code is essentially a disguised link, and until you know where it leads, it should not be trusted.

Even if you accidentally scan a risky code, keeping strong antivirus software on your phone can help. Mobile security apps can block fraudulent sites, warn you before downloads, and protect against malicious QR code attacks. It is also advisable to scan QR codes only from businesses and organizations you already trust, such as your bank’s mobile app or a known retailer’s checkout page.

Most smartphones allow users to press and hold a QR code link to preview where it leads. If the URL appears suspicious—featuring misspellings, random numbers, or shortened links—do not open it. Taking a moment to check can save you from falling into a phishing trap.

Additionally, the less personal data available about you online, the harder it is for scammers to target you with convincing fraud attempts. Consider using data removal services that scrub your information from people-search sites and marketing databases. While no service can guarantee the removal of all your data from the internet, utilizing a removal service can help you monitor and automate the process of eliminating your information from numerous sites over time.

Even if your login details are compromised, two-factor authentication (2FA) can make it more difficult for criminals to access your accounts. By requiring a secondary code sent to your phone or generated through an authenticator app, 2FA adds an extra layer of security to your banking, email, and trading accounts.

Regular software updates are also crucial, as they often contain fixes for security vulnerabilities that scammers may exploit. Keeping your phone’s operating system and apps up to date provides stronger protection against malware that can be delivered through malicious QR codes.

If you receive an unexpected package containing a QR code, do not simply discard it. Report it to local authorities and consider filing a complaint with the FBI’s Internet Crime Complaint Center. Reporting these incidents not only helps protect you but also provides law enforcement with valuable information to track the spread of these scams.

While this scam may not be widespread yet, it illustrates how quickly criminals can adapt to new technology. QR codes were intended to simplify life, and they often do, but that convenience can become a vulnerability when curiosity overrides caution. The key takeaway is that a mystery package with a QR code is not a fun puzzle to solve; it is a red flag. The safest course of action is to resist the urge to scan and report any suspicious packages instead.

Source: Original article

Cardiac Patient Rescued from Flooded Village Near Ajnala

A cardiac patient was successfully rescued from the flood-affected Sammoval village near Ajnala by a dedicated army relief team amid severe flooding in Punjab.

Chandigarh: A woman suffering from a serious heart condition was rescued by the Kharga Sappers flood relief team from Sammoval village, located near Ajnala, according to a Defence Public Relations Officer (PRO) on Wednesday.

The woman, who was bedridden and unable to move, presented a significant challenge for the evacuation team. Due to the extensive flooding, boats were unable to reach her home, necessitating a foot-based rescue operation.

Upon reaching her residence, the team carefully placed her on her bed and carried it on their shoulders for nearly 300 meters to a waiting boat. This method of transport was crucial in ensuring her safe evacuation.

After the successful transfer to the boat, the woman was transported along with her husband and daughter in a Tatra vehicle to Amritsar. There, she was handed over to her relatives for further medical attention.

The Defence PRO emphasized that the swift action and unwavering commitment of the flood relief team were instrumental in the patient’s safe evacuation. This incident highlights the dedication of army personnel engaged in relief operations throughout Punjab during the ongoing flooding crisis.

Source: Original article

Punjab Police Arrest Three in JeM-Linked Cab Driver Murder Case

Punjab Police have arrested three individuals linked to Jaish-e-Mohammad for the abduction and murder of a cab driver in Mohali, recovering weapons and the vehicle involved in the crime.

In a significant development, the Punjab Police announced on Monday the dismantling of a terror module associated with Jaish-e-Mohammad (JeM). This operation led to the arrest of three individuals from Jammu and Kashmir, who are accused of abducting and murdering a cab driver in Nayagaon, Mohali.

The investigation was initiated following the forcible snatching of a taxi belonging to Anil Kumar in Kharar. Kumar’s sudden disappearance, coupled with the deactivation of his mobile phones, raised immediate concerns. This prompted the Sas Nagar Police to launch a thorough investigation, mobilizing multiple teams to track down the suspects.

Through swift and coordinated action, law enforcement successfully apprehended all three accused. The police reported that the vehicle used in the crime, along with a .32 bore pistol, has been recovered. During interrogation, the suspects admitted to shooting Kumar following an altercation and subsequently disposing of his body in the Mohali area. Intensive search operations are currently underway to locate the remains.

Among those arrested is Sahil Bashir, who has a complicated criminal history. He is wanted in connection with a case under the Unlawful Activities (Prevention) Act (UAPA) and the Arms Act in Handwara, Jammu and Kashmir. His brother, Aijaz Ahmad, has previously been arrested for possessing a cache of weapons and materials linked to JeM. Both men have been identified as Over Ground Workers (OGWs) for the Pakistan-based terror organization.

A spokesperson for the Punjab Police stated, “Investigations are ongoing to dismantle the entire network and ensure that no anti-national elements find a foothold in Punjab.”

The swift action by the Punjab Police highlights their commitment to combating terrorism and ensuring the safety of citizens in the region.

Source: Original article

Arms and Ammunition Seized in Kupwara’s Reshwari Area; Investigation Ongoing

Security forces in Kupwara district recovered a substantial cache of arms and ammunition in the Reshwari area, prompting an investigation into its origins and intended use.

SRINAGAR: Security forces successfully recovered a significant cache of arms and ammunition in the Reshwari area of North Kashmir’s Kupwara district on Sunday, according to officials.

The recovery was made following specific intelligence inputs that prompted a joint search operation by security forces in the village of Reshwari, which falls under the jurisdiction of the Trehgam Police Station.

During the operation, a concealed cache containing a variety of sophisticated arms and ammunition was uncovered. The seized items include one Chinese-made pistol, four Pakistan-made Under Barrel Grenade Launchers (UBGLs), four Chinese grenades, one sniper magazine, 26 sniper rounds, one AK-47 machine gun, and 144 rounds of AK-47 ammunition. Additionally, authorities recovered one bag and two Chinese reading leaflets from the site.

A case has been registered under the relevant sections of the law at the Trehgam Police Station. Investigators are currently working to determine the origin and intended use of the recovered arms. Authorities suspect that the cache may have been intended for terrorist activities or to facilitate infiltration attempts along the Line of Control.

This recovery is part of ongoing efforts by security forces to curb the movement of illegal arms and maintain peace and stability in the region.

