#FactCheck - Fake Navbharat Times Graphic Falsely Attributes Casteist Remark to Devkinandan Thakur
A news graphic bearing the Navbharat Times logo is being widely circulated on social media. The graphic claims that religious preacher Devkinandan Thakur made an extremely offensive and casteist remark targeting the ‘Shudra’ community. Social media users are sharing the graphic and claiming that the statement was actually made by Devkinandan Thakur. Cyber Peace Foundation’s research and verification found that the claim being shared online is misleading. Our research found that the viral news graphic is completely fake and that Devkinandan Thakur did not make any such casteist statement.
Claim
A viral news graphic claims that Devkinandan Thakur made a derogatory and caste-based statement about Shudras.On 17 January 2026, an Instagram user shared the viral graphic with the caption, “This is probably the formula of Ram Rajya.”The text on the graphic reads: “People of Shudra castes reproduce through sexual intercourse, whereas Brahmins give birth to children after marriage through the power of their mantras, without intercourse.” The graphic also carries Devkinandan Thakur’s photograph and identifies him as a ‘Kathavachak’ (religious storyteller).

Fact Check:
To verify the claim, we first searched for relevant keywords on Google. However, no credible or verified media reports were found supporting the claim. In the next stage of verification, we found a post published by NBT Hindi News (Navbharat Times) on X (formerly Twitter) on 17 January 2026, in which the organisation explicitly debunked the viral graphic. Navbharat Times clarified that the graphic circulating online was fake and also shared the original and authentic post related to the news.

Further research led us to Devkinandan Thakur’s official Facebook account, where he posted a clarification on 17 January 2026. In his post, he stated that anti-social elements are creating fake ‘Sanatani’ profiles and spreading false news, misusing the names of reputed media houses and platforms to mislead and divide people. He described the viral content as part of a deliberate conspiracy and fake agenda aimed at weakening unity. He also warned that AI-generated fake videos and fabricated statements are increasingly being used to create confusion, mistrust and division.
Devkinandan Thakur urged people not to believe or share any post, news or video without verification, and advised checking information through official websites, verified social media accounts or trusted sources.

Conclusion
The viral news graphic attributing a casteist statement to Devkinandan Thakur is completely fake.Devkinandan Thakur did not make the alleged remark, and the graphic circulating with the Navbharat Times logo is fabricated.
Related Blogs

Introduction
India is making strides in developing its own quantum communication capabilities, despite being a latecomer compared to nations like China and the US. In the digital age, quantum communication is gradually becoming one of the most important technologies for national security. It promises to transform secure data exchange across government, financial, and military systems by enabling unhackable communication channels through quantum concepts like entanglement and superposition. Scientists from the Defence Research and Development Organisation (DRDO) and IIT Delhi recently demonstrated quantum communication over a distance of over one kilometre in free space. One significant step at a time, India's quantum roadmap is beginning to take shape thanks to strategic partnerships between top research institutes and defence organisations.
Recent Developments
- In February 2022, by DRDO and IIT Delhi, a 100 km Quantum Key Distribution (QKD) link was established between Prayagraj and Vindhyachal using pre-existing commercial-grade optical fibre, with secure key rates of up to 10 kHz. This proved that using India's current telecom infrastructure to implement quantum-secure communication is feasible.
- Scientists at DRDO finished testing a 6-qubit superconducting quantum processor in August 2024, showing complete system integration by submitting quantum circuits through a cloud interface, running them on quantum hardware, and updating the results.
- A free-space QKD demonstration over over 1 km was conducted in June 2025, with a secure key rate of approximately 240 bits/s and a Quantum Bit Error Rate (QBER) of less than 7%. A crucial step towards satellite-based and defence-grade secure networks, this successful outdoor trial demonstrates that quantum-secure communication is now feasible in actual atmospheric conditions.
- India is looking to space as well. Since 2017, the Raman Research Institute (RRI) and ISRO have been collaborating on satellite-based QKD, with funding totalling more than ₹15 crore. In 2025, a specialised QKD-enabled satellite called SAQTI (Secured Applications using Quantum and optical Technologies by ISRO) is anticipated to go into orbit. The initiative's foundation has already been established by ground-based quantum encryption trials up to 300 meters.
