Google Releases Update for Chrome to Address Zero-Day Vulnerability

Google has issued an urgent update for Chrome to address a critical zero-day vulnerability, marking the sixth such incident in 2025, as hackers exploit security flaws in the browser.

Google has released an urgent update for its Chrome browser to address a newly discovered zero-day security flaw that is currently being exploited by hackers. This incident marks the sixth zero-day vulnerability that Chrome has faced in 2025, underscoring the rapid pace at which attackers are able to exploit hidden weaknesses in software.

The vulnerability, identified as CVE-2025-10585, originates from a type confusion issue within Chrome’s V8 JavaScript engine. The flaw was discovered by Google’s Threat Analysis Group (TAG), which reported the issue on Tuesday. The company promptly rolled out a fix the following day, as reported by Bleeping Computer.

Google confirmed that this flaw is actively being exploited in the wild, although it has not disclosed specific technical details or identified the groups responsible for the attacks. TAG has a history of uncovering zero-day vulnerabilities linked to government-sponsored spyware campaigns, often targeting high-risk individuals such as journalists, opposition leaders, and dissidents.

The patch has been delivered through Chrome version 140.0.7339.185/.186 for Windows and macOS, and version 140.0.7339.185 for Linux. These updates will gradually reach all users in the Stable Desktop channel over the coming weeks.

While Chrome typically updates automatically, users can manually apply the patch by navigating to the ‘About Google Chrome’ section. Google has chosen to withhold full technical details until a majority of users have installed the update, a precaution aimed at preventing further exploitation of unpatched systems.

This latest vulnerability is part of a concerning trend, as it is the sixth zero-day flaw that Google has patched in Chrome this year. Earlier this year, in March, Google addressed CVE-2025-2783, a sandbox escape bug that was exploited in espionage attacks against Russian organizations. In May, the company released emergency updates for CVE-2025-4664, which allowed attackers to hijack user accounts. In June, another flaw in the V8 engine, CVE-2025-5419, was patched after being identified by TAG. July saw the release of a fix for CVE-2025-6558, which enabled attackers to bypass Chrome’s sandbox protection.

As Google continues to address these vulnerabilities, it is clear that the company is racing to secure its browser against rapidly emerging threats. Updating Chrome is a quick process, whether on Mac or Windows, and users are encouraged to take action immediately.

In addition to updating Chrome, users can take further steps to protect themselves from potential attacks. Many zero-day exploits are delivered through malicious websites or email attachments, so it is crucial to avoid clicking on unknown links or downloading files from unverified sources. Using strong antivirus software can provide an additional layer of defense, helping to detect malicious code that may attempt to run through compromised browsers.

Even if attackers manage to steal login credentials through a browser exploit, enabling two-factor authentication (2FA) can significantly hinder their ability to access accounts. Users are advised to utilize an authenticator app instead of SMS for stronger protection. Additionally, employing a password manager can help keep credentials secure and generate unique, complex passwords, preventing a domino effect if one account is targeted.

It is also advisable for users to check if their email addresses have been exposed in previous data breaches. Many password managers include built-in breach scanners that can alert users if their information has appeared in known leaks. If a match is found, it is essential to change any reused passwords and secure those accounts with new, unique credentials.

While Chrome updates are critical, it is important to remember that attackers can also exploit vulnerabilities in operating systems such as Windows, macOS, Android, or iOS. Regular updates to these systems can patch vulnerabilities across the board, reducing the likelihood of a browser exploit spreading further.

The frequency of zero-day attacks on Chrome this year highlights the relentless nature of cyber threats and the serious gaps that can exist in even the most widely used software. These vulnerabilities represent not just bugs, but opportunities for hackers to exploit millions of users before fixes can be deployed. The growing sophistication of threat actors, including state-sponsored groups targeting high-risk individuals, further complicates the landscape of online security.

As the battle to secure popular software continues, users are encouraged to stay vigilant and proactive in protecting their personal information. Do you think Google is responding quickly enough to safeguard your data? Share your thoughts with us.

Source: Original article

Inside a Scammer’s Day: Targeting Victims in the Digital Age

Scammers utilize personal data from public records and data brokers to create convincing narratives, enhancing their chances of successfully targeting potential victims through calls and emails.

Imagine sipping your morning coffee when your phone rings. A number you don’t recognize appears on the screen. On the other end, a voice claims to be from your bank, asking you to “confirm a recent charge.” This scenario is all too familiar for many.

Scammers do not rely on luck. They do not randomly select numbers from a phone book in hopes of finding a target. Instead, their calls, texts, and emails are meticulously planned. They often possess a wealth of information about you before they ever reach out, making their pitches sound credible and tailored.

So, what does a typical day look like for a scammer? Let’s take a closer look.

Scammers begin their day not by hacking into secure databases but by accessing data broker sites—dubious online directories that trade personal information like collectibles. These platforms provide a comprehensive profile of individuals, including details such as addresses, email addresses, voter registrations, and even criminal histories, whether accurate or not.

With this information at their fingertips, scammers can construct narratives that seem custom-made for their targets. They do not fabricate details; rather, they borrow from your life, which is why their communications can feel so believable.

Even without social media, scammers can effectively target individuals. Once they have crafted their story, they deploy auto-dialing software to send out thousands of calls daily. By acquiring personal and contact details from various data brokers, they can repeatedly target the same individuals. If you hang up or ignore the call, scammers log your number as “active,” ensuring you remain on their list for future attempts.

Scammers do not need every target to fall for their tricks; they only require a small percentage to succeed. This is a numbers game, and the abundance of personal data significantly increases their odds. At the end of the day, scammers continue their operations by feeding the information they have gathered back into the data cycle, perpetuating the cycle of victimization.

Now, consider a scenario where scammers cannot find your data online. Without access to personal information, they would lack storylines, details to exploit, and the means to personalize their attacks. Removing your data from people-search sites and data broker databases not only cleans up your online presence but also effectively shuts the door on scammers’ tactics.

However, the process of removing your data can be tedious. You could spend hours navigating various sites, filling out opt-out forms, and sending emails while trying to track compliance. The challenge is that data brokers do not cease their operations; new ones emerge weekly, and old ones often reintroduce your data.

This is where data removal services come into play. While no service can guarantee complete removal of your data from the internet, utilizing a data removal service is a wise choice. Although these services may come at a cost, they provide peace of mind by actively monitoring and systematically erasing your personal information from numerous websites.

By limiting the information available about you, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it more challenging for them to target you.

Scammers do not accidentally stumble upon your phone number. They meticulously map out your life, one data point at a time. Therefore, protecting your information online is the most effective step you can take to reduce the likelihood of scam calls, phishing emails, and identity theft.

Remember, every piece of personal data you remove is one less tool in a scammer’s arsenal. What’s the most convincing scam attempt you’ve ever received? Share your experiences with us.

Source: Original article

North Korean Hackers Employ AI Technology to Create Fake Military IDs

North Korean hackers have leveraged generative AI tools like ChatGPT to create convincing fake military IDs, raising concerns about the evolving landscape of cyber threats.

Generative AI has significantly lowered the barriers for sophisticated cyberattacks, as hackers increasingly exploit tools like ChatGPT to forge documents and identities. A North Korean hacking group known as Kimsuky has recently been reported to have used ChatGPT to generate a fake draft of a South Korean military ID. These forged IDs were then attached to phishing emails that impersonated a South Korean defense institution responsible for issuing credentials to military-affiliated officials.

This alarming campaign was revealed by South Korean cybersecurity firm Genians in a recent blog post. Although ChatGPT has safeguards designed to block attempts to generate government IDs, the hackers managed to trick the system. Genians noted that the model produced realistic-looking mock-ups when prompts were framed as “sample designs for legitimate purposes.”

Kimsuky is not a small-time operator; the group has been linked to a series of espionage campaigns targeting South Korea, Japan, and the United States. In 2020, the U.S. Department of Homeland Security indicated that Kimsuky was “most likely tasked by the North Korean regime with a global intelligence-gathering mission.”

The fake ID scheme underscores the transformative impact of generative AI on cybercrime. “Generative AI has lowered the barrier to entry for sophisticated attacks,” said Sandy Kronenberg, CEO and founder of Netarx, a cybersecurity and IT services company. “As this case shows, hackers can now produce highly convincing fake IDs and other fraudulent assets at scale. The real concern is not just a single fake document, but how these tools are used in combination.” Kronenberg emphasized that an email with a forged attachment could be followed by a phone call or even a video appearance that reinforces the deception.

Experts warn that traditional defenses against phishing attacks may no longer be effective. “For years, employees were trained to look for typos or formatting issues,” explained Clyde Williamson, senior product security architect at Protegrity, a data security and privacy company. “That advice no longer applies. They tricked ChatGPT into designing fake military IDs by asking for ‘sample templates.’ The result looked clean, professional, and convincing. The usual red flags—typos, odd formatting, broken English—weren’t there. AI scrubbed all that out.”