According to The Sunday Guardian, the investigation is still underway as officials seek to uncover more details regarding the cache’s origins.

Source: Original article

Security Forces Achieve Success in Poonch, Arrest Two Local Terrorists

Security forces in Poonch successfully apprehended two local terrorists linked to Lashkar-e-Toiba, recovering AK rifles and raising concerns about infiltration within the region.

Poonch: In a significant operation, security forces have made a major breakthrough in Poonch by arresting two local terrorists associated with the Lashkar-e-Toiba militant group. The suspects, identified as Tariq and Riyaz, were apprehended by Poonch Police in the Mandi area on Saturday.

Officials reported that the two men had been residing in a rented accommodation in Jallian village, located within Mandi. During a search of their rented room, police recovered two AK-series rifles, highlighting the serious nature of their activities. Alarmingly, one of the arrested individuals was employed as a porter with the Indian Army, raising serious concerns about the infiltration of terror groups into the region.

According to police sources, both suspects had been under surveillance for an extended period and were providing logistical support to Lashkar operatives. An official commented, “The recovery of automatic weapons and the arrest of two trained local terrorists is a significant achievement for security forces in the border district.”

Currently, both Tariq and Riyaz are undergoing intensive interrogation by Poonch Police as authorities work to trace their network and uncover any further connections to terrorist activities. In response to this incident, security agencies have ramped up their operations in the area to ensure that no additional sleeper cells are active within this sensitive border region.

As the investigation unfolds, the focus remains on dismantling any remaining networks that could pose a threat to security in Poonch and its surrounding areas.

Source: Original article

Infiltration Attempt Foiled in Gurez Sector; Two Terrorists Eliminated

Security forces successfully thwarted an infiltration attempt in the Gurez sector of Kashmir, resulting in the deaths of two terrorists and the recovery of arms and ammunition.

Srinagar: On Wednesday, security forces foiled a significant infiltration attempt along the Line of Control (LoC) in the Gurez sector of north Kashmir’s Bandipora district. During a brief exchange of fire, two terrorists were eliminated.

Officials reported that troops stationed near the Naushera Nar area of Gurez detected suspicious movement close to the LoC. When challenged, the infiltrators opened fire, prompting a gunfight. A joint operation involving the Indian Army and Jammu & Kashmir Police successfully neutralized the two infiltrators. Arms and ammunition were recovered from the scene, while their identities and affiliations are currently under investigation.

Search operations are ongoing in the dense forested area surrounding the incident to ensure that no additional infiltrators remain in the vicinity. Senior officials from both the Army and Police are closely monitoring the situation.

This incident marks the latest in a series of infiltration attempts that security forces have thwarted in recent weeks. On August 26, another infiltration bid was foiled in the Uri sector of Baramulla district when troops opened fire upon observing suspicious movement along the LoC. Although a massive search operation was launched, no bodies were recovered from that incident.

Earlier, on August 13, a soldier lost his life during an exchange of fire with infiltrators in the Uri sector. The operation lasted several hours in the forward areas near the LoC, highlighting the ongoing challenges faced by security forces in the region.

These recent infiltration attempts are perceived as part of intensified efforts by militant groups to breach the border into Kashmir before the onset of winter, when traditional infiltration routes are likely to be obstructed by heavy snowfall.

In response, security forces remain on high alert across the LoC, actively working to prevent any cross-border infiltration attempts.

Source: Original article

Suspect Arrested in Awantipora with Pistol and Ammunition

Security forces apprehended a suspect with a pistol and ammunition in Awantipora, South Kashmir, amid ongoing operations to dismantle militant networks in the region.

SRINAGAR: On Wednesday, security forces arrested a suspect in possession of arms and ammunition in the Hari Parigam village of Awantipora, located in South Kashmir.

A senior police officer reported that a joint team comprising the Police, Army, and Central Reserve Police Force (CRPF) established a checkpoint in the area. During routine checks, a man exhibiting suspicious behavior was taken into custody.

A subsequent search yielded a pistol, a magazine, and nine rounds of 9mm ammunition. The individual has been identified as Sakib Reyaz Ganie, the son of Reyaz Ahmad Ganie, and a resident of Chaki-i-Cholan in Shopian.

Sources indicate that Sakib is a prime suspect in a grenade attack on a CRPF camp in Lariyar and has been missing since May 11, 2025. Following his arrest, police have registered a case, and further investigations are ongoing.

In related developments, security forces have intensified their operations across Jammu and Kashmir to disrupt terror networks. The Jammu and Kashmir Police’s State Investigation Agency (SIA) recently apprehended an over-ground worker linked to the banned Hizbul Mujahideen outfit.

Additionally, three over-ground workers were arrested in Handwara along with arms and ammunition. In Tral, two terror associates were detained with explosive materials, hand grenades, and AK-47 rounds.

These incidents underscore the ongoing efforts by security agencies to dismantle militant infrastructure and uphold peace in the region, reflecting a commitment to counter-terrorism initiatives.

Source: Original article

LG Sinha Reviews Flood Response, Urges Swift Rescue and Relief Efforts

Lieutenant Governor Manoj Sinha has directed swift rescue and relief operations in Jammu and Kashmir following severe flooding caused by incessant rains.

SRINAGAR: Lieutenant Governor Manoj Sinha convened a high-level meeting on Wednesday to assess the ongoing rescue and relief efforts in Jammu and Kashmir, prompted by relentless rains and subsequent flash floods.

The meeting brought together key officials from the Union Territory, senior Army commanders, and representatives from various central agencies, including the National Disaster Response Force (NDRF), Central Armed Police Forces (CAPFs), Border Roads Organisation (BRO), National Highways Authority of India (NHAI), and telecom service providers.

During the meeting, Sinha emphasized the urgency of the situation, instructing officials to prioritize the safe evacuation of residents from low-lying and flood-affected areas. He underscored the critical need to restore essential services, including power, healthcare, drinking water, ration supplies, and telecommunications, as quickly as possible.

“Essential services disrupted in flood-hit areas must be restored without delay, and adequate stocks of food, medicines, and other supplies must be ensured in all affected districts,” Sinha stated.