- In India, private companies such as QNu Labs are assisting in the commercialisation of quantum communication. QNu, which was founded at IIT Madras, has created the plug-and-play QKD module Armos, the quantum random number generator (QRNG)Tropos, and the integrated platform QShield, which combines QKD, QRNG, and post-quantum cryptography (PQC).
Where India Stands Globally
India is still in its infancy when compared to China's 2,000 km Beijing–Shanghai QKD network and its satellite-based communication accomplishments. Leading nations like the US, UK, and Singapore are also ahead of the curve, concentrating on operationalising QKD trials for government systems and incorporating post-quantum cryptography (PQC) into national infrastructure.
However, considering the nation's limited prior exposure to quantum technologies, India's progress is noteworthy for its rapid pace and indigenous innovation.
Policy Challenges and Priorities
- Strong policy support is required to match India's efforts in quantum communication. The standardisation of PQC algorithms and their incorporation into digital public infrastructure have to be major priorities.
- Scaling innovation from lab to deployment through public-private partnership
- Accelerating satellite QKD to establish a secure communications ecosystem owned by India.
- International standards compliance and worldwide interoperability for secure quantum protocols.
Conclusion
India has made timely strides in quantum communication, spearheaded by DRDO, IITs, and ISRO. Establishing unbreakable communication systems will be essential to national security as digital infrastructure becomes more and more integrated into governance and economic life. India can establish itself as a significant player in the developing quantum-secure world with consistent investment, well-coordinated policy, and international collaboration.
References
- https://www.thehindu.com/sci-tech/science/quantum-communication-iit-delhi-drdo-entanglement-qkd-explained/article69705017.ece
- https://drdo.gov.in/drdo/quantum-technologies
- https://www.indiatoday.in/science/story/the-end-of-hacking-how-isro-and-drdo-are-building-an-unhackable-quantum-future-2743715-2025-06-22
- https://www.pib.gov.in/PressReleasePage.aspx?PRID=2136702
- https://www.pib.gov.in/PressReleasePage.aspx?PRID=1800648
- https://thequantuminsider.com/2024/08/29/indias-drdo-scientists-complete-testing-of-6-qubit-superconducting-quantum-processor/
- https://www.pib.gov.in/PressReleasePage.aspx?PRID=2077600
- https://www.pib.gov.in/PressReleasePage.aspx?PRID=2121617
- https://www.rri.res.in/news/quic-lab-achieves-next-step-towards-realising-secure-satellite-based-quantum-communication#:~:text=QuIC%20lab%20achieves%20the%20next,transactions%2Dsafe%2D2561836.html
- https://www.gsma.com/newsroom/post-quantum-government-initiatives-by-country-and-region/
- https://tech.hindustantimes.com/tech/news/rri-demonstrates-secure-satellite-based-quantum-communication-in-collaboration-with-isro-71680375748247.html
.webp)
Introduction
Over-the-Top (OTT) streaming platforms have become a significant part of Indian entertainment consumption, offering users the ability to watch films, web series, and short-format videos directly online. These platforms operate on a subscription-based model, allowing for creative freedom, but they also lack clear accountability. On certain platforms, some content has been criticised for focusing on sensational or sexually explicit themes, particularly targeting young viewers seeking risqué entertainment. Such applications lack strong age verification mechanisms and offer ‘user access’ with minimal restrictions, which raises serious concerns about exposure to obscene content. This has triggered serious concerns among regulators, civil society organisations, advocacy and parental groups about the accessibility of such material and its potential influence, especially on minors.
Blocking order issued by the Ministry of Broadcasting and Information (MIB)
On 23rd July 2025, the Government of India, invoking powers under the Information Technology Act, 2000, and the Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Rules, 2021, has issued a ‘blocking order’ against 25 OTT platforms. A total of 26 websites and 14 mobile applications of the said OTT platforms were on the list, including several prominent OTT platforms for alleged distribution of obscene, vulgar and pornographic content in some cases. This regulatory action follows previous statutory advice and repeated warnings to the platforms in question, some of which continued to operate through new domains and disobeyed Indian laws and regulations.