Williamson advocates for a reset in security training, urging organizations to focus on context, intent, and verification. “We need to encourage teams to slow down, check sender information, confirm requests through other channels, and report anything that feels off. There’s no shame in asking questions,” he added. On the technological front, companies should invest in email authentication, phishing-resistant multi-factor authentication (MFA), and real-time monitoring to keep pace with evolving threats.

North Korea is not the only nation employing AI for cyberattacks. Anthropic, an AI research company and creator of the Claude chatbot, reported that a Chinese hacker used Claude as a full-stack cyberattack assistant for over nine months. This hacker targeted Vietnamese telecommunications providers, agriculture systems, and even government databases. Additionally, OpenAI has noted that Chinese hackers have utilized ChatGPT to develop password brute-forcing scripts and to gather sensitive information on U.S. defense networks, satellite systems, and ID verification systems.

Cybersecurity experts express alarm over this shift in tactics. AI tools enable hackers to launch convincing phishing attacks, generate flawless scam messages, and conceal malicious code more effectively than ever before. “News that North Korean hackers used generative AI to forge deepfake military IDs is a wake-up call: The rules of the phishing game have changed, and the old signals we relied on are gone,” Williamson stated.

To navigate this new landscape, both individuals and organizations must remain vigilant. Cybersecurity measures should include verifying requests through trusted channels, employing strong antivirus software, and regularly updating operating systems and applications to patch vulnerabilities. Users should also scrutinize email addresses, phone numbers, and social media handles for discrepancies that may indicate a scam.

As AI continues to evolve, so too must our defenses against its misuse. The tools available to hackers are becoming cleaner, faster, and more convincing, making it imperative for companies to update their training and strengthen their defenses. Everyday users should cultivate a habit of questioning the legitimacy of digital requests and double-checking before taking action.

In conclusion, the rise of AI in cybercrime presents significant challenges. The responsibility to combat these threats lies not only with AI companies but also with everyday users who must adapt to this rapidly changing environment. As the landscape of cybersecurity evolves, staying informed and proactive is essential for safeguarding personal and organizational data.

Source: Original article

Massive WWII Bomb Prompts Evacuation of 6,000 Residents

Experts successfully neutralized a massive World War II bomb in Hong Kong’s Quarry Bay, prompting the evacuation of approximately 6,000 residents amid challenging weather conditions.

In a dramatic overnight operation, thousands of residents in Hong Kong were evacuated as experts worked to defuse a massive World War II bomb discovered in the Quarry Bay neighborhood. The nearly five-foot-long, 1,000-pound bomb was unearthed at a construction site early Saturday morning, raising significant safety concerns for the surrounding community.

The U.S.-made bomb, which contained 500 pounds of TNT, was confirmed to date back to World War II by police officials. Andy Chan Tin-Chu, a representative of the Hong Kong police, reported that due to the “exceptionally high risks associated with its disposal,” approximately 1,900 households, involving around 6,000 individuals, were urged to evacuate swiftly.

As the operation unfolded, the Hong Kong Police issued a statement detailing the challenges faced by the bomb disposal team. They worked from around 2 a.m. until nearly noon, braving adverse weather conditions caused by a typhoon. The team successfully neutralized the bomb by 11:48 a.m., ensuring the safety of the public without any reported injuries.

The police emphasized the importance of public safety, stating, “Given the high risks involved in the handling of the bomb that officers from our Explosive Ordnance Disposal Bureau believe to still be in good condition, the Hong Kong Police Force devised the emergency evacuation plan upon the discovery of the bomb.” This plan was implemented to protect residents living near the construction site located at No. 16-94 Pan Hoi Street.

This incident is not the first of its kind in Hong Kong. In 2018, another 1,000-pound World War II bomb was defused at a construction site in the city’s business district, marking the third such discovery that year. The historical context of these findings is significant, as Hong Kong was occupied by Japanese forces during the war and was a target of U.S. air raids.

Authorities continue to monitor the situation closely, and residents have been advised to stay informed about any further developments regarding the bomb disposal and safety measures in the area.

According to the Associated Press, the successful handling of this bomb reinforces the ongoing challenges posed by unexploded ordnance from the war, which remains a concern in various parts of the world.

Source: Original article

From Uri Attack to New Doctrine: India’s Evolving Counter-Terror Strategy

India’s counter-terrorism strategy underwent a significant transformation following the 2016 Uri attack, marking a shift from restraint to proactive military responses against terrorism.

On September 18, 2016, four heavily armed terrorists attacked an Army installation in Uri, Jammu and Kashmir, resulting in the deaths of 19 soldiers. This incident marked a pivotal moment in India’s approach to counter-terrorism, as it prompted a shift away from the longstanding policy of restraint that had characterized New Delhi’s responses to similar provocations. Historically, concerns over nuclear escalation and potential international intervention had guided India’s cautious stance. However, the Uri attack catalyzed a new direction.

The surgical strike that followed, authorized by India within ten days of the attack, was a bold move. Conducted on the night of September 28-29, the operation targeted terrorist launch pads in Pakistan-occupied Kashmir. The announcement of the strikes by the Director General of Military Operations highlighted not only military precision but also a newfound political will. By publicly acknowledging the operation, India reframed both domestic expectations and global perceptions, breaking the precedent of silence that had previously surrounded such covert actions.

The 2016 surgical strikes laid the groundwork for a doctrine of limited punitive action under the looming nuclear threat. This doctrine was put to the test in February 2019, following a suicide bombing in Pulwama that killed 40 CRPF personnel. In response, India escalated its military actions by conducting airstrikes on a Jaish-e-Mohammed training facility in Balakot, deep within Pakistan’s Khyber Pakhtunkhwa province. This operation marked a significant escalation, demonstrating India’s willingness to extend its military response beyond the Line of Control (LoC) and target terrorist infrastructure directly.

India’s actions in Balakot sent a clear message: Pakistan could no longer dictate the terms of escalation or rely on its nuclear arsenal as a shield against retaliation. The operation was framed as a counter-terrorism measure rather than an act of war, allowing India to secure tacit international acceptance of its actions. Balakot thus became more than just a military strike; it was a calculated signal to Pakistan, the Indian public, and the international community.

Despite these actions, Pakistan continued to test India’s thresholds, as evidenced by a series of infiltration attempts along the LoC from 2020 onward. In June 2020, Indian forces thwarted an infiltration bid in Kupwara, while November of the same year saw the foiling of a planned mass-casualty attack in Jammu and Kashmir, resulting in the deaths of four Jaish-e-Mohammad terrorists. Intelligence reports indicated that Pakistan was acquiring military equipment to support these infiltration attempts, further escalating tensions.

Throughout these years, India strengthened its security measures, including the implementation of a hybrid model of a ‘smart’ fence along the LoC. While many infiltration attempts were thwarted, those that succeeded were met with swift retaliation. By 2023, the melting snow opened up infiltration routes, leading to a resurgence of incursion attempts. However, Indian Special Forces, bolstered by drone surveillance and enhanced border security, successfully neutralized militant threats before they could materialize.

The shift in India’s counter-terrorism strategy extended beyond its borders. Where previous policies relied on surveillance and post-attack pursuits, India adopted a proactive approach aimed at preempting terrorist actions. This evolution can be traced back to the 2016 Uri attack and the subsequent surgical strikes, which set a precedent for future military responses.

By 2025, India’s counter-terrorism playbook had further evolved with Operation Sindoor, which integrated cyber disruption, precision strikes, and information campaigns into a coordinated effort. Terror networks faced communication disruptions and financial constraints, while unmanned systems targeted launch pads. Simultaneously, India worked to control the narrative surrounding these operations, ensuring that the message was driven by New Delhi rather than Islamabad.

These strategic changes were not merely ad hoc responses but were formally codified in military doctrine. The Joint Doctrine of the Armed Forces, released in 2017, explicitly included surgical strikes and limited punitive actions as viable military options. This codification provided a legitimate framework for planners and reassured political leadership of institutional backing for such actions. The Land Warfare Doctrine of 2018 further emphasized the need for swift and precise retaliation, supported by air power and other military enablers, while also recognizing the importance of information warfare in modern conflicts.

Nearly a decade after the Uri attack, its legacy continues to influence India’s deterrence posture. The strikes established a credible threat of punishment that altered Pakistan’s strategic calculus, even if they did not completely eradicate terrorism. Each infiltration attempt now carries the risk of immediate retaliation, and any significant terrorist strike risks provoking a broader strategic response from India.

Moreover, the strikes effectively dismantled Pakistan’s long-standing denial strategy. By compelling Islamabad to either deny culpability and lose credibility or acknowledge its involvement and face international pressure, India gained a strategic advantage. Importantly, India framed its actions within the context of globally accepted counter-terror norms, insulating itself from potential diplomatic backlash.