The Lieutenant Governor directed the Power Development Department (PDD) to collaborate closely with NHPC Limited and Power Grid Corporation of India Limited (PGCIL) to expedite the restoration of power infrastructure. He also called on the NHAI to provide full support to the Public Works Department (PWD) in repairing damaged roads and bridges throughout the Union Territory.

In addition, the Additional Chief Secretary for Jal Shakti was tasked with making alternative arrangements for safe drinking water in water-logged and remote areas until regular supply lines can be restored. The Health Department was instructed to prepare hospitals for a potential increase in patients, particularly those suffering from water-borne diseases.

Sinha further announced that non-essential government offices, schools, and colleges would remain closed until further notice. He mandated that all districts maintain 24/7 control rooms to assist individuals and families affected by the floods.

Emergency response teams were also ordered to be pre-positioned in vulnerable areas, ensuring they are equipped for immediate deployment.

<p“No officer or employee will be allowed to leave their station or take leave. The administration must remain on the ground to reach every household in distress,” the Lieutenant Governor directed.

In reviewing the ongoing efforts, Sinha commended the Army, Air Force, NDRF, CAPFs, State Disaster Response Force (SDRF), Police, and District Administrations for their prompt actions in rescuing and relocating individuals to safer locations, which helped minimize casualties.

The high-level meeting included Chief Secretary Atal Dulloo; Lt Gen Pratik Sharma, GOC-in-C Northern Command; NHAI Chairman Santosh Yadav; DGP Nalin Prabhat; Lt Gen Prashant Srivastava, GOC 15 Corps; Shaleen Kabra, ACS Jal Shakti; Dr. Mandeep K. Bhandari, Principal Secretary to the LG; senior Army and CAPF officials; Commissioners of Jammu and Kashmir divisions; and administrative secretaries from all departments.

Sinha assured attendees that he is personally monitoring the situation around the clock and is in close contact with both Union Territory and central agencies to ensure timely responses and relief measures are implemented effectively.

Source: Original article

Fresh Infiltration Attempt Thwarted by Security Forces in Baramulla

Security forces successfully thwarted an infiltration attempt in Baramulla’s Uri sector, resulting in a brief exchange of gunfire and an ongoing search operation in the area.

Srinagar: Security forces have foiled an infiltration attempt along the Line of Control (LoC) in the Torna area of Uri sector, located in Baramulla district of Jammu and Kashmir, officials reported today.

According to sources, troops stationed along the LoC detected suspicious movement near forward posts in the early hours of the morning. When challenged, the individuals attempting to cross the border opened fire, prompting a brief exchange of gunfire.

In the aftermath of the encounter, security forces launched a comprehensive search operation in the dense forest area to locate the infiltrators. As of now, no casualties have been reported from either side.

While the Army and Jammu and Kashmir Police have yet to release an official statement, the operation is ongoing, and further details are anticipated.

This incident is part of a troubling trend, as it marks the latest in a series of infiltration attempts reported along the LoC this month. On August 13, a soldier lost his life during a gunfight with infiltrators in the Uri sector. Earlier in the first week of August, another infiltration attempt was thwarted in the Keran sector, where troops recovered weapons and other military supplies following a brief firefight.

Officials suggest that the recent increase in infiltration attempts indicates heightened activity from across the border, as militant groups are likely trying to push operatives into the Valley before the onset of winter. In response, security forces are maintaining a high level of alert along the LoC, implementing intensified patrols, surveillance, and counter-infiltration measures.

Source: Original article

Old Hand Grenade Found in Garbage Dump in Srinagar’s Safakadal

Police recovered an old hand grenade from a garbage dump in Srinagar’s Safakadal area, prompting a safety response from the Bomb Disposal Squad and an ongoing investigation.

Srinagar: On Monday, police discovered an old, rusted hand grenade in a garbage dump located in Iqbal Colony, within the Safakadal area of Central Kashmir’s Srinagar district.

A senior police officer reported that the grenade was found by local residents who promptly alerted the authorities. “Prima facie, it appears to be an old, rusted grenade. It has been taken into possession for further examination,” the officer stated.

In response to the discovery, the Bomb Disposal Squad was dispatched to the site. The area was temporarily cordoned off to ensure the safety of nearby residents. Fortunately, the grenade was removed without any incidents.

This incident follows a recent event in the Shalteng area of Srinagar, where a suspicious bag containing explosive materials was found near a roadside. In that case, the swift actions of police and bomb disposal teams averted potential danger.

Authorities have acknowledged the Safakadal incident and have initiated an investigation to ascertain the origin and age of the recovered explosive. They are also urging the public to remain vigilant and report any suspicious objects or activities immediately.

Source: Original article

Arms and Ammunition Seized During Operation in Kupwara, North Kashmir

Security forces in Kupwara, North Kashmir, recovered a substantial cache of arms and ammunition during a joint search operation, believed to be linked to cross-border militants.

Srinagar: A joint search operation conducted by security forces resulted in the recovery of a significant cache of arms and ammunition in the Doriban Madhama Awora forest area of Kupwara district on Saturday.

According to police sources, the operation was initiated based on specific intelligence received from UIC 98 Battalion. Personnel from the Central Reserve Police Force (CRPF) 98 Battalion, in collaboration with the Jammu and Kashmir Police from Police Post Awora, launched a cordon and search operation under the jurisdiction of Police Station Trehgam.

During the operation, the following items were recovered:

One hand grenade, ten AK-47 rounds, one telescope, six detonators, and one Pakistan-made backpack.

This recovery adds to an earlier cache seized during operations in the same area, which included two AK-47 rifles, four AK magazines, 120 rounds of ammunition, one pistol with two magazines, five hand grenades, wireless communication devices, and suspected narcotics that have been sent for forensic testing.

Officials believe that these recoveries may be linked to cross-border infiltration or hidden supply drops intended for militant use. “A case has been registered under relevant sections at Police Station Trehgam. Investigations are ongoing to identify the handlers and trace any possible militant links,” the officials stated.

Search operations in the area remain active as authorities continue to monitor the situation closely.

Source: Original article

Massive Search Operation Underway After Drone Sighting Near Jammu Border

Security forces have initiated a large-scale search operation in Jammu’s Gajansoo-Marh area following the sighting of a suspected hostile drone, raising fears of potential weapon or narcotics drops.

Jammu: A significant search operation was launched by security forces in the Gajansoo-Marh region along the Indo-Pakistan International Border after a suspected hostile drone was detected deep within Indian territory on Wednesday evening.