This action was taken by the Ministry of Broadcasting and Information (MIB) in consultation with Ministry of Home Affairs, Ministry of Women and Child Development, Ministry of Electronics and Information Technology, Department of Legal Affairs, industry bodies and experts in the field of women rights and child rights.
The list of OTT Platforms covered under the said ‘Blocking Order’
The list includes - Big Shots App, Desiflix, Boomex, NeonX VIP, Navarasa Lite, Gulab App, Kangan App, Bull App, ShowHit, Jalva App, Wow Entertainment, Look Entertainment, Hitprime, Fugi, Feneo, ShowX, Sol Talkies, Adda TV, ALTT, HotX VIP, Hulchul App, MoodX, Triflicks, Ullu, and Mojflix.
The government has explicitly directed Internet Service Providers (ISP’s) to disable or remove public access to these websites within India.
Recent Judicial and Centre’s Interventions
- To refresh the memory, last year in March 2024, the Ministry of I&B blocked 18 OTT Platforms for Obscene and Vulgar Content.
- In April 2025, the Apex Court of India heard a petition on the prohibition of streaming of sexually explicit content on over-the-top (OTT) and social media platforms. In response to the petition, the Apex court stated, ‘It's not our domain, the centre has to take action and highlighted the need for executive action in the matter. The apex court has also issued notice to the Centre, OTT platforms, as well as social media platforms in response to a petition seeking a ban on sexually explicit content. (Uday Mahurkar & Ors. v. Union of India & Ors. [WP(C) 313/2025])
- The following recent blocking order dated 23rd July 2025 by the Ministry of I&B is a welcome and commendable step that reflects the government’s firm stance against illicit content on OTT platforms. Kangana Ranaut, Actress and politician, while speaking to a news agency, has appreciated the government's move to ban OTT platforms such as Ullu, ALTT, and Desiflix for showing soft porn content.
Conclusion
The centre’s intervention sends a clear message that OTT platforms cannot remain exempt from accountability. The move is a response to the growing concern of harms caused by unregulated digital content and non-compliances by the platforms, particularly in relation to illicit material, and broader violations of decency laws in India. However, the enforcement must now go beyond issuing orders and require a robust measurable compliance framework for OTT platforms.
In today’s fast-paced era, when subscription-based content platforms place vast libraries at users' fingertips, the government's action is necessary and proportionate, marking a decisive step toward safer digital and healthy regulated environments.
References
- https://www.newsonair.gov.in/govt-bans-25-ott-websites-apps-over-vulgar-and-pornographic-content/
- https://timesofindia.indiatimes.com/technology/tech-news/big-shots-ullu-altt-desiflix-mojflix-and-20-other-ott-apps-banned-what-governments-ban-order-says/articleshow/122918803.cms
- https://www.ndtv.com/india-news/centre-bans-ott-platforms-ullu-altt-desiflix-for-obscene-content-8947100
- https://foxmandal.in/News/sc-takes-note-of-obscenity-plea-issues-notice-to-ott-platforms/
- https://www.morungexpress.com/kangana-ranaut-calls-banning-ott-platforms-for-soft-porn-content-a-much-appreciated-move
- https://www.livemint.com/news/india/do-something-supreme-court-to-centre-ott-platforms-on-obscene-content-pil-netflix-amazon-prime-ullu-altt-x-facebook-11745823594972.html

Executive Summary:
Microsoft rolled out a set of major security updates in August, 2024 that fixed 90 cracks in the MS operating systems and the office suite; 10 of these had been exploited in actual hacker attacks and were zero-days. In the following discussion, these vulnerabilities are first outlined and then a general analysis of the contemporary cyber security threats is also undertaken in this blog. This blog seeks to give an acquainted and non-acquainted audience about these updates, the threat that these exploits pose, and prevent measures concerning such dangers.
