
Family in shock as Malayali couple found dead in Kuwait apartment
KOCHI: The family of Bincy, a 35-year-old nurse from Kerala who was found dead along with her husband Suraj in their apartment in Kuwait, is struggling to come to terms with the tragedy. Her two children and bedridden father are yet to be informed about the deaths.
The couple was found dead on Wednesday night. Preliminary reports suggest that Suraj, 39, killed Bincy before taking his own life. Bincy hailed from the Mannoor ward of Mazhuvanoor panchayat in Ernakulam, while Suraj was a resident of Mangalam, Naduvil in Kannur district. Both were working as nurses in Kuwait. They are survived by their two children—Evelyn, 9, and Edwin, 6.
'We are not aware of any issues in their married life. They seemed happy and were looking forward to migrating to Australia. All paperwork for the move was completed,' said Basil, Bincy's brother.
According to Basil, Bincy had returned to Kuwait two weeks ago, during Easter week, while Suraj followed last Friday. 'The children are staying with us. We haven't yet told them or our father who is bedridden, about the incident,' he added.
The family was informed about the deaths on Thursday. Post-mortem procedures have been completed, and the bodies are expected to be flown to Kannur on Monday. The local community is reeling from the loss of the couple, who were regular visitors to the area during their annual vacations.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Time of India
5 days ago
- Time of India
Sweden probes massive sabotage after 30 telecom masts attacked in what officials call a coordinated strike
A wave of sabotage has struck Sweden 's telecom infrastructure, leaving investigators scrambling for answers. Multiple telecom masts were targeted along a major highway in what officials describe as a coordinated strike. Though services are largely unaffected, the scale and precision have sparked concerns. What exactly happened along Sweden's E22 highway? According to Swedish authorities , there were about 30 sabotage attacks on telecommunications infrastructure that are still unaccounted for, most of which occurred along the along the E22 route. by Taboola by Taboola Sponsored Links Sponsored Links Promoted Links Promoted Links You May Like Play this game for 1 minute and see why everyone is crazy about it Undo According to investigators cited by Sweden's national public broadcaster SVT Nyheter, cables were severed and fuses and other technical equipment were destroyed during the attacks on masts, but nothing was taken, as per a report by Newsweek. The attacks, which primarily targeted Swedish infrastructure along the E22, are suspected of being carried out by a single actor. Over 3,300 miles separate Russia in the east and the United Kingdom in the west via the European Road (E22). Live Events ALSO READ: Trump's Attorney General Pam Bondi now in the line of fire - here's what happened and why it matters No significant disruptions were caused by the attacks, which started over Easter weekend. But it "stands out and is more than usual," Roger Gustafsson, the head of PTS security, told SVT. In Europe, anti-5G activists have also targeted telecom masts for destruction because they think they are bad for people's health. The head of serious crime in Kalmar, Sweden, Detective Superintendent Håkan Wessung told SVT that his security services are keeping an eye on the investigation and "we don't rule anything out." Has anything like this happened in Sweden before? Critical national infrastructure is at risk, as demonstrated by previous sabotage in Sweden. In 2016, police in southwestern Sweden discovered that a 300-meter (almost 1,000-foot) telecommunications mast had been purposefully taken down, preventing 85,000 households from receiving emergency alerts or TV broadcasts, as per a report. Could foreign actors or extremists be involved? Although Swedish investigators have not yet publicly named a suspect, the attacks are a part of a larger pattern of sabotage against Swedish telecom infrastructure, and NATO allies have reported a sharp rise in Russian espionage in connection with the conflict in Ukraine. According to Reuters, the public was worried about Russian involvement, and police suspected international saboteurs and pranksters. Cyberattacks on defence companies, arson attacks on German logistics facilities, and the cutting of Baltic underwater communications cables are examples of sabotage attacks against NATO members, including Sweden. What are the Swedish authorities up to? Authorities in Sweden are still looking into the spate of sabotage incidents, working with NATO allies to track down potential threats and apprehend those responsible. The goal of ongoing international operations is to improve security and surveillance for the region's vital undersea and telecommunications infrastructure. FAQs Who is behind the sabotage in Sweden? Investigators have not identified a suspect, but believe it could be the work of a single organized actor. Did the attacks cause any major disruptions? Not yet, but officials say the pattern and scale are unusual and cause concern.


Time of India
01-06-2025
- Time of India
Cong will defend Christians against attacks: Satheesan
Kochi: Christian priests in Odisha were attacked by the same people who visit homes in Kerala with cakes during Christmas and Easter. The Congress will put up a defence in places where Christians are being attacked on a regular basis, opposition leader V D Satheesan told reporters in Kochi on Sunday after visiting the priests who were attacked in Odisha. He said shocking details about the attack in Odisha were revealed by the Catholic priests from Kerala. A large group broke open doors, brutally assaulted the priest, looted belongings, and even viciously attacked a 90-year-old priest, Satheesan said. "Fr Leenus was tied up and beaten before being locked in a room. Fr Silvi was also beaten after being tied up. After an hour and a half, the priests tried to untie themselves and open the door but in vain. It was a nearby temple priest who heard the noise and rescued them," Satheesan said. This is not an isolated incident. Widespread attacks are occurring in Madhya Pradesh, Odisha, Ahmedabad, and Chhattisgarh, he added. The govt has reportedly instructed looters to target all Christian institutions within two months, Satheesan said. Police have taken a stance that nothing can be done even if complaints are filed. "Priests are being attacked by Bajrang Dal activists and organizations connected to Sangh Parivar. Nationwide attacks against Christians are increasing. The bishop of Jabalpur stated that attacks are happening every day. Even nuns on tourist visits are being attacked under the pretext of religious conversion," Satheesan said. Ernakulam MP Hibi Eden, Ernakulam MLA T J Vinod and DCC president Muhammed Shiyas accompanied Satheesan while visiting the priests at a private hospital in Kochi.