According to officials, the drone’s movement prompted an immediate alert in the border area. The Jammu and Kashmir Police, in collaboration with personnel from the Border Security Force (BSF), quickly cordoned off the fields and surrounding residential neighborhoods to locate the unidentified flying object.

The atmosphere in the area remained tense as search teams meticulously combed through agricultural lands and clusters of villages, driven by concerns over a potential drop of weapons or narcotics. An official confirmed, “Soon after receiving inputs of drone activity, teams of BSF and police rushed to the spot. A large-scale search operation is still underway.”

This incident has reignited worries about increased drone activity across the border. In previous instances, security forces have successfully thwarted multiple attempts to drop contraband in the Jammu sector, recovering consignments that included weapons, explosives, and narcotics believed to have originated from across the border.

In response to this latest incident, officials have stated that security measures have been intensified along the sensitive border region to ensure that any infiltration or smuggling attempts are swiftly neutralized.

Source: Original article

Search Operation Underway in Kathua Following Armed Suspects Sighting

Security forces initiated a search operation in Kathua’s Juthana area following reports of two armed suspects spotted by locals.

KATHUA: A significant search operation was launched late Thursday night in the Juthana area of Rajbagh, Kathua district, after local residents reported sightings of two armed individuals.

According to official sources, the alert was raised around 9:45 p.m. when police received information from a local eyewitness in the Jakhol area. The witness reported seeing two unidentified men dressed in black and carrying weapons in the vicinity around 9:30 p.m. Notably, the suspects were not seen carrying any backpacks.

In response to the report, the Jammu and Kashmir Police, with assistance from security forces, quickly mobilized to the area, initiating a cordon-and-search operation aimed at locating the suspects. The locality was sealed off, and door-to-door searches were conducted to ensure thorough scrutiny of the area.

Officials confirmed that the search efforts continued late into the night, with additional reinforcements deployed to sensitive areas to prevent any potential incidents. This heightened alert comes in light of previous instances of militant movements reported in various parts of the Kathua district.

Further details regarding the operation and the suspects remain pending as authorities continue their investigation.

Source: Original article

Two Associates of LeT Arrested with Weapons in Bandipora

Security forces in North Kashmir apprehended two associates of the terrorist group Lashkar-e-Taiba, seizing arms and ammunition during a search operation in Sumbal.

Srinagar, August 17: On Sunday, security forces apprehended two individuals linked to the proscribed terrorist organization Lashkar-e-Taiba (LeT) in the Malpora Nowgam area of Sumbal, located in North Kashmir’s Bandipora district.

According to officials, a joint checkpoint was established by the Jammu and Kashmir Police and the Army. During the search operation, two suspects were intercepted and found in possession of arms and ammunition.

The recovered items included two Chinese grenades, two Under Barrel Grenade Launcher (UBGL) grenades, and ten AK-47 rounds.

The arrested individuals have been identified as Abdul Majid Gojri from SK Bala and Abdul Hamid Dar from Vijpara.

A case has been registered against them under the Unlawful Activities (Prevention) Act (UAPA), and an investigation is currently underway to determine their connections to active terrorists and any involvement in previous attacks.

This incident is part of a broader pattern of recent arrests of Over Ground Workers (OGWs) in Kashmir. On August 15, one terrorist associate was apprehended in Pulwama with incriminating materials during a joint operation in the Rajpora area. Earlier, on August 10, three OGWs affiliated with LeT were arrested in Kreeri while allegedly planning attacks on security forces.

Additionally, on August 2, security forces dismantled a narco-terror module in Kupwara, arresting two LeT associates who were found with drugs and arms smuggled from Pakistan. On July 28, two OGWs were caught in Shopian while providing shelter and support to foreign militants hiding in the region. Furthermore, on July 22, an OGW operating a Telegram channel for recruiting youth into terrorist ranks was arrested by the cyber cell and police in Srinagar.

These arrests highlight the intensified efforts by security forces to crack down on terror support networks in the Valley. OGWs play a crucial role in militant logistics, and authorities are committed to swiftly disrupting these channels to enhance security in the region.

Source: Original article

Three Arrested in Handwara for Terrorism-Related Activities

Three terror associates were arrested in Handwara, North Kashmir, during a joint operation by security forces, resulting in the seizure of arms and anti-national materials.

Srinagar: In a significant development, security forces in North Kashmir’s Handwara have apprehended three individuals suspected of being terror associates. This operation was carried out collaboratively by the Jammu and Kashmir Police, the Army, and the Central Reserve Police Force (CRPF).

The arrests took place in the Wajihama area of Qalamabad, following specific intelligence inputs that indicated potential terrorist activities. The operation led to the capture of three individuals believed to have connections with terrorist handlers operating from Pakistan.

The arrested individuals have been identified as Mohd Iqbal Pandith, aged 23, son of Shareef Din Pandith and a resident of Bunpora, Langate; Sajad Ahmad Shah, aged 26, son of Bashir Ahmad Shah and a resident of Check-Puran, Langate; and Ishfaq Ahmad Malik, aged 22, son of Shabir Ahmad Malik and a resident of Hajin, Kralgund.

During the operation, security forces recovered a cache of arms and ammunition, along with incriminating materials. The items seized included one pistol with a magazine, two rounds of pistol ammunition, twenty rounds of 7.62 mm ammunition, and eleven anti-national posters.

In response to these developments, police have registered a First Information Report (FIR No. 30/2025) under relevant sections of the Indian Arms Act and the Unlawful Activities Prevention Act (UAPA) at the Police Station in Qalamabad.

Investigations are currently underway to uncover the broader network associated with these arrests and to trace any additional associates involved in the terror module.

Source: Original article

Kishtwar Police Activate Control Rooms Amid Cloudburst and Flood Threat

Kishtwar Police have issued a disaster advisory and activated control rooms amid heavy rains and the threat of flash floods and landslides in the region.

KISHTWAR: In response to severe weather conditions and recent cloudbursts that have triggered flash floods in parts of Kishtwar district, particularly in the severely affected Chosoti village in Paddar, the District Police Kishtwar, in collaboration with district authorities, has issued a weather and disaster advisory aimed at ensuring public safety.