Perhaps most crucially, these military actions introduced a level of flexibility into India’s counter-terrorism strategy. New Delhi is no longer constrained by a binary choice between inaction and all-out war. Instead, it possesses a spectrum of options, ranging from covert operations to overt retaliatory actions, and from preemptive strikes to multi-domain responses. This flexibility is essential in navigating the complexities of a nuclearized and asymmetric security environment.

As India continues to adapt its counter-terrorism strategy, the events of 2016 serve as a reminder of the importance of decisive action in the face of persistent threats. The evolution from restraint to proactive engagement reflects a broader understanding of the challenges posed by terrorism and the necessity of maintaining a credible deterrent.

Source: Original article

FBI Issues Warning About QR Code Scam in Mystery Packages

Federal authorities warn that scammers are sending unexpected packages containing QR codes that can lead to identity theft and malware, exploiting curiosity to trick victims into revealing personal information.

Scammers are increasingly using QR codes in a new scheme that involves sending unexpected packages to unsuspecting individuals. These packages contain QR codes that, when scanned, can redirect victims to fraudulent websites or download malicious software designed to steal sensitive information.

Once considered a convenient tool for checking menus or making payments, QR codes have now become a weapon in the hands of criminals. The latest warning from federal authorities highlights the extent of these tactics, which include fake delivery texts, counterfeit payment links, and malicious codes that replace legitimate ones.

In this latest scam, criminals send packages that recipients never ordered. Inside these boxes is a QR code that, when scanned, can lead to stolen personal details, drained bank accounts, or malware that operates silently in the background of a victim’s phone.

The FBI has issued a public notice regarding this scam, stating, “The FBI warns the public about a scam variation in which criminals send unsolicited packages containing a QR code that prompts the recipient to provide personal and financial information or unwittingly download malicious software that steals data from their phone.” The agency notes that scammers often ship these packages without sender information to entice victims into scanning the QR code.

This scheme is a variation of what is known as a brushing scam. Traditionally, brushing scams involved online sellers sending products to strangers and then using the recipients’ details to post fake reviews. While brushing scams were more of a nuisance, this new approach has escalated to deliberate fraud. Instead of receiving a product, victims often find only a printed QR code that leads to fraudulent websites asking for sensitive personal information, such as banking details, credit card numbers, or login credentials.

Some QR codes go even further, installing malicious software that can track activity and steal data directly from the device. The consequences of falling victim to such scams can be severe, as fake websites may harvest names, addresses, and financial details, while malware can monitor accounts, log keystrokes, or even target cryptocurrency wallets. Often, victims do not realize they have been compromised until they notice unauthorized charges or suspicious withdrawals, by which time their information may already be in the hands of criminals.

Scammers exploit curiosity and convenience to trick individuals into scanning malicious QR codes. To avoid becoming a target, it is essential to adopt a few simple habits. First, avoid scanning QR codes from mystery deliveries, random flyers, or stickers on public signs. A QR code is essentially a disguised link, and until you know where it leads, it should not be trusted.

Even if you accidentally scan a risky code, keeping strong antivirus software on your phone can help. Mobile security apps can block fraudulent sites, warn you before downloads, and protect against malicious QR code attacks. It is also advisable to scan QR codes only from businesses and organizations you already trust, such as your bank’s mobile app or a known retailer’s checkout page.

Most smartphones allow users to press and hold a QR code link to preview where it leads. If the URL appears suspicious—featuring misspellings, random numbers, or shortened links—do not open it. Taking a moment to check can save you from falling into a phishing trap.

Additionally, the less personal data available about you online, the harder it is for scammers to target you with convincing fraud attempts. Consider using data removal services that scrub your information from people-search sites and marketing databases. While no service can guarantee the removal of all your data from the internet, utilizing a removal service can help you monitor and automate the process of eliminating your information from numerous sites over time.

Even if your login details are compromised, two-factor authentication (2FA) can make it more difficult for criminals to access your accounts. By requiring a secondary code sent to your phone or generated through an authenticator app, 2FA adds an extra layer of security to your banking, email, and trading accounts.

Regular software updates are also crucial, as they often contain fixes for security vulnerabilities that scammers may exploit. Keeping your phone’s operating system and apps up to date provides stronger protection against malware that can be delivered through malicious QR codes.

If you receive an unexpected package containing a QR code, do not simply discard it. Report it to local authorities and consider filing a complaint with the FBI’s Internet Crime Complaint Center. Reporting these incidents not only helps protect you but also provides law enforcement with valuable information to track the spread of these scams.

While this scam may not be widespread yet, it illustrates how quickly criminals can adapt to new technology. QR codes were intended to simplify life, and they often do, but that convenience can become a vulnerability when curiosity overrides caution. The key takeaway is that a mystery package with a QR code is not a fun puzzle to solve; it is a red flag. The safest course of action is to resist the urge to scan and report any suspicious packages instead.

Source: Original article

Cardiac Patient Rescued from Flooded Village Near Ajnala

A cardiac patient was successfully rescued from the flood-affected Sammoval village near Ajnala by a dedicated army relief team amid severe flooding in Punjab.

Chandigarh: A woman suffering from a serious heart condition was rescued by the Kharga Sappers flood relief team from Sammoval village, located near Ajnala, according to a Defence Public Relations Officer (PRO) on Wednesday.

The woman, who was bedridden and unable to move, presented a significant challenge for the evacuation team. Due to the extensive flooding, boats were unable to reach her home, necessitating a foot-based rescue operation.

Upon reaching her residence, the team carefully placed her on her bed and carried it on their shoulders for nearly 300 meters to a waiting boat. This method of transport was crucial in ensuring her safe evacuation.

After the successful transfer to the boat, the woman was transported along with her husband and daughter in a Tatra vehicle to Amritsar. There, she was handed over to her relatives for further medical attention.

The Defence PRO emphasized that the swift action and unwavering commitment of the flood relief team were instrumental in the patient’s safe evacuation. This incident highlights the dedication of army personnel engaged in relief operations throughout Punjab during the ongoing flooding crisis.

Source: Original article

Punjab Police Arrest Three in JeM-Linked Cab Driver Murder Case

Punjab Police have arrested three individuals linked to Jaish-e-Mohammad for the abduction and murder of a cab driver in Mohali, recovering weapons and the vehicle involved in the crime.

In a significant development, the Punjab Police announced on Monday the dismantling of a terror module associated with Jaish-e-Mohammad (JeM). This operation led to the arrest of three individuals from Jammu and Kashmir, who are accused of abducting and murdering a cab driver in Nayagaon, Mohali.

The investigation was initiated following the forcible snatching of a taxi belonging to Anil Kumar in Kharar. Kumar’s sudden disappearance, coupled with the deactivation of his mobile phones, raised immediate concerns. This prompted the Sas Nagar Police to launch a thorough investigation, mobilizing multiple teams to track down the suspects.

Through swift and coordinated action, law enforcement successfully apprehended all three accused. The police reported that the vehicle used in the crime, along with a .32 bore pistol, has been recovered. During interrogation, the suspects admitted to shooting Kumar following an altercation and subsequently disposing of his body in the Mohali area. Intensive search operations are currently underway to locate the remains.

Among those arrested is Sahil Bashir, who has a complicated criminal history. He is wanted in connection with a case under the Unlawful Activities (Prevention) Act (UAPA) and the Arms Act in Handwara, Jammu and Kashmir. His brother, Aijaz Ahmad, has previously been arrested for possessing a cache of weapons and materials linked to JeM. Both men have been identified as Over Ground Workers (OGWs) for the Pakistan-based terror organization.

A spokesperson for the Punjab Police stated, “Investigations are ongoing to dismantle the entire network and ensure that no anti-national elements find a foothold in Punjab.”

The swift action by the Punjab Police highlights their commitment to combating terrorism and ensuring the safety of citizens in the region.

Source: Original article

Arms and Ammunition Seized in Kupwara’s Reshwari Area; Investigation Ongoing

Security forces in Kupwara district recovered a substantial cache of arms and ammunition in the Reshwari area, prompting an investigation into its origins and intended use.

SRINAGAR: Security forces successfully recovered a significant cache of arms and ammunition in the Reshwari area of North Kashmir’s Kupwara district on Sunday, according to officials.

The recovery was made following specific intelligence inputs that prompted a joint search operation by security forces in the village of Reshwari, which falls under the jurisdiction of the Trehgam Police Station.

During the operation, a concealed cache containing a variety of sophisticated arms and ammunition was uncovered. The seized items include one Chinese-made pistol, four Pakistan-made Under Barrel Grenade Launchers (UBGLs), four Chinese grenades, one sniper magazine, 26 sniper rounds, one AK-47 machine gun, and 144 rounds of AK-47 ammunition. Additionally, authorities recovered one bag and two Chinese reading leaflets from the site.