Mint
28-05-2025
- Mint
Siddharth Pai: Arm employees against sophisticated cyberattacks
The internet can be more dangerous than even the roughest part of a big city. Consider this: Over the Easter weekend, British retailer Marks & Spencer (M&S) fell victim to a cyberattack that proved not only costly in financial but also reputational terms. It stemmed not from a failure of firewalls or malware detection tools, but AI-enabled social engineering. A hacker group known as Scattered Spider is being probed for breaching M&S's systems through a third-party IT services contractor. The attackers may have used impersonation techniques to gain unauthorized access to internal systems, resulting in leaked customer data, operational disruptions and an estimated financial hit of over £400 million. Also Read: Rahul Matthan: Brace for a wave of AI-enabled criminal enterprise It underscores an increasingly common theme in today's cybersecurity breaches: the exploiting of humans, rather than hardware or software. Cyber-safety is no longer just a technical issue to be left to the IT department; it's a human issue, deeply embedded in behaviour, awareness and preparedness. Human resource training is a pressing challenge in today's context. Organizations are facing an onslaught of evolving cyber threats—ransomware attacks, phishing scams, deepfake impersonations, credential stuffing and more. These don't merely target infrastructure, but also people. Employees get emails from attackers posing as executives, vendors or even co-workers. They're tricked into clicking malicious links, giving away login credentials or transferring money to fake accounts. So the front-line isn't the server room, but everyone's inbox. M&S wasn't alone. Around the same time, Peter Green Chilled, a logistics supplier for major supermarkets, was hit by a ransomware demand that disrupted its ability to deliver fresh goods—a classic example of how lapses can ripple across supply chains. In each case, the technical sophistication of the attack was significant, but what often allowed entry was an older vulnerability: human error, complacency or ignorance. That's where training comes in. However, unlike other workplace modules like those for code compliance or harassment awareness, cybersecurity training poses unique challenges. For one, the threat landscape evolves constantly. Techniques that were cutting-edge six months ago may be obsolete now. Social engineering tactics are increasing as attackers study employee behaviour to refine their methods even as training modules struggle to keep pace. Also Read: Dodgy aides: What can we do about AI models that defy humans? Then there's an engagement problem. Most employees don't exactly look forward to such training. The mere mention conjures images of outdated videos, multiple-choice quizzes and unrelatable jargon. For behaviour change, the content must be engaging, memorable and relevant to people's day-to-day roles. Trained users are 30% less likely to fall for phishing attempts ( Gamification may work. If employees are challenged to identify phishing emails in a simulated inbox, or compete in cybersecurity 'escape rooms' that require them to solve puzzles based on real threats, they are far likelier to remember the lessons. Interactive storytelling and incentives could work. Case studies, like M&S's, could be used. Another solution is adaptive learning. Tools powered by large language models, such as Gen AI-based systems, can tailor training material to an employee's role, learning pace and previous performance. A marketing executive who frequently handles customer data might need a different module from a warehouse supervisor. Likewise, training systems can use natural language interactions as learning chats. This would not only enhance comprehension but also facilitate continuous reinforcement. However, designing and implementing such training programs isn't solely the responsibility of the IT department. All departments must join hands, with HR embedding cyber awareness into the cultural fabric of the organization and fostering a mindset where everyone makes safety part of their job. When employees understand that a single careless click can cause multimillion-pound damage, as in the case of M&S, they're more likely to internalize the lessons. To sustain cybersecurity training, it should be embedded into everyday workflows. Micro-learning modules, brief but frequent sessions delivered via mobile devices or placed in productivity platforms, can reinforce knowledge incrementally. These modules could be triggered contextually—for example, providing a phishing refresher right after an employee forwards a suspicious email. Over time, such nudge-based training would build everyone's muscle memory, turning caution into instinct. Also Read: Rahul Matthan: Don't let data privacy safeguards work against us The stakes could not be higher. Over 80% of the world's largest organizations report at least one major breach a year. It's not just about firewalls and antivirus software anymore; it's about employees in coffee shops, on personal devices, at home networks and in third-party vendor offices. That reality demands that HR development evolve beyond compliance checklists and become an active, dynamic component of the organization's cybersecurity strategy. Ultimately, the best defence an organization can build is not a piece of software, but a culture—one where every employee acts as a guardian of data and systems. It demands well-designed, engaging and adaptive training efforts that keep pace with the adversaries we face. In the game of cybersecurity, humans aren't just a vulnerability—they're also the solution. The author is co-founder of Siana Capital, a venture fund manager.