Control rooms and help desks have been established throughout the district to assist residents, pilgrims, and travelers, especially those in vulnerable and remote areas. All sub-divisions have been placed on high alert, with dedicated police teams ready to respond swiftly to emergencies arising from heavy rainfall, landslides, flash floods, or road blockages.

The District Police Kishtwar has urged residents and pilgrims to remain vigilant, avoid unnecessary travel to high-risk zones, and maintain constant communication with the nearest police station in case of emergencies. The advisory includes several helpline numbers for immediate assistance, which are as follows:

District Control Room: 01995-259555, 9484217492

PCR Kishtwar: 9906154100, 9103454100, 01995-259193, 100

Sub-Divisional & Police Station Helplines:

SSP Kishtwar: 9419134002

Addl. SP Kishtwar: 9419158700

Dy.SP Hqrs Kishtwar: 9796455564

SDPO Atholi (Paddar & adjoining): 9419181083

SDPO Marwah (Marwah/Wadwan): 9858299319

SHO Kishtwar: 9906207082

SHO Dachhan: 7006236621

SHO Chatroo: 7006648892

SHO PS Atholi: 9906076000

Area-Specific Control Rooms:

Paddar Control Room: 9858223125, 6006701934, 9797504078, 8492886895, 8493801381, 7006463710

The police have assured that additional contact points for other flood and landslide-prone areas will be provided by local police stations as needed.

Authorities encourage the public to stay informed through the official social media channels, including Facebook: Kishtwar Police and Twitter: SSP Kishtwar, for real-time alerts and advisories.

Safety remains the top priority as security forces, police, and disaster response teams continue to monitor the evolving weather situation and provide assistance to affected areas, according to The Sunday Guardian.

Source: Original article

Army Thwarts Infiltration Attempt at LoC in Uri; One Soldier Killed

Indian Army successfully thwarted an infiltration attempt along the Line of Control in Uri, North Kashmir, resulting in the death of one soldier during the ensuing gunfight.

In a significant security incident, the Indian Army has successfully foiled an infiltration attempt along the Line of Control (LoC) in the Uri sector of North Kashmir. This operation unfolded under the cover of darkness when a group of terrorists attempted to breach the border.

According to defence sources, the infiltration led to a fierce gunfight between the infiltrators and Indian troops. Tragically, during the exchange of fire, one Indian Army soldier was killed in action. His exceptional bravery was instrumental in preventing the infiltration attempt from succeeding.

In response to the incident, the Army has initiated a comprehensive counter-infiltration operation. This operation includes extensive combing of the area to locate any remaining infiltrators and to assess the potential involvement of Border Action Teams (BAT) from across the border.

Exclusive visuals from the scene depict heightened activity in the forward areas, with additional reinforcements being deployed to the LoC. Search operations are currently underway to ensure the area is secure.

Officials have indicated that this infiltration bid is part of a broader trend of increased attempts from across the LoC, aimed at disturbing peace in the region, particularly in the lead-up to Independence Day.

Further details regarding the situation are awaited as the Army continues its operations in the area.

Source: Original article

Kishtwar Encounter: Two Hizbul Militants, Including Commander, Trapped in Forest

An intense gunfight in Kishtwar, Jammu and Kashmir, has led to the entrapment of two Hizbul Mujahideen militants, including a top commander, in a forest cave.

JAMMU: A fierce gunfight erupted in Kishtwar district of Jammu and Kashmir on Sunday as security forces initiated a search operation in the hilly Dool area, following specific intelligence reports regarding the presence of militants.

As the search parties advanced, the militants, believed to be two in number, opened fire, prompting an immediate exchange of gunfire. Sources indicate that the militants are Riyaz and Mudasir, members of the banned Hizbul Mujahideen outfit. They are reportedly holed up in a cave deep within the forest, which has been fortified and strategically positioned to evade aerial detection.

The local police have announced a reward of ₹30 lakh for information leading to the capture or elimination of Riyaz, Mudasir, and Jahangir Saroori, who is noted as the longest-surviving terrorist associated with Hizbul Mujahideen and a key figure in sustaining militancy in the Chenab Valley.

The Army’s White Knight Corps confirmed the encounter via a post on X, stating that alert troops conducting an intelligence-based operation established contact with the terrorists in the early hours, leading to the ongoing exchange of fire.

Kishtwar has been a hotspot for militancy for several years, serving as a strategic transit and hideout area for terrorists operating between the Kashmir Valley, Doda, and parts of Jammu. The region’s dense forests, rugged terrain, and remote villages have allowed small groups of militants to evade capture and continue their operations despite numerous counter-insurgency efforts.

Security officials assert that neutralizing the Hizbul module based in Kishtwar would deliver a significant blow to the militant networks in the Chenab Valley, which have relied on this area for recruitment, logistics, and shelter.

As of the latest reports, the operation is still ongoing, with additional forces deployed to prevent any escape from the cordoned-off zone.

Source: Original article

Security Forces Conduct Major Anti-Terror Operation in Reasi Village

Security forces have initiated a significant anti-terror operation in Godhar Khalsa village, Reasi district, following a shopkeeper’s report of suspicious individuals in the area.

Jammu – Security forces have launched a comprehensive anti-terror operation in Godhar Khalsa village, located in Reasi district, after a local shopkeeper reported a late-night encounter with suspected individuals in a nearby forest.

The incident occurred around 1:55 a.m. when the shopkeeper was returning home after closing his store. He recounted that the suspects approached him, took some pears he was carrying, and instructed him to leave without causing him any harm. “Their presence was suspicious, and I immediately informed the police,” he stated.

In response to the shopkeeper’s report, the Jammu and Kashmir Police, in collaboration with other security agencies, cordoned off the village at first light. They launched an intensive search operation aimed at identifying and neutralizing any potential terrorist presence in the area.

Godhar Khalsa is situated along the Jammu–Poonch Highway and is not far from the Line of Control (LoC)-facing Sunderbani sector, a route historically used for infiltration.

Following the recent Operation Sindoor, which targeted multiple terrorist launch pads and airbases in Pakistan, security forces have increased surveillance across Jammu and Kashmir. They are conducting aggressive search-and-destroy missions in suspected militant hideouts in Rajouri, Poonch, Reasi, and other vulnerable areas.

A senior police officer emphasized the clarity of their mission: “No movement corridor will be left unchecked. If terrorists are in the area, they will be traced and neutralized.”