A case has been registered under the relevant sections of the law at the Trehgam Police Station. Investigators are currently working to determine the origin and intended use of the recovered arms. Authorities suspect that the cache may have been intended for terrorist activities or to facilitate infiltration attempts along the Line of Control.

This recovery is part of ongoing efforts by security forces to curb the movement of illegal arms and maintain peace and stability in the region.

According to The Sunday Guardian, the investigation is still underway as officials seek to uncover more details regarding the cache’s origins.

Source: Original article

Security Forces Achieve Success in Poonch, Arrest Two Local Terrorists

Security forces in Poonch successfully apprehended two local terrorists linked to Lashkar-e-Toiba, recovering AK rifles and raising concerns about infiltration within the region.

Poonch: In a significant operation, security forces have made a major breakthrough in Poonch by arresting two local terrorists associated with the Lashkar-e-Toiba militant group. The suspects, identified as Tariq and Riyaz, were apprehended by Poonch Police in the Mandi area on Saturday.

Officials reported that the two men had been residing in a rented accommodation in Jallian village, located within Mandi. During a search of their rented room, police recovered two AK-series rifles, highlighting the serious nature of their activities. Alarmingly, one of the arrested individuals was employed as a porter with the Indian Army, raising serious concerns about the infiltration of terror groups into the region.

According to police sources, both suspects had been under surveillance for an extended period and were providing logistical support to Lashkar operatives. An official commented, “The recovery of automatic weapons and the arrest of two trained local terrorists is a significant achievement for security forces in the border district.”

Currently, both Tariq and Riyaz are undergoing intensive interrogation by Poonch Police as authorities work to trace their network and uncover any further connections to terrorist activities. In response to this incident, security agencies have ramped up their operations in the area to ensure that no additional sleeper cells are active within this sensitive border region.

As the investigation unfolds, the focus remains on dismantling any remaining networks that could pose a threat to security in Poonch and its surrounding areas.

Source: Original article

Infiltration Attempt Foiled in Gurez Sector; Two Terrorists Eliminated

Security forces successfully thwarted an infiltration attempt in the Gurez sector of Kashmir, resulting in the deaths of two terrorists and the recovery of arms and ammunition.

Srinagar: On Wednesday, security forces foiled a significant infiltration attempt along the Line of Control (LoC) in the Gurez sector of north Kashmir’s Bandipora district. During a brief exchange of fire, two terrorists were eliminated.

Officials reported that troops stationed near the Naushera Nar area of Gurez detected suspicious movement close to the LoC. When challenged, the infiltrators opened fire, prompting a gunfight. A joint operation involving the Indian Army and Jammu & Kashmir Police successfully neutralized the two infiltrators. Arms and ammunition were recovered from the scene, while their identities and affiliations are currently under investigation.

Search operations are ongoing in the dense forested area surrounding the incident to ensure that no additional infiltrators remain in the vicinity. Senior officials from both the Army and Police are closely monitoring the situation.

This incident marks the latest in a series of infiltration attempts that security forces have thwarted in recent weeks. On August 26, another infiltration bid was foiled in the Uri sector of Baramulla district when troops opened fire upon observing suspicious movement along the LoC. Although a massive search operation was launched, no bodies were recovered from that incident.

Earlier, on August 13, a soldier lost his life during an exchange of fire with infiltrators in the Uri sector. The operation lasted several hours in the forward areas near the LoC, highlighting the ongoing challenges faced by security forces in the region.

These recent infiltration attempts are perceived as part of intensified efforts by militant groups to breach the border into Kashmir before the onset of winter, when traditional infiltration routes are likely to be obstructed by heavy snowfall.

In response, security forces remain on high alert across the LoC, actively working to prevent any cross-border infiltration attempts.

Source: Original article

Suspect Arrested in Awantipora with Pistol and Ammunition

Security forces apprehended a suspect with a pistol and ammunition in Awantipora, South Kashmir, amid ongoing operations to dismantle militant networks in the region.

SRINAGAR: On Wednesday, security forces arrested a suspect in possession of arms and ammunition in the Hari Parigam village of Awantipora, located in South Kashmir.

A senior police officer reported that a joint team comprising the Police, Army, and Central Reserve Police Force (CRPF) established a checkpoint in the area. During routine checks, a man exhibiting suspicious behavior was taken into custody.

A subsequent search yielded a pistol, a magazine, and nine rounds of 9mm ammunition. The individual has been identified as Sakib Reyaz Ganie, the son of Reyaz Ahmad Ganie, and a resident of Chaki-i-Cholan in Shopian.

Sources indicate that Sakib is a prime suspect in a grenade attack on a CRPF camp in Lariyar and has been missing since May 11, 2025. Following his arrest, police have registered a case, and further investigations are ongoing.

In related developments, security forces have intensified their operations across Jammu and Kashmir to disrupt terror networks. The Jammu and Kashmir Police’s State Investigation Agency (SIA) recently apprehended an over-ground worker linked to the banned Hizbul Mujahideen outfit.

Additionally, three over-ground workers were arrested in Handwara along with arms and ammunition. In Tral, two terror associates were detained with explosive materials, hand grenades, and AK-47 rounds.

These incidents underscore the ongoing efforts by security agencies to dismantle militant infrastructure and uphold peace in the region, reflecting a commitment to counter-terrorism initiatives.

Source: Original article

LG Sinha Reviews Flood Response, Urges Swift Rescue and Relief Efforts

Lieutenant Governor Manoj Sinha has directed swift rescue and relief operations in Jammu and Kashmir following severe flooding caused by incessant rains.

SRINAGAR: Lieutenant Governor Manoj Sinha convened a high-level meeting on Wednesday to assess the ongoing rescue and relief efforts in Jammu and Kashmir, prompted by relentless rains and subsequent flash floods.

The meeting brought together key officials from the Union Territory, senior Army commanders, and representatives from various central agencies, including the National Disaster Response Force (NDRF), Central Armed Police Forces (CAPFs), Border Roads Organisation (BRO), National Highways Authority of India (NHAI), and telecom service providers.

During the meeting, Sinha emphasized the urgency of the situation, instructing officials to prioritize the safe evacuation of residents from low-lying and flood-affected areas. He underscored the critical need to restore essential services, including power, healthcare, drinking water, ration supplies, and telecommunications, as quickly as possible.

“Essential services disrupted in flood-hit areas must be restored without delay, and adequate stocks of food, medicines, and other supplies must be ensured in all affected districts,” Sinha stated.

The Lieutenant Governor directed the Power Development Department (PDD) to collaborate closely with NHPC Limited and Power Grid Corporation of India Limited (PGCIL) to expedite the restoration of power infrastructure. He also called on the NHAI to provide full support to the Public Works Department (PWD) in repairing damaged roads and bridges throughout the Union Territory.

In addition, the Additional Chief Secretary for Jal Shakti was tasked with making alternative arrangements for safe drinking water in water-logged and remote areas until regular supply lines can be restored. The Health Department was instructed to prepare hospitals for a potential increase in patients, particularly those suffering from water-borne diseases.

Sinha further announced that non-essential government offices, schools, and colleges would remain closed until further notice. He mandated that all districts maintain 24/7 control rooms to assist individuals and families affected by the floods.

Emergency response teams were also ordered to be pre-positioned in vulnerable areas, ensuring they are equipped for immediate deployment.

<p“No officer or employee will be allowed to leave their station or take leave. The administration must remain on the ground to reach every household in distress,” the Lieutenant Governor directed.

In reviewing the ongoing efforts, Sinha commended the Army, Air Force, NDRF, CAPFs, State Disaster Response Force (SDRF), Police, and District Administrations for their prompt actions in rescuing and relocating individuals to safer locations, which helped minimize casualties.

The high-level meeting included Chief Secretary Atal Dulloo; Lt Gen Pratik Sharma, GOC-in-C Northern Command; NHAI Chairman Santosh Yadav; DGP Nalin Prabhat; Lt Gen Prashant Srivastava, GOC 15 Corps; Shaleen Kabra, ACS Jal Shakti; Dr. Mandeep K. Bhandari, Principal Secretary to the LG; senior Army and CAPF officials; Commissioners of Jammu and Kashmir divisions; and administrative secretaries from all departments.

Sinha assured attendees that he is personally monitoring the situation around the clock and is in close contact with both Union Territory and central agencies to ensure timely responses and relief measures are implemented effectively.

Source: Original article

Fresh Infiltration Attempt Thwarted by Security Forces in Baramulla

Security forces successfully thwarted an infiltration attempt in Baramulla’s Uri sector, resulting in a brief exchange of gunfire and an ongoing search operation in the area.

Srinagar: Security forces have foiled an infiltration attempt along the Line of Control (LoC) in the Torna area of Uri sector, located in Baramulla district of Jammu and Kashmir, officials reported today.

