Debug Information
Array
(
[meilisearch] => Array
(
[url] => https://msin.fadunews.in/indexes/zipri/search
[http_code] => 200
[response] => {"hits":[],"query":"Malicious-Code-Stock","processingTimeMs":4,"limit":3,"offset":0,"estimatedTotalHits":0}
[curl_error] =>
[parsed] => Array
(
[hits] => Array
(
)
[query] => Malicious-Code-Stock
[processingTimeMs] => 4
[limit] => 3
[offset] => 0
[estimatedTotalHits] => 0
)
)
[image_search] => Array
(
[url] => http://206.189.178.169:3001/?freshness=All&show=1&q=Malicious-Code-Stock+INR+loc%3Ain
[http_code] => 200
[response] => {"name":"malicious-code-stock inr loc:in","totalEstimatedMatches":65,"nextOffset":64,"currentOffset":0,"value":{"D675F3DDAFAB0C234EB4C2CE3441F58E0ED3B905":{"name":"What is Malicious Code? | Malicious Code Definition","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.WYSOYzD17z0uJTBqcIVNBwHaEL?pid=Api","datePublished":"2017-07-03T23:42:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.kaspersky.co.in/content/en-in/images/repository/isc/2017-images/malicious-programs-img-03.jpg","hostPageUrl":"https://www.kaspersky.co.in/resource-center/definitions/malicious-code","contentSize":"63667 B","width":710,"height":400,"cDNContentUrl":"https://th.bing.com/th/id/R.59848e6330f5ef3d2e25306a70854d07?rik=bVc%2f3fq6wDLkSw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"509B3DE0E85F1443EC2C4BE432C0BAFADD3F576D","accentColor":"0E9DBD"},"6D0D795BCEBEF10089A69983BA209720B9CB687B":{"name":"Threat actors are injecting malicious codes into legitimate crypto projects","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.QAdRBXpE42Spym33OSJyqQHaEK?pid=Api","datePublished":"2025-04-13T17:16:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.cryptopolitan.com/wp-content/uploads/2025/04/Malicious-actors-are-injecting-malicious-codes-into-legitimate-crypto-projects.webp","hostPageUrl":"https://cryptopanic.com/news/21056641/Threat-actors-are-injecting-malicious-codes-into-legitimate-crypto-projects","contentSize":"97080 B","width":1280,"height":720,"cDNContentUrl":"https://th.bing.com/th/id/R.400751057a44e364a9ca6df7392272a9?rik=1tCXtezrHwCYag&pid=ImgRaw&r=0","isTransparent":false,"imageId":"B786BC9B027902AB38996A98001FEBECB597D0D6","accentColor":"090053"},"BDF111DB0BFD5CB462A789A2B36B0C4E57C04B18":{"name":"Identifying Malicious Code Through Reverse Engineering: Buy Identifying ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.FQ61-UFjfJABjFZgdEpImgAAAA?pid=Api","datePublished":"2022-04-25T07:38:00.0000000Z","isFamilyFriendly":true,"contentUrl":"http://rukmini1.flixcart.com/image/300/300/k95yhzk0/book/2/4/1/identifying-malicious-code-through-reverse-engineering-original-imafryr7zhzu8thb.jpeg","hostPageUrl":"https://www.flipkart.com/identifying-malicious-code-through-reverse-engineering/p/itmfbdrjmdnwwyzm","contentSize":"30246 B","width":183,"height":300,"cDNContentUrl":"https://th.bing.com/th/id/R.150eb5f941637c90018c5660744a489a?rik=2x8RvbDfxUsmeg&riu=http%3a%2f%2frukmini1.flixcart.com%2fimage%2f300%2f300%2fk95yhzk0%2fbook%2f2%2f4%2f1%2fidentifying-malicious-code-through-reverse-engineering-original-imafryr7zhzu8thb.jpeg&ehk=L0SAiQYiuh5yfFOyNSDMvSE6%2bkjb%2bW5GN2OXKF%2fjJS4%3d&risl=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"81B40C75E4C0B63B2A987A264BC5DFB0BD111FDB","accentColor":"169FB5"},"AACEB3087C4718BDDED3C2CE3441F58E0ED3B905":{"name":"What is Malicious Code? | Malicious Code Definition","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.BIb4B4j0XiyGcdr9kWgYaAAAAA?pid=Api","datePublished":"2017-07-03T23:42:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://d3kwb303vesg1m.cloudfront.net/se/media/rc/side-banner-coin.gif","hostPageUrl":"https://www.kaspersky.co.in/resource-center/definitions/malicious-code","contentSize":"111703 