The operation in Godhar Khalsa is ongoing, with additional reinforcements deployed and all exit routes sealed to prevent any potential escape of suspects.

Source: Original article

US Airport Security: Potential Increase in Liquid Allowances

Travelers may soon carry more liquid in their carry-on luggage, as Homeland Security Secretary Kristi Noem considers revising the current TSA guidelines.

Homeland Security Secretary Kristi Noem announced potential changes to airport security procedures, particularly concerning the current restrictions on liquid amounts travelers can bring in their carry-on luggage.

Speaking at a conference hosted by “The Hill” on Wednesday, Noem expressed her willingness to review current Transportation Security Administration (TSA) practices. She mentioned the possibility of altering the size restrictions for liquids in carry-on bags, although no specific details or timelines were provided.

Present TSA regulations allow travelers to carry liquids in travel-sized containers, each no larger than 3.4 ounces (100 milliliters). These containers must fit into a one-quart, resealable plastic bag. Larger bottles are only permissible in checked luggage, with exceptions made for medications and baby formula.

The current rules for liquids have been in place since 2006, instated to prevent incidents similar to a thwarted plot in the same year where liquid explosives were almost smuggled onto planes. This guidance has led to a usual scene at TSA checkpoints where passengers often discard or hastily consume beverages and other liquid items that exceed the size limit.

Noem’s consideration for changes comes shortly after her announcement on July 8 that passengers would no longer be required to remove their shoes during security screenings. This aspect of the security process was revised following a successful pilot program indicating that TSA had the necessary equipment to ensure safety without the need for shoe removal. This policy had been enforced since the 2006 implementation, a response to the “shoe bomber” Richard Reid’s attempt in late 2001 to bring down a flight from Paris to Miami.

In addition to discussing liquid restrictions, Noem shared her broader vision for the future of airport travel, ultimately aiming for a streamlined entry process. “Hopefully, the future of an airport,” she said, “is that you walk in the door with your carry-on suitcase, you walk through a scanner, and go right to your plane. It takes you one minute.”

The TSA currently maintains a comprehensive list on its website detailing what constitutes a liquid. Items such as yogurt, peanut butter, jam, and jelly are all subject to the 3.4-ounce rule. Discussions often arise over these definitions as travelers navigate what they can and cannot bring through security.

These proposed changes reflect ongoing adjustments within Homeland Security to adapt to evolving threats while striving to improve the travel experience, according to The Associated Press.

Source: Original article

India Tests Hypersonic Missile with 1,500 km Range

India has conducted a test of a hypersonic missile capable of reaching eight times the speed of sound and targeting areas as far as 1,500 kilometers, marking a significant advancement in its defense technology.

India has reportedly tested the Extended Trajectory Long Duration Hypersonic Cruise Missile (ET-LDHCM), designed under the Defence Research and Development Organisation’s (DRDO) Project Vishnu. This new missile can travel at Mach 8, approximately 11,000 km/h, and can strike targets as far as 1,500 kilometers away, significantly surpassing the capabilities of the existing BrahMos cruise missile. The BrahMos, by contrast, reaches speeds of Mach 3, or about 3,675 km/h, and a maximum range of around 450 kilometers from its initial 290 kilometers.

The development of the ET-LDHCM underscores India’s ongoing efforts to modernize its defense systems amid escalating global tensions. The geopolitical landscape is fraught with conflict, including issues between Israel and Iran and deteriorating relations between India and Pakistan. India is further prompted to enhance its missile systems, such as the BrahMos, Agni-5, and Akash, due to growing alliances like that between Turkey and Pakistan.

Powered by a scramjet engine utilizing air-breathing propulsion, the ET-LDHCM gains speed from atmospheric oxygen instead of a traditional rotating compressor. This technological leap allows it to perform long-range, high-speed operations with extraordinary precision and stealth. Its low-altitude flight capability helps to evade radar detection, enhancing its strategic efficiency.

This hypersonic missile, capable of carrying a payload between 1,000 to 2,000 kilograms, is engineered to deliver both conventional and nuclear warheads. It can be launched from land, sea, or air platforms, offering flexibility in deployment. Additionally, the missile’s capability to alter its trajectory mid-flight allows for adaptability in dynamic battlefield conditions.

The ET-LDHCM is designed to withstand extreme thermal stress, maintaining stability at temperatures up to 2,000°C during hypersonic travel. This resilience is essential for achieving sustained speed and targeting accuracy.

Currently, only Russia, the United States, and China possess operational hypersonic cruise missile technology. With the successful test of the ET-LDHCM, India positions itself among an elite group of nations with indigenous hypersonic capabilities. The deployment of such advanced technology aims to bolster India’s deterrence strategy, particularly against Pakistan, while serving as a counterbalance to China’s expanding influence in the Indo-Pacific region.

The strategic advancements achieved through the development of the ET-LDHCM exemplify India’s commitment to strengthening its national security infrastructure, thereby ensuring preparedness in the face of potential regional threats, according to Economic Times.

Source: Original article

US Airports End Shoe Removal Rule at Security Screenings

U.S. airports will no longer require passengers to remove their shoes during security screenings, ending a long-standing requirement implemented by the Transportation Security Administration (TSA).

The U.S. Department of Homeland Security has announced that the policy requiring passengers to remove their shoes during airport security screenings has been discontinued, effective immediately. This decision marks the end of a measure that has been in place across the nation since 2006.

Homeland Security Secretary Kristi Noem stated that although passengers can keep their shoes on, the TSA will maintain a “multi-layered” security screening process. Passengers are still required to remove belts and coats and to separate laptops and liquids from their carry-on bags, although these rules are currently under review.

The shoe removal policy was initially enacted in response to an attempted bombing by British national Richard Reid, who attempted to detonate explosives hidden in his shoes on a flight from Paris to Miami in December 2001. Reid was subdued by fellow passengers, allowing the flight to land safely in Boston.

“Our security technology has changed dramatically. It’s evolved. TSA has changed,” Secretary Noem remarked at a news conference. “We have a multi-layered, whole-of-government approach now to security and to the environment that people anticipate and experience when they come into an airport that has been honed and it’s been hardened.”