1. Introduction
Nowadays, people and organisations face the problem of cybersecurity as technologies develop and more and more actions take place online. These cyber threats have not ceased to mutate and hence safeguarding organisations’ digital assets requires a proactive stand. This report is concerned with the vulnerabilities fixed by Microsoft in August 2024 that comprised a cumulative of 90 security weaknesses where six of them were zero-day exploits. All these make a terrible risk pose and thus, it is important to understand them as we seek to safeguard virtual properties.
2. Overview of Microsoft’s August 2024 Security Updates
August 2024 security update provided by Microsoft to its products involved 90 vulnerabilities for Windows, Office, and well known programs and applications. These updates are of the latest type which are released by Microsoft under its Patch Tuesday program, a regular cum monthly release of all Patch updates.
- Critical Flaws: As expected, seven of the 90 were categorised as Critical, meaning that these are flaws that could be leveraged by hackers to compromise the targeted systems or bring operations to a halt.
- Zero-Day Exploits: A zero-day attack can be defined as exploits, which are as of now being exploited by attackers while the software vendor has not yet developed a patch for the same. It had managed 10 zero-days with the August update, which underlines that Microsoft and its ecosystems remain at risk.
- Broader Impact: These are not isolated to the products of Microsoft only They still persist Despite this, these vulnerabilities are not exclusive to the Microsoft products only. Other vendors such as Adobe, Cisco, Google, and others also released security advisories to fix a variety of issues which proves today’s security world is highly connected.
3. Detailed Analysis of Key Vulnerabilities
This section provides an in-depth analysis of some of the most critical vulnerabilities patched in August 2024. Each vulnerability is explained in layman’s terms to ensure accessibility for all readers.
3. 1 CVE-2024-38189: Microsoft Project Remote Code Execution Vulnerability (CVSS score:8. 8) :
The problem is in programs that belong to the Microsoft Project family which is known to be a popular project management system. The vulnerability enables an attacker to produce a file to entice an user into opening it and in the process execute code on the affected system. This could possibly get the attacker full control of the user’s system as mentioned in the following section.
Explanation for Non-Technical Readers: Let us assume that one day you received a file which appears to be a normal word document. When it is opened, it is in a format that it secretly downloads a problematic program in the computer and this goes unnoticed. This is what could happen with this vulnerability, that is why it is very dangerous.
3. 2 CVE-2024-38178: Windows Scripting Engine Memory Corruption Vulnerability (CVSS score: 7.5):
Some of the risks relate to a feature known as the Windows Scripting Engine, which is an important system allowing a browser or an application to run scripts in a web page or an application. The weak point can result in corruption of memory space and an attacker can perform remote code execution with the possibility to affect the entire system.
Explanation for Non-Technical Readers: For the purpose of understanding how your computer memory works, imagine if your computer’s memory is a library. This vulnerability corrupts the structure of the library so that an intruder can inject malicious books (programs) which you may read (execute) on your computer and create havoc.
3. 3 CVE-2024-38193: WinSock Elevation of Privilege Vulnerability (CVSS score: 7. 8 )
It opens up a security weakness in the Windows Ancillary Function Driver for WinSock, which is an essential model that masks the communication between the two. It enables the attacker to gain new privileges on the particular system they have attacked, in this case they gain some more privileges on the attacked system and can access other higher activities or details.
Explanation for Non-Technical Readers: This flaw is like somebody gaining access to the key to your house master bedroom. They can also steal all your valuable items that were earlier locked and could only be accessed by you. It lets the attacker cause more havoc as soon as he gets inside your computer.
3. 4 CVE-2024-38106: Windows Kernel Elevation of Privilege Vulnerability (CVSS score: 7. 0)
This vulnerability targets what is known as the Windows Kernel which forms the heart or main frameworks of the operating system that controls and oversees the functions of the computer components. This particular weakness can be exploited and an opponent will be able to get high-level access and ownership of the system.
Explanation for Non-Technical Readers: The kernel can be compared to the brain of your computer. It is especially dangerous that if someone can control the brain he can control all the rest, which makes it a severe weakness.
3. 5 CVE-2024-38213: Windows Mark of the Web Security Feature Bypass Vulnerability (CVSS score: 6.5).