According to sources, troops stationed along the LoC detected suspicious movement near forward posts in the early hours of the morning. When challenged, the individuals attempting to cross the border opened fire, prompting a brief exchange of gunfire.

In the aftermath of the encounter, security forces launched a comprehensive search operation in the dense forest area to locate the infiltrators. As of now, no casualties have been reported from either side.

While the Army and Jammu and Kashmir Police have yet to release an official statement, the operation is ongoing, and further details are anticipated.

This incident is part of a troubling trend, as it marks the latest in a series of infiltration attempts reported along the LoC this month. On August 13, a soldier lost his life during a gunfight with infiltrators in the Uri sector. Earlier in the first week of August, another infiltration attempt was thwarted in the Keran sector, where troops recovered weapons and other military supplies following a brief firefight.

Officials suggest that the recent increase in infiltration attempts indicates heightened activity from across the border, as militant groups are likely trying to push operatives into the Valley before the onset of winter. In response, security forces are maintaining a high level of alert along the LoC, implementing intensified patrols, surveillance, and counter-infiltration measures.

Source: Original article

Old Hand Grenade Found in Garbage Dump in Srinagar’s Safakadal

Police recovered an old hand grenade from a garbage dump in Srinagar’s Safakadal area, prompting a safety response from the Bomb Disposal Squad and an ongoing investigation.

Srinagar: On Monday, police discovered an old, rusted hand grenade in a garbage dump located in Iqbal Colony, within the Safakadal area of Central Kashmir’s Srinagar district.

A senior police officer reported that the grenade was found by local residents who promptly alerted the authorities. “Prima facie, it appears to be an old, rusted grenade. It has been taken into possession for further examination,” the officer stated.

In response to the discovery, the Bomb Disposal Squad was dispatched to the site. The area was temporarily cordoned off to ensure the safety of nearby residents. Fortunately, the grenade was removed without any incidents.

This incident follows a recent event in the Shalteng area of Srinagar, where a suspicious bag containing explosive materials was found near a roadside. In that case, the swift actions of police and bomb disposal teams averted potential danger.

Authorities have acknowledged the Safakadal incident and have initiated an investigation to ascertain the origin and age of the recovered explosive. They are also urging the public to remain vigilant and report any suspicious objects or activities immediately.

Source: Original article

Arms and Ammunition Seized During Operation in Kupwara, North Kashmir

Security forces in Kupwara, North Kashmir, recovered a substantial cache of arms and ammunition during a joint search operation, believed to be linked to cross-border militants.

Srinagar: A joint search operation conducted by security forces resulted in the recovery of a significant cache of arms and ammunition in the Doriban Madhama Awora forest area of Kupwara district on Saturday.

According to police sources, the operation was initiated based on specific intelligence received from UIC 98 Battalion. Personnel from the Central Reserve Police Force (CRPF) 98 Battalion, in collaboration with the Jammu and Kashmir Police from Police Post Awora, launched a cordon and search operation under the jurisdiction of Police Station Trehgam.

During the operation, the following items were recovered:

One hand grenade, ten AK-47 rounds, one telescope, six detonators, and one Pakistan-made backpack.

This recovery adds to an earlier cache seized during operations in the same area, which included two AK-47 rifles, four AK magazines, 120 rounds of ammunition, one pistol with two magazines, five hand grenades, wireless communication devices, and suspected narcotics that have been sent for forensic testing.

Officials believe that these recoveries may be linked to cross-border infiltration or hidden supply drops intended for militant use. “A case has been registered under relevant sections at Police Station Trehgam. Investigations are ongoing to identify the handlers and trace any possible militant links,” the officials stated.

Search operations in the area remain active as authorities continue to monitor the situation closely.

Source: Original article

Massive Search Operation Underway After Drone Sighting Near Jammu Border

Security forces have initiated a large-scale search operation in Jammu’s Gajansoo-Marh area following the sighting of a suspected hostile drone, raising fears of potential weapon or narcotics drops.

Jammu: A significant search operation was launched by security forces in the Gajansoo-Marh region along the Indo-Pakistan International Border after a suspected hostile drone was detected deep within Indian territory on Wednesday evening.

According to officials, the drone’s movement prompted an immediate alert in the border area. The Jammu and Kashmir Police, in collaboration with personnel from the Border Security Force (BSF), quickly cordoned off the fields and surrounding residential neighborhoods to locate the unidentified flying object.

The atmosphere in the area remained tense as search teams meticulously combed through agricultural lands and clusters of villages, driven by concerns over a potential drop of weapons or narcotics. An official confirmed, “Soon after receiving inputs of drone activity, teams of BSF and police rushed to the spot. A large-scale search operation is still underway.”

This incident has reignited worries about increased drone activity across the border. In previous instances, security forces have successfully thwarted multiple attempts to drop contraband in the Jammu sector, recovering consignments that included weapons, explosives, and narcotics believed to have originated from across the border.

In response to this latest incident, officials have stated that security measures have been intensified along the sensitive border region to ensure that any infiltration or smuggling attempts are swiftly neutralized.

Source: Original article

Search Operation Underway in Kathua Following Armed Suspects Sighting

Security forces initiated a search operation in Kathua’s Juthana area following reports of two armed suspects spotted by locals.

KATHUA: A significant search operation was launched late Thursday night in the Juthana area of Rajbagh, Kathua district, after local residents reported sightings of two armed individuals.

According to official sources, the alert was raised around 9:45 p.m. when police received information from a local eyewitness in the Jakhol area. The witness reported seeing two unidentified men dressed in black and carrying weapons in the vicinity around 9:30 p.m. Notably, the suspects were not seen carrying any backpacks.

In response to the report, the Jammu and Kashmir Police, with assistance from security forces, quickly mobilized to the area, initiating a cordon-and-search operation aimed at locating the suspects. The locality was sealed off, and door-to-door searches were conducted to ensure thorough scrutiny of the area.

Officials confirmed that the search efforts continued late into the night, with additional reinforcements deployed to sensitive areas to prevent any potential incidents. This heightened alert comes in light of previous instances of militant movements reported in various parts of the Kathua district.

Further details regarding the operation and the suspects remain pending as authorities continue their investigation.

Source: Original article

Two Associates of LeT Arrested with Weapons in Bandipora

Security forces in North Kashmir apprehended two associates of the terrorist group Lashkar-e-Taiba, seizing arms and ammunition during a search operation in Sumbal.

Srinagar, August 17: On Sunday, security forces apprehended two individuals linked to the proscribed terrorist organization Lashkar-e-Taiba (LeT) in the Malpora Nowgam area of Sumbal, located in North Kashmir’s Bandipora district.

According to officials, a joint checkpoint was established by the Jammu and Kashmir Police and the Army. During the search operation, two suspects were intercepted and found in possession of arms and ammunition.

The recovered items included two Chinese grenades, two Under Barrel Grenade Launcher (UBGL) grenades, and ten AK-47 rounds.

The arrested individuals have been identified as Abdul Majid Gojri from SK Bala and Abdul Hamid Dar from Vijpara.

A case has been registered against them under the Unlawful Activities (Prevention) Act (UAPA), and an investigation is currently underway to determine their connections to active terrorists and any involvement in previous attacks.

This incident is part of a broader pattern of recent arrests of Over Ground Workers (OGWs) in Kashmir. On August 15, one terrorist associate was apprehended in Pulwama with incriminating materials during a joint operation in the Rajpora area. Earlier, on August 10, three OGWs affiliated with LeT were arrested in Kreeri while allegedly planning attacks on security forces.

Additionally, on August 2, security forces dismantled a narco-terror module in Kupwara, arresting two LeT associates who were found with drugs and arms smuggled from Pakistan. On July 28, two OGWs were caught in Shopian while providing shelter and support to foreign militants hiding in the region. Furthermore, on July 22, an OGW operating a Telegram channel for recruiting youth into terrorist ranks was arrested by the cyber cell and police in Srinagar.

These arrests highlight the intensified efforts by security forces to crack down on terror support networks in the Valley. OGWs play a crucial role in militant logistics, and authorities are committed to swiftly disrupting these channels to enhance security in the region.

Source: Original article

Three Arrested in Handwara for Terrorism-Related Activities

Three terror associates were arrested in Handwara, North Kashmir, during a joint operation by security forces, resulting in the seizure of arms and anti-national materials.

Srinagar: In a significant development, security forces in North Kashmir’s Handwara have apprehended three individuals suspected of being terror associates. This operation was carried out collaboratively by the Jammu and Kashmir Police, the Army, and the Central Reserve Police Force (CRPF).

The arrests took place in the Wajihama area of Qalamabad, following specific intelligence inputs that indicated potential terrorist activities. The operation led to the capture of three individuals believed to have connections with terrorist handlers operating from Pakistan.