The adjustment aligns with the intent to enhance the travel experience while maintaining the level of security that travelers expect. “It’s important we find ways to keep people safe, but also streamline and make the process much more enjoyable for every single person,” Noem added.

Some airports, including Cincinnati/Northern Kentucky International Airport, Philadelphia International Airport, and Piedmont Triad International Airport in North Carolina, had already implemented the new shoe policy before the formal announcement.

Previously, those qualified for the TSA PreCheck program, such as children and other approved travelers, were exempt from removing footwear during security checks. The PreCheck program offers a fast-track screening process for approved travelers, which involves an application process and fingerprinting.

Airlines for America, a trade organization representing major U.S. airlines, expressed support for the new changes. “This policy change will go a long way in facilitating smooth, seamless and secure travel for passengers and is welcome news to the millions of people who fly every day,” said Nicholas E. Calio, president and CEO of Airlines for America, in a statement.

The removal of shoes was one of several security measures introduced following the September 11, 2001, terrorist attacks, along with other precautions aimed at preventing similarly dangerous items from being brought aboard aircraft.

While the policy change affects the shoe removal requirement, it is part of a broader initiative to optimize the airport security experience without compromising safety measures in place since the early 2000s.

Senate Approves Trump Agenda Bill After Extended Voting Session

The Senate has narrowly passed President Donald Trump’s domestic agenda bill, which now moves to the House of Representatives for further approval.

The Senate passed President Donald Trump’s ambitious legislative package on a knife-edge vote of 50-50, with Vice President JD Vance casting the decisive vote. This megabill represents a core component of Trump’s domestic agenda and has set the stage for a significant legislative battle as it heads to the House of Representatives.

Republican leaders in the Senate managed to secure enough votes after intense negotiations with key holdouts in their ranks. However, the next hurdle appears imminent, with GOP leaders in the House now facing a high-stakes effort to ensure the bill reaches the president’s desk by July 4.

While visiting a makeshift detention facility called “Alligator Alcatraz” in Florida, President Trump confidently predicted the bill’s successful passage in the House. He also downplayed concerns related to potential impacts on American health care coverage, which have been a point of contention among critics of the bill.

This extensive bill outlines significant tax reductions and boosts in funding for national security, all of which will be offset by the most considerable cuts to the federal safety net seen in decades. As Washington gears up for another legislative showdown, the focus now turns to the House as lawmakers evaluate the sweeping changes proposed within this multi-trillion-dollar plan.

According to CNN, the bill’s advancement symbolizes a pivotal moment in Trump’s tenure, potentially reshaping the nation’s fiscal landscape if fully enacted.

Source: Original article

US Issues Terror Alert Amid Rising Tensions Over Israel-Iran Conflict

Secretary of Homeland Security Kristi Noem has released a National Terrorism Advisory System (NTAS) Bulletin warning of an elevated threat environment throughout the United States due to the nation’s direct involvement in the escalating conflict between Israel and Iran. While there are currently no verified, specific, or credible threats aimed at the US homeland, officials are urging vigilance as tensions continue to rise in the Middle East.

Secretary Noem emphasized the government’s responsibility to ensure public safety during these volatile times. “It is our duty to keep the nation safe and informed, especially during times of conflict,” she stated. Highlighting the dangers associated with the unfolding Israel-Iran confrontation, she added, “The ongoing Israel-Iran conflict brings the possibility of increased threat to the homeland in the form of possible cyberattacks, acts of violence, and antisemitic hate crimes.”

The advisory went into effect on June 22, 2025, and is set to expire on September 22, 2025, at 11:59 PM ET. Authorities are encouraging citizens to promptly report any suspicious activities or potential threats to local police, FBI Field Offices, or the nearest Fusion Center. In emergencies, individuals should contact 911.

The Department of Homeland Security’s bulletin highlights several key concerns contributing to the elevated risk. One of the primary dangers involves the likelihood of cyber intrusions targeting American infrastructure. These attacks may come from pro-Iranian hacktivists or individuals and groups with direct affiliations to the Iranian government. Their typical targets are unsecured American networks and internet-connected devices.

The Department also raised concerns about Iran’s historical commitment to retaliate against American officials deemed responsible for the death of Qassem Soleimani, the high-ranking Iranian military commander killed in a US airstrike in January 2020. This long-standing objective has remained an active element of Iranian foreign policy and intelligence operations, suggesting potential threats to US leadership or government infrastructure.

In addition to cyber threats, there is a growing fear of physical acts of violence within the United States. The bulletin mentions that if Iran’s leaders issue a religious decree urging retaliation against US targets, it could significantly increase the probability that individuals loyal to the Iranian regime might resort to violence on American soil. Such a ruling might inspire lone actors to conduct attacks, even without direct orders or links to foreign terrorist organizations.

Past incidents also play a role in shaping this alert. The bulletin recalls that since 2020, US law enforcement has managed to prevent several potentially deadly plots backed by Iran. Additionally, attempts by the Iranian regime to eliminate critics of the government residing within the United States have been thwarted. These failed operations underscore the ongoing intent and capability of Iran to pursue its enemies, even within foreign borders.

Another concerning element cited in the bulletin is the pattern of anti-Semitic and anti-Israel sentiment motivating previous terrorist attacks within the United States. The ongoing strife between Israel and Iran could further inflame such hostility, potentially triggering more attacks carried out by individuals influenced by extremist ideologies. The Department warns that the current environment could serve as a catalyst for those looking to act on their hatred against the Jewish community, pro-Israel supporters, or American governmental and military symbols.

Foreign terrorist organizations have also responded vocally to the Israel-Iran conflict. Groups such as HAMAS, Lebanese Hizballah, the Houthis, and the Popular Front for the Liberation of Palestine have issued media statements since the beginning of the confrontation. Some of these statements have explicitly called for violence against US personnel and facilities located in the Middle East, presenting yet another layer of threat to American interests abroad.

Domestically, there is concern that such international calls for action could inspire violent extremists and hate crime offenders to target Jewish institutions, synagogues, community centers, pro-Israel events, or even federal buildings and personnel. The Department emphasized that any individual or group associated, or even perceived to be associated, with these entities might be at risk of becoming a target.

In addition to issuing warnings, the Department of Homeland Security has provided resources and guidance to help the public stay safe. Authorities encourage the public to remain attentive to instructions and updates from local officials and emergency personnel.