B","width":300,"height":600,"proxyContentUrl":"https://tse2.mm.bing.net/th/id/OGC.0486f80788f45e2c8671dafd91681868?pid=Api&rurl=https%3a%2f%2fd3kwb303vesg1m.cloudfront.net%2fse%2fmedia%2frc%2fside-banner-coin.gif&ehk=uVsUSnm3%2b2PfiE1B9HMvMqXXaMytKgn3TDV17axbpzA%3d","cDNContentUrl":"https://th.bing.com/th/id/R.0486f80788f45e2c8671dafd91681868?rik=quw7gMd0gdvtPQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"509B3DE0E85F1443EC2C3DEDDB8174C7803BECAA","accentColor":"118DBA"},"46476997C228B5552ED18051E3EE5DB336DB43BD":{"name":"Recent Cases of Watering Hole Attacks, Part 2","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.JlnDW6KhwXnPIXOEpjaWQQHaFU?pid=Api","datePublished":"2024-12-26T03:29:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://blogs.jpcert.or.jp/en/.assets/watering_hole_attack_2023_2-fig3.png","hostPageUrl":"https://sechub.in/view/2992590","contentSize":"129010 B","width":948,"height":680,"cDNContentUrl":"https://th.bing.com/th/id/R.2659c35ba2a1c179cf217384a6369641?rik=ZHSWeSyCW1XiHQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"DB34BD633BD5EE3E15081DE2555B822C79967464","accentColor":"C90202"},"09DB81A498D738B8DFE260CD4BA227ABC94099E1":{"name":"Anti-Rootkit and Remediation Technology | Kaspersky","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.Lk4laaUHf-Sb_IXp1J8ykQHaEg?pid=Api","datePublished":"2021-03-05T18:04:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.kaspersky.com/content/en-global/enterprise-security/wiki-section/img/Anti-Rootkit-and-Remediation-Technology-1.png","hostPageUrl":"https://www.kaspersky.co.in/enterprise-security/wiki-section/products/anti-rootkit-and-remediation-technology","contentSize":"90273 B","width":1030,"height":626,"cDNContentUrl":"https://th.bing.com/th/id/R.2e4e2569a5077fe49bfc85e9d49f3291?rik=kL0YSol9g4v9Lg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"1E99049CBA722AB4DC062EFD8B837D894A18BD90","accentColor":"051515"},"0E6D3C5A9305A4586FBA721EF0537DD25BF970B0":{"name":"Ransomware Malicious Code in Python: Buy Ransomware Malicious Code in ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.xGisKz_NGJQlG9hwZf4AeAAAAA?pid=Api","datePublished":"2022-09-08T18:48:00.0000000Z","isFamilyFriendly":true,"contentUrl":"http://rukmini1.flixcart.com/image/300/300/jl9rf680/book/5/0/4/ransomware-malicious-code-in-python-original-imaf8f78cwddxyza.jpeg","hostPageUrl":"https://www.flipkart.com/ransomware-malicious-code-python/p/itmf8dqg4duq8g6u","contentSize":"20275 B","width":200,"height":300,"cDNContentUrl":"https://th.bing.com/th/id/R.c468ac2b3fcd1894251bd87065fe0078?rik=4NbDpTlQSoX2qw&riu=http%3a%2f%2frukmini1.flixcart.com%2fimage%2f300%2f300%2fjl9rf680%2fbook%2f5%2f0%2f4%2fransomware-malicious-code-in-python-original-imaf8f78cwddxyza.jpeg&ehk=KVxL2OHsvuG8EEDwZHsBXOgCedH9P0vvH28rGd3mZ7o%3d&risl=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"0B079FB52DD7350FE127ABF6854A5039A5C3D6E0","accentColor":"416B8A"},"D4397559FCE796FF50CEECA5D6F3EC4792EDA0F3":{"name":"Cyber Swachhta Kendra: ViperSoftX Malware","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.adD0Jn-IwOMiTP6oqhE32AHaHJ?pid=Api","datePublished":"2023-05-03T14:18:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.csk.gov.in/image/other/execution_Vipersoftx.png","hostPageUrl":"https://www.csk.gov.in/alerts/Vipersoftx.html","contentSize":"792729 B","width":1600,"height":1545,"cDNContentUrl":"https://th.bing.com/th/id/R.69d0f4267f88c0e3224cfea8aa1137d8?rik=TZNXlc9%2baf8F7A&pid=ImgRaw&r=0","isTransparent":false,"imageId":"3F0ADE2974CE3F6D5ACEEC05FF697ECF9557934D","accentColor":"9C432F"},"D3020992BAF810C61B388051E3EE5DB336DB43BD":{"name":"Recent Cases