This vulnerability enables the attackers to evade the SmartScreen component of Windows which is used to safeguard users from accessing unsafe files. This weakness can be easily used by the attackers to influence the users to open files that are otherwise malicious.
Explanation for Non-Technical Readers: Usually, before opening a file your computer would ask you in advance that opening the file may harm your computer. This weak point makes your computer believe that this dangerous file is good and then no warning will be given to you.
4. Implications of the Vulnerabilities
These vulnerabilities, importantly the zero-day exploits, have significant implications on all users.
- Data Breaches: These weaknesses can therefore be manipulated to cause exposures of various data, occasioning data leaks that put individual and corporate information and wealth.
- System Compromise: The bad guys could end up fully compromising the impacted systems meaning that they can put in malware, pilfer data or simply shut down a program.
- Financial Loss: The organisations that do not patch these vulnerabilities on the shortest notice may end up experiencing a lot of losses because of having to deal with a lot of downtimes on their systems, having to incur the costs of remediating the systems that have been breached and also dealing with legal repercussions.
- Reputation Damage: Security breaches and IT system corruptions can result in loss of customer and partner confidence in an organisation’s ability to protect their information affecting its reputation and its position in the market.
5. Recommendations for Mitigating Risks
Immediate measures should be taken regarding the risks linked to these issues since such weaknesses pose a rather high threat. The following are recommendations suitable for both technical and non-technical users.
5. 1 Regular Software Updates
Make it a point that all the software, particularly operating systems and all Microsoft applications are updated. Any system out there needs to update it from Microsoft, and its Patch Tuesday release is crucial.
For Non-Technical Users: As much as possible, reply ‘yes’ to updates whenever your computer or smartphone prompts for it. These updates correct security matters and secure your instruments.
5. 2 Realisation of Phishing Attacks
Most of the risks are normally realised through phishing techniques. People should be taught diversifiable actions that come with crazy emails like clicking on links and opening attachments.
For Non-Technical Users: Do not respond to emails from unknown people and if they make you follow a link or download a file, do not do it. If it looks like spam, do not click on it.
5. 3 Security Software
Strong and reliable antivirus and anti-malware software can be used to identify and avoid the attacks that might have high chances of using these vulnerabilities.
For Non-Technical Users: Ensure you download a quality antivirus and always update it. This works like a security guard to your computer by preventing bad programs.
5. 4 Introduce Multi Factor Authentication (MFA)
MFA works in a way to enforce a second factor of authentication before the account can be accessed; for instance, a user will be asked to input a text message or an authentication application.
For Non-Technical Users: NS is to make use of two-factor authentication on your accounts. It is like increasing the security measures that a man who has to burgle a house has to undergo by having to hammer an additional lock on the door.
5. 5 Network segmentations and Privileges management
Network segmentation should be adopted by organisations to prevent the spread of attacks while users should only be granted the privileges required to do their activities.
For Non- Technical Users: Perform the assessments of user privileges and the networks frequently and alter them in an effort of reducing the extent of the attacks.
6. Global Cybersecurity Landscape and Vendor Patches
The other major vendors have also released patches to address security vulnerabilities in their products. The interdependent nature of technology has the effect on the entire digital ecosystem.
- Adobe, Cisco, Google, and Others: These companies have released updates to address the weaknesses in their products that are applied in different sectors. These patches should be applied promptly to enhance cybersecurity.
- Collaboration and Information Sharing:Security vendors as well as researchers and experts in the cybersecurity domain, need to remain vigilant and keep on sharing information on emerging threats in cyberspace.
7. Conclusion
The security updates companies such as Microsoft and other vendors illustrate the present day fight between cybersecurity experts and cybercriminals. All the vulnerabilities addressed in this August 2024 update cycle are a call for prudence and constant protection of digital platforms. These vulnerabilities explain the importance of maintaining up-to-date systems, being aware of potential threats, and implementing robust security practices. Therefore, it is important to fortify our shield in this ever expanding threat domain, in order to be safe from attackers who use this weakness for their malicious purposes.