The arrested individuals have been identified as Mohd Iqbal Pandith, aged 23, son of Shareef Din Pandith and a resident of Bunpora, Langate; Sajad Ahmad Shah, aged 26, son of Bashir Ahmad Shah and a resident of Check-Puran, Langate; and Ishfaq Ahmad Malik, aged 22, son of Shabir Ahmad Malik and a resident of Hajin, Kralgund.

During the operation, security forces recovered a cache of arms and ammunition, along with incriminating materials. The items seized included one pistol with a magazine, two rounds of pistol ammunition, twenty rounds of 7.62 mm ammunition, and eleven anti-national posters.

In response to these developments, police have registered a First Information Report (FIR No. 30/2025) under relevant sections of the Indian Arms Act and the Unlawful Activities Prevention Act (UAPA) at the Police Station in Qalamabad.

Investigations are currently underway to uncover the broader network associated with these arrests and to trace any additional associates involved in the terror module.

Source: Original article

Kishtwar Police Activate Control Rooms Amid Cloudburst and Flood Threat

Kishtwar Police have issued a disaster advisory and activated control rooms amid heavy rains and the threat of flash floods and landslides in the region.

KISHTWAR: In response to severe weather conditions and recent cloudbursts that have triggered flash floods in parts of Kishtwar district, particularly in the severely affected Chosoti village in Paddar, the District Police Kishtwar, in collaboration with district authorities, has issued a weather and disaster advisory aimed at ensuring public safety.

Control rooms and help desks have been established throughout the district to assist residents, pilgrims, and travelers, especially those in vulnerable and remote areas. All sub-divisions have been placed on high alert, with dedicated police teams ready to respond swiftly to emergencies arising from heavy rainfall, landslides, flash floods, or road blockages.

The District Police Kishtwar has urged residents and pilgrims to remain vigilant, avoid unnecessary travel to high-risk zones, and maintain constant communication with the nearest police station in case of emergencies. The advisory includes several helpline numbers for immediate assistance, which are as follows:

District Control Room: 01995-259555, 9484217492

PCR Kishtwar: 9906154100, 9103454100, 01995-259193, 100

Sub-Divisional & Police Station Helplines:

SSP Kishtwar: 9419134002

Addl. SP Kishtwar: 9419158700

Dy.SP Hqrs Kishtwar: 9796455564

SDPO Atholi (Paddar & adjoining): 9419181083

SDPO Marwah (Marwah/Wadwan): 9858299319

SHO Kishtwar: 9906207082

SHO Dachhan: 7006236621

SHO Chatroo: 7006648892

SHO PS Atholi: 9906076000

Area-Specific Control Rooms:

Paddar Control Room: 9858223125, 6006701934, 9797504078, 8492886895, 8493801381, 7006463710

The police have assured that additional contact points for other flood and landslide-prone areas will be provided by local police stations as needed.

Authorities encourage the public to stay informed through the official social media channels, including Facebook: Kishtwar Police and Twitter: SSP Kishtwar, for real-time alerts and advisories.

Safety remains the top priority as security forces, police, and disaster response teams continue to monitor the evolving weather situation and provide assistance to affected areas, according to The Sunday Guardian.

Source: Original article

Army Thwarts Infiltration Attempt at LoC in Uri; One Soldier Killed

Indian Army successfully thwarted an infiltration attempt along the Line of Control in Uri, North Kashmir, resulting in the death of one soldier during the ensuing gunfight.

In a significant security incident, the Indian Army has successfully foiled an infiltration attempt along the Line of Control (LoC) in the Uri sector of North Kashmir. This operation unfolded under the cover of darkness when a group of terrorists attempted to breach the border.

According to defence sources, the infiltration led to a fierce gunfight between the infiltrators and Indian troops. Tragically, during the exchange of fire, one Indian Army soldier was killed in action. His exceptional bravery was instrumental in preventing the infiltration attempt from succeeding.

In response to the incident, the Army has initiated a comprehensive counter-infiltration operation. This operation includes extensive combing of the area to locate any remaining infiltrators and to assess the potential involvement of Border Action Teams (BAT) from across the border.

Exclusive visuals from the scene depict heightened activity in the forward areas, with additional reinforcements being deployed to the LoC. Search operations are currently underway to ensure the area is secure.

Officials have indicated that this infiltration bid is part of a broader trend of increased attempts from across the LoC, aimed at disturbing peace in the region, particularly in the lead-up to Independence Day.

Further details regarding the situation are awaited as the Army continues its operations in the area.

Source: Original article

Kishtwar Encounter: Two Hizbul Militants, Including Commander, Trapped in Forest

An intense gunfight in Kishtwar, Jammu and Kashmir, has led to the entrapment of two Hizbul Mujahideen militants, including a top commander, in a forest cave.

JAMMU: A fierce gunfight erupted in Kishtwar district of Jammu and Kashmir on Sunday as security forces initiated a search operation in the hilly Dool area, following specific intelligence reports regarding the presence of militants.

As the search parties advanced, the militants, believed to be two in number, opened fire, prompting an immediate exchange of gunfire. Sources indicate that the militants are Riyaz and Mudasir, members of the banned Hizbul Mujahideen outfit. They are reportedly holed up in a cave deep within the forest, which has been fortified and strategically positioned to evade aerial detection.

The local police have announced a reward of ₹30 lakh for information leading to the capture or elimination of Riyaz, Mudasir, and Jahangir Saroori, who is noted as the longest-surviving terrorist associated with Hizbul Mujahideen and a key figure in sustaining militancy in the Chenab Valley.

The Army’s White Knight Corps confirmed the encounter via a post on X, stating that alert troops conducting an intelligence-based operation established contact with the terrorists in the early hours, leading to the ongoing exchange of fire.

Kishtwar has been a hotspot for militancy for several years, serving as a strategic transit and hideout area for terrorists operating between the Kashmir Valley, Doda, and parts of Jammu. The region’s dense forests, rugged terrain, and remote villages have allowed small groups of militants to evade capture and continue their operations despite numerous counter-insurgency efforts.

Security officials assert that neutralizing the Hizbul module based in Kishtwar would deliver a significant blow to the militant networks in the Chenab Valley, which have relied on this area for recruitment, logistics, and shelter.

As of the latest reports, the operation is still ongoing, with additional forces deployed to prevent any escape from the cordoned-off zone.

Source: Original article

Security Forces Conduct Major Anti-Terror Operation in Reasi Village

Security forces have initiated a significant anti-terror operation in Godhar Khalsa village, Reasi district, following a shopkeeper’s report of suspicious individuals in the area.

Jammu – Security forces have launched a comprehensive anti-terror operation in Godhar Khalsa village, located in Reasi district, after a local shopkeeper reported a late-night encounter with suspected individuals in a nearby forest.

The incident occurred around 1:55 a.m. when the shopkeeper was returning home after closing his store. He recounted that the suspects approached him, took some pears he was carrying, and instructed him to leave without causing him any harm. “Their presence was suspicious, and I immediately informed the police,” he stated.

In response to the shopkeeper’s report, the Jammu and Kashmir Police, in collaboration with other security agencies, cordoned off the village at first light. They launched an intensive search operation aimed at identifying and neutralizing any potential terrorist presence in the area.

Godhar Khalsa is situated along the Jammu–Poonch Highway and is not far from the Line of Control (LoC)-facing Sunderbani sector, a route historically used for infiltration.

Following the recent Operation Sindoor, which targeted multiple terrorist launch pads and airbases in Pakistan, security forces have increased surveillance across Jammu and Kashmir. They are conducting aggressive search-and-destroy missions in suspected militant hideouts in Rajouri, Poonch, Reasi, and other vulnerable areas.

A senior police officer emphasized the clarity of their mission: “No movement corridor will be left unchecked. If terrorists are in the area, they will be traced and neutralized.”

The operation in Godhar Khalsa is ongoing, with additional reinforcements deployed and all exit routes sealed to prevent any potential escape of suspects.

Source: Original article

US Airport Security: Potential Increase in Liquid Allowances

Travelers may soon carry more liquid in their carry-on luggage, as Homeland Security Secretary Kristi Noem considers revising the current TSA guidelines.

Homeland Security Secretary Kristi Noem announced potential changes to airport security procedures, particularly concerning the current restrictions on liquid amounts travelers can bring in their carry-on luggage.

Speaking at a conference hosted by “The Hill” on Wednesday, Noem expressed her willingness to review current Transportation Security Administration (TSA) practices. She mentioned the possibility of altering the size restrictions for liquids in carry-on bags, although no specific details or timelines were provided.

Present TSA regulations allow travelers to carry liquids in travel-sized containers, each no larger than 3.4 ounces (100 milliliters). These containers must fit into a one-quart, resealable plastic bag. Larger bottles are only permissible in checked luggage, with exceptions made for medications and baby formula.

The current rules for liquids have been in place since 2006, instated to prevent incidents similar to a thwarted plot in the same year where liquid explosives were almost smuggled onto planes. This guidance has led to a usual scene at TSA checkpoints where passengers often discard or hastily consume beverages and other liquid items that exceed the size limit.

Noem’s consideration for changes comes shortly after her announcement on July 8 that passengers would no longer be required to remove their shoes during security screenings. This aspect of the security process was revised following a successful pilot program indicating that TSA had the necessary equipment to ensure safety without the need for shoe removal. This policy had been enforced since the 2006 implementation, a response to the “shoe bomber” Richard Reid’s attempt in late 2001 to bring down a flight from Paris to Miami.

In addition to discussing liquid restrictions, Noem shared her broader vision for the future of airport travel, ultimately aiming for a streamlined entry process. “Hopefully, the future of an airport,” she said, “is that you walk in the door with your carry-on suitcase, you walk through a scanner, and go right to your plane. It takes you one minute.”

The TSA currently maintains a comprehensive list on its website detailing what constitutes a liquid. Items such as yogurt, peanut butter, jam, and jelly are all subject to the 3.4-ounce rule. Discussions often arise over these definitions as travelers navigate what they can and cannot bring through security.

These proposed changes reflect ongoing adjustments within Homeland Security to adapt to evolving threats while striving to improve the travel experience, according to The Associated Press.

Source: Original article

India Tests Hypersonic Missile with 1,500 km Range

India has conducted a test of a hypersonic missile capable of reaching eight times the speed of sound and targeting areas as far as 1,500 kilometers, marking a significant advancement in its defense technology.

India has reportedly tested the Extended Trajectory Long Duration Hypersonic Cruise Missile (ET-LDHCM), designed under the Defence Research and Development Organisation’s (DRDO) Project Vishnu. This new missile can travel at Mach 8, approximately 11,000 km/h, and can strike targets as far as 1,500 kilometers away, significantly surpassing the capabilities of the existing BrahMos cruise missile. The BrahMos, by contrast, reaches speeds of Mach 3, or about 3,675 km/h, and a maximum range of around 450 kilometers from its initial 290 kilometers.

The development of the ET-LDHCM underscores India’s ongoing efforts to modernize its defense systems amid escalating global tensions. The geopolitical landscape is fraught with conflict, including issues between Israel and Iran and deteriorating relations between India and Pakistan. India is further prompted to enhance its missile systems, such as the BrahMos, Agni-5, and Akash, due to growing alliances like that between Turkey and Pakistan.

Powered by a scramjet engine utilizing air-breathing propulsion, the ET-LDHCM gains speed from atmospheric oxygen instead of a traditional rotating compressor. This technological leap allows it to perform long-range, high-speed operations with extraordinary precision and stealth. Its low-altitude flight capability helps to evade radar detection, enhancing its strategic efficiency.

This hypersonic missile, capable of carrying a payload between 1,000 to 2,000 kilograms, is engineered to deliver both conventional and nuclear warheads. It can be launched from land, sea, or air platforms, offering flexibility in deployment. Additionally, the missile’s capability to alter its trajectory mid-flight allows for adaptability in dynamic battlefield conditions.

The ET-LDHCM is designed to withstand extreme thermal stress, maintaining stability at temperatures up to 2,000°C during hypersonic travel. This resilience is essential for achieving sustained speed and targeting accuracy.

Currently, only Russia, the United States, and China possess operational hypersonic cruise missile technology. With the successful test of the ET-LDHCM, India positions itself among an elite group of nations with indigenous hypersonic capabilities. The deployment of such advanced technology aims to bolster India’s deterrence strategy, particularly against Pakistan, while serving as a counterbalance to China’s expanding influence in the Indo-Pacific region.

The strategic advancements achieved through the development of the ET-LDHCM exemplify India’s commitment to strengthening its national security infrastructure, thereby ensuring preparedness in the face of potential regional threats, according to Economic Times.

Source: Original article

US Airports End Shoe Removal Rule at Security Screenings

U.S. airports will no longer require passengers to remove their shoes during security screenings, ending a long-standing requirement implemented by the Transportation Security Administration (TSA).

The U.S. Department of Homeland Security has announced that the policy requiring passengers to remove their shoes during airport security screenings has been discontinued, effective immediately. This decision marks the end of a measure that has been in place across the nation since 2006.

Homeland Security Secretary Kristi Noem stated that although passengers can keep their shoes on, the TSA will maintain a “multi-layered” security screening process. Passengers are still required to remove belts and coats and to separate laptops and liquids from their carry-on bags, although these rules are currently under review.

The shoe removal policy was initially enacted in response to an attempted bombing by British national Richard Reid, who attempted to detonate explosives hidden in his shoes on a flight from Paris to Miami in December 2001. Reid was subdued by fellow passengers, allowing the flight to land safely in Boston.

“Our security technology has changed dramatically. It’s evolved. TSA has changed,” Secretary Noem remarked at a news conference. “We have a multi-layered, whole-of-government approach now to security and to the environment that people anticipate and experience when they come into an airport that has been honed and it’s been hardened.”

The adjustment aligns with the intent to enhance the travel experience while maintaining the level of security that travelers expect. “It’s important we find ways to keep people safe, but also streamline and make the process much more enjoyable for every single person,” Noem added.

Some airports, including Cincinnati/Northern Kentucky International Airport, Philadelphia International Airport, and Piedmont Triad International Airport in North Carolina, had already implemented the new shoe policy before the formal announcement.

Previously, those qualified for the TSA PreCheck program, such as children and other approved travelers, were exempt from removing footwear during security checks. The PreCheck program offers a fast-track screening process for approved travelers, which involves an application process and fingerprinting.

Airlines for America, a trade organization representing major U.S. airlines, expressed support for the new changes. “This policy change will go a long way in facilitating smooth, seamless and secure travel for passengers and is welcome news to the millions of people who fly every day,” said Nicholas E. Calio, president and CEO of Airlines for America, in a statement.

The removal of shoes was one of several security measures introduced following the September 11, 2001, terrorist attacks, along with other precautions aimed at preventing similarly dangerous items from being brought aboard aircraft.

While the policy change affects the shoe removal requirement, it is part of a broader initiative to optimize the airport security experience without compromising safety measures in place since the early 2000s.

Senate Approves Trump Agenda Bill After Extended Voting Session

The Senate has narrowly passed President Donald Trump’s domestic agenda bill, which now moves to the House of Representatives for further approval.

The Senate passed President Donald Trump’s ambitious legislative package on a knife-edge vote of 50-50, with Vice President JD Vance casting the decisive vote. This megabill represents a core component of Trump’s domestic agenda and has set the stage for a significant legislative battle as it heads to the House of Representatives.

Republican leaders in the Senate managed to secure enough votes after intense negotiations with key holdouts in their ranks. However, the next hurdle appears imminent, with GOP leaders in the House now facing a high-stakes effort to ensure the bill reaches the president’s desk by July 4.

While visiting a makeshift detention facility called “Alligator Alcatraz” in Florida, President Trump confidently predicted the bill’s successful passage in the House. He also downplayed concerns related to potential impacts on American health care coverage, which have been a point of contention among critics of the bill.

This extensive bill outlines significant tax reductions and boosts in funding for national security, all of which will be offset by the most considerable cuts to the federal safety net seen in decades. As Washington gears up for another legislative showdown, the focus now turns to the House as lawmakers evaluate the sweeping changes proposed within this multi-trillion-dollar plan.

According to CNN, the bill’s advancement symbolizes a pivotal moment in Trump’s tenure, potentially reshaping the nation’s fiscal landscape if fully enacted.

Source: Original article

US Issues Terror Alert Amid Rising Tensions Over Israel-Iran Conflict

Secretary of Homeland Security Kristi Noem has released a National Terrorism Advisory System (NTAS) Bulletin warning of an elevated threat environment throughout the United States due to the nation’s direct involvement in the escalating conflict between Israel and Iran. While there are currently no verified, specific, or credible threats aimed at the US homeland, officials are urging vigilance as tensions continue to rise in the Middle East.

Secretary Noem emphasized the government’s responsibility to ensure public safety during these volatile times. “It is our duty to keep the nation safe and informed, especially during times of conflict,” she stated. Highlighting the dangers associated with the unfolding Israel-Iran confrontation, she added, “The ongoing Israel-Iran conflict brings the possibility of increased threat to the homeland in the form of possible cyberattacks, acts of violence, and antisemitic hate crimes.”

The advisory went into effect on June 22, 2025, and is set to expire on September 22, 2025, at 11:59 PM ET. Authorities are encouraging citizens to promptly report any suspicious activities or potential threats to local police, FBI Field Offices, or the nearest Fusion Center. In emergencies, individuals should contact 911.

