- This is not a hypothetical threat—it’s unfolding in real time. Threat actors are
adapting quickly, and even individuals can become indirect targets through
supply chain or credential leaks. Don’t forward that “leaked PDF,” don’t click
that “border incident footage,” and definitely don’t think you’re too small to be
targeted. - Report suspicious sites to CERT-In: https://www.cert-in.org.in
- Be paranoid. Be proactive. Digital resilience is national resilience.
Best Cybersecurity Practices During Geopolitical Conflicts
0/6
Types of Suspicious Links to Watch For:
0/5
What to Do:
• Hover over any link before clicking; check the domain.
• Avoid .apk, .exe, .zip, .pdf, .mp4 downloads unless verified.
• Report suspicious sites to CERT-In: https://www.cert-in.org.in
0/10