On the cybersecurity front, the Department’s Cybersecurity and Infrastructure Security Agency (CISA) continues to offer guidance and tools for bolstering the defenses of US digital infrastructure. This includes practical steps for securing networks, identifying vulnerabilities, and preparing organizations for possible cyberattacks.

For those who witness any suspicious behavior or encounter potential threats—whether physical or digital—the DHS encourages reporting through the Nationwide Suspicious Activity Reporting (SAR) Initiative. This collaboration between DHS, the FBI, and local law enforcement aims to detect and prevent terrorism and other criminal activity before it escalates. The campaign reiterates its familiar slogan: “If You See Something, Say Something®.” Authorities urge the public to promptly report suspicious activity or threats of violence—including those made online—directly to local law enforcement, the FBI, or a Fusion Center.

As tensions in the Middle East continue to escalate, US officials remain alert to the possibility that these international hostilities could spill over into the homeland in the form of cyber disruptions, ideological violence, or targeted hate crimes. Although there are no immediate threats at this time, the government stresses the importance of public awareness and cooperation.

The current NTAS Bulletin is part of the Department’s broader efforts to prepare Americans for emerging threats while reassuring them that law enforcement and national security agencies are actively monitoring the situation. By staying informed and vigilant, officials hope to reduce the chances of any planned attacks succeeding.

The alert concludes by reminding citizens that while the threat level has risen due to international conflict, prompt action, public cooperation, and intelligence sharing can help prevent incidents and maintain safety across the country. The government is urging all individuals and communities to take part in safeguarding the homeland by remaining observant, proactive, and informed.

The NTAS Bulletin will remain in effect until September 22, 2025. Until then, local, state, and federal agencies will continue to evaluate and respond to developments both at home and abroad to ensure the continued safety of the American people.

Long Island Ramps Up Security for India-Pakistan Cricket World Cup Match Following ISIS Threat

**Police Heighten Security for Cricket World Cup Match on Long Island Following ISIS Threat**

Authorities are significantly increasing security measures on Long Island in response to a threat from ISIS targeting the upcoming cricket World Cup match between India and Pakistan at East Meadow’s Eisenhower Stadium. This decision was announced on Wednesday by local officials, who emphasized that while there is no “specific threat” of an attack during the June 9 match, they are not willing to take any risks with the international event approaching.

Nassau Police Commissioner Patrick Ryder assured the public, “This will be the tightest security that Nassau County has ever seen. Every single asset in the police department is involved, including our intelligence.” The police force has coordinated with several agencies to ensure comprehensive security coverage. “We have partnered with the NYPD, the MTA, the New York State Police, Suffolk County, FBI, and DHS. Customs have all provided briefings,” Ryder added, affirming that all intelligence reports are credible.

The decision to bolster security follows a menacing online post by the Islamic State on matrix.com. The post, dated May 28, featured a hooded individual with a rifle, accompanied by the message, “You wait for the matches… and we wait for you,” with “Nassau Stadium” and the date June 9 prominently displayed at the top.

To enhance safety, county officials have announced several measures. A contingent of 100 police officers will be assigned to patrol neighboring areas, and the stadium will have metal detectors at every entrance. Additionally, a no-fly zone will be enforced overhead, and there will be strict regulations on items spectators can bring into the venue. Ryder emphasized that lingering outside the stadium will be prohibited, and drones are strictly banned.

“This is like the Super Bowl on steroids,” Nassau County Executive Bruce Blakeman declared during Wednesday’s press conference. He expressed full confidence in the safety measures, stating, “If I wasn’t confident that we were safe, secure, and that our healthcare measures were not in place, I would not do this.”

Governor Kathy Hochul also commented on the preparations, noting that officials in Albany have been coordinating with federal agencies for months to ensure the cricket matches are well-protected against potential terrorist activities. “While there is no credible public safety threat at this time, we continue to monitor the situation closely,” she said. “I have also directed the New York State Police to engage in elevated security measures, including an increased law enforcement presence, advance surveillance, and thorough screening processes.”

The International Cricket Council has announced that the 11-week World Cup competition will be hosted at various international venues, including eight matches scheduled to take place at the 34,000-seat Long Island stadium.

Alleged Indian Intelligence Operations Abroad Stir Tensions with Western Allies

US and Australian media reports on alleged overseas operations by Indian “intelligence officials” have caught New Delhi off-guard, stirring disquiet within the establishment. Sources suggest a perceived “concerted pushback” from key Western strategic allies. According to the Australian Broadcasting Corporation (ABC), Indian operatives were expelled from Australia for attempting to pilfer sensitive defense and airport security information, along with classified data on trade relationships. The Australian and the Sydney Morning Herald confirmed the expulsion of two Indian “spies.”

The ABC highlighted a foreign “nest of spies” dismantled by the Australian Security Intelligence Organisation (ASIO) in 2020, alleging surveillance on Indian expatriates and forging close ties with current and former politicians. The Washington Post, a day prior, identified an Indian intelligence official implicated in a plot to assassinate pro-Khalistan Sikh separatist Gurpatwant Singh Pannun, seeking connections with senior Indian intelligence and security figures.

Randhir Jaiswal, spokesperson for the Ministry of External Affairs, denounced The Washington Post’s report, labeling it as containing “unwarranted and unsubstantiated imputations” on a serious matter. He referenced an ongoing high-level investigation addressing security concerns shared by the US government regarding organized crime and terrorism networks.

ABC disclosed that ASIO Director-General Mike Burgess had hinted at the spy network during his 2021 annual threat assessment, without divulging the country involved. Burgess reportedly detailed how the spies recruited an Australian government security clearance holder with access to sensitive defense technology information. The Indian government has yet to respond to ABC’s revelations, given the lack of official endorsement from the Australian government.

When questioned about allegations linking the Indian government to the “nest of spies,” Australian Foreign Minister Penny Wong refrained from commenting on intelligence matters but emphasized democratic principles and the resilience of Australian democracy against foreign interference. Sources indicate a shared sentiment in South Block and North Block, housing the Ministries of External and Home Affairs, that Western agencies aim to establish boundaries with India, a key Quad grouping partner.

The timing, amidst a heated election season in India, bolsters New Delhi’s belief that Western partners prefer a more “sensitive” approach from the next government regarding overseas operations, particularly in certain countries.

-+=