The Department of Homeland Security’s bulletin highlights several key concerns contributing to the elevated risk. One of the primary dangers involves the likelihood of cyber intrusions targeting American infrastructure. These attacks may come from pro-Iranian hacktivists or individuals and groups with direct affiliations to the Iranian government. Their typical targets are unsecured American networks and internet-connected devices.

The Department also raised concerns about Iran’s historical commitment to retaliate against American officials deemed responsible for the death of Qassem Soleimani, the high-ranking Iranian military commander killed in a US airstrike in January 2020. This long-standing objective has remained an active element of Iranian foreign policy and intelligence operations, suggesting potential threats to US leadership or government infrastructure.

In addition to cyber threats, there is a growing fear of physical acts of violence within the United States. The bulletin mentions that if Iran’s leaders issue a religious decree urging retaliation against US targets, it could significantly increase the probability that individuals loyal to the Iranian regime might resort to violence on American soil. Such a ruling might inspire lone actors to conduct attacks, even without direct orders or links to foreign terrorist organizations.

Past incidents also play a role in shaping this alert. The bulletin recalls that since 2020, US law enforcement has managed to prevent several potentially deadly plots backed by Iran. Additionally, attempts by the Iranian regime to eliminate critics of the government residing within the United States have been thwarted. These failed operations underscore the ongoing intent and capability of Iran to pursue its enemies, even within foreign borders.

Another concerning element cited in the bulletin is the pattern of anti-Semitic and anti-Israel sentiment motivating previous terrorist attacks within the United States. The ongoing strife between Israel and Iran could further inflame such hostility, potentially triggering more attacks carried out by individuals influenced by extremist ideologies. The Department warns that the current environment could serve as a catalyst for those looking to act on their hatred against the Jewish community, pro-Israel supporters, or American governmental and military symbols.

Foreign terrorist organizations have also responded vocally to the Israel-Iran conflict. Groups such as HAMAS, Lebanese Hizballah, the Houthis, and the Popular Front for the Liberation of Palestine have issued media statements since the beginning of the confrontation. Some of these statements have explicitly called for violence against US personnel and facilities located in the Middle East, presenting yet another layer of threat to American interests abroad.

Domestically, there is concern that such international calls for action could inspire violent extremists and hate crime offenders to target Jewish institutions, synagogues, community centers, pro-Israel events, or even federal buildings and personnel. The Department emphasized that any individual or group associated, or even perceived to be associated, with these entities might be at risk of becoming a target.

In addition to issuing warnings, the Department of Homeland Security has provided resources and guidance to help the public stay safe. Authorities encourage the public to remain attentive to instructions and updates from local officials and emergency personnel.

On the cybersecurity front, the Department’s Cybersecurity and Infrastructure Security Agency (CISA) continues to offer guidance and tools for bolstering the defenses of US digital infrastructure. This includes practical steps for securing networks, identifying vulnerabilities, and preparing organizations for possible cyberattacks.

For those who witness any suspicious behavior or encounter potential threats—whether physical or digital—the DHS encourages reporting through the Nationwide Suspicious Activity Reporting (SAR) Initiative. This collaboration between DHS, the FBI, and local law enforcement aims to detect and prevent terrorism and other criminal activity before it escalates. The campaign reiterates its familiar slogan: “If You See Something, Say Something®.” Authorities urge the public to promptly report suspicious activity or threats of violence—including those made online—directly to local law enforcement, the FBI, or a Fusion Center.

As tensions in the Middle East continue to escalate, US officials remain alert to the possibility that these international hostilities could spill over into the homeland in the form of cyber disruptions, ideological violence, or targeted hate crimes. Although there are no immediate threats at this time, the government stresses the importance of public awareness and cooperation.

The current NTAS Bulletin is part of the Department’s broader efforts to prepare Americans for emerging threats while reassuring them that law enforcement and national security agencies are actively monitoring the situation. By staying informed and vigilant, officials hope to reduce the chances of any planned attacks succeeding.

The alert concludes by reminding citizens that while the threat level has risen due to international conflict, prompt action, public cooperation, and intelligence sharing can help prevent incidents and maintain safety across the country. The government is urging all individuals and communities to take part in safeguarding the homeland by remaining observant, proactive, and informed.

The NTAS Bulletin will remain in effect until September 22, 2025. Until then, local, state, and federal agencies will continue to evaluate and respond to developments both at home and abroad to ensure the continued safety of the American people.

Long Island Ramps Up Security for India-Pakistan Cricket World Cup Match Following ISIS Threat

**Police Heighten Security for Cricket World Cup Match on Long Island Following ISIS Threat**

Authorities are significantly increasing security measures on Long Island in response to a threat from ISIS targeting the upcoming cricket World Cup match between India and Pakistan at East Meadow’s Eisenhower Stadium. This decision was announced on Wednesday by local officials, who emphasized that while there is no “specific threat” of an attack during the June 9 match, they are not willing to take any risks with the international event approaching.

Nassau Police Commissioner Patrick Ryder assured the public, “This will be the tightest security that Nassau County has ever seen. Every single asset in the police department is involved, including our intelligence.” The police force has coordinated with several agencies to ensure comprehensive security coverage. “We have partnered with the NYPD, the MTA, the New York State Police, Suffolk County, FBI, and DHS. Customs have all provided briefings,” Ryder added, affirming that all intelligence reports are credible.

The decision to bolster security follows a menacing online post by the Islamic State on matrix.com. The post, dated May 28, featured a hooded individual with a rifle, accompanied by the message, “You wait for the matches… and we wait for you,” with “Nassau Stadium” and the date June 9 prominently displayed at the top.

To enhance safety, county officials have announced several measures. A contingent of 100 police officers will be assigned to patrol neighboring areas, and the stadium will have metal detectors at every entrance. Additionally, a no-fly zone will be enforced overhead, and there will be strict regulations on items spectators can bring into the venue. Ryder emphasized that lingering outside the stadium will be prohibited, and drones are strictly banned.

“This is like the Super Bowl on steroids,” Nassau County Executive Bruce Blakeman declared during Wednesday’s press conference. He expressed full confidence in the safety measures, stating, “If I wasn’t confident that we were safe, secure, and that our healthcare measures were not in place, I would not do this.”

Governor Kathy Hochul also commented on the preparations, noting that officials in Albany have been coordinating with federal agencies for months to ensure the cricket matches are well-protected against potential terrorist activities. “While there is no credible public safety threat at this time, we continue to monitor the situation closely,” she said. “I have also directed the New York State Police to engage in elevated security measures, including an increased law enforcement presence, advance surveillance, and thorough screening processes.”

The International Cricket Council has announced that the 11-week World Cup competition will be hosted at various international venues, including eight matches scheduled to take place at the 34,000-seat Long Island stadium.

Alleged Indian Intelligence Operations Abroad Stir Tensions with Western Allies

US and Australian media reports on alleged overseas operations by Indian “intelligence officials” have caught New Delhi off-guard, stirring disquiet within the establishment. Sources suggest a perceived “concerted pushback” from key Western strategic allies. According to the Australian Broadcasting Corporation (ABC), Indian operatives were expelled from Australia for attempting to pilfer sensitive defense and airport security information, along with classified data on trade relationships. The Australian and the Sydney Morning Herald confirmed the expulsion of two Indian “spies.”

The ABC highlighted a foreign “nest of spies” dismantled by the Australian Security Intelligence Organisation (ASIO) in 2020, alleging surveillance on Indian expatriates and forging close ties with current and former politicians. The Washington Post, a day prior, identified an Indian intelligence official implicated in a plot to assassinate pro-Khalistan Sikh separatist Gurpatwant Singh Pannun, seeking connections with senior Indian intelligence and security figures.

Randhir Jaiswal, spokesperson for the Ministry of External Affairs, denounced The Washington Post’s report, labeling it as containing “unwarranted and unsubstantiated imputations” on a serious matter. He referenced an ongoing high-level investigation addressing security concerns shared by the US government regarding organized crime and terrorism networks.

ABC disclosed that ASIO Director-General Mike Burgess had hinted at the spy network during his 2021 annual threat assessment, without divulging the country involved. Burgess reportedly detailed how the spies recruited an Australian government security clearance holder with access to sensitive defense technology information. The Indian government has yet to respond to ABC’s revelations, given the lack of official endorsement from the Australian government.

When questioned about allegations linking the Indian government to the “nest of spies,” Australian Foreign Minister Penny Wong refrained from commenting on intelligence matters but emphasized democratic principles and the resilience of Australian democracy against foreign interference. Sources indicate a shared sentiment in South Block and North Block, housing the Ministries of External and Home Affairs, that Western agencies aim to establish boundaries with India, a key Quad grouping partner.

The timing, amidst a heated election season in India, bolsters New Delhi’s belief that Western partners prefer a more “sensitive” approach from the next government regarding overseas operations, particularly in certain countries.

-+=