Headlines
To make it easier for victims and complainants to file online complaints about cybercrime, the Indian government launched the National Cyber Crime Reporting Portal.
The objective of the Blue Locker ransomware is to encrypt all stored data in order to prevent access to them.Every affected file is given the.blue extension; files with this extension cannot be opened any more and can only be recovered using the decryption key that the thieves have.
A pro-Russian hacker group called NoName057(16) is well-known for its cyberattacks against European, American, and Ukrainian government, media, and private company websites. Considered a free and unstructured pro-Russian activist group, it aims to garner notice in Western nations.
When hackers get access to data and private information, data breaches occur.Insider threats, or those having authorized access to a company’s systems, as well as outside variables like cyber attacks, are the causes of data breaches.
India experienced 21 ransomware attacks in the first half of 2025.The IT, banking, and manufacturing industries in India were among the top three targets for ransomware attacks in the Asia-Pacific region in the first half of 2025.
The risks posed by artificial intelligence (AI)-powered deepfakes, which include synthetic text, audio, and video, are recognized by the Indian government.According to Press Information Bureau, a person’s dignity, reputation, and right to privacy can all be negatively impacted by such content. Concerns around platform responsibility are also brought up.
For scammers, deepfakes are powerful new tools. They make it possible for criminals to successfully pose as other people by altering images, sounds, and even films. All kinds of fraudulent and other illegal acts are made possible by this.
With the advancement of artificial intelligence, sextortion the act of using graphic material to blackmail someone has taken an alarming turn. Fake images that are indistinguishable from reality can now be used to target anyone.
Deepfakes are being used by cybercriminals to get over know-your-customer (KYC) steps, especially on cryptocurrency and banking platforms. Using deepfake technology, cybercriminals are opening new accounts using someone else’s identity and producing videos that appear to be authentic.
Hackers that obtain illegal access to computer networks and systems with malicious intent are known as “black hat” hackers. The objective of black hat hacking is to take advantage of security flaws in business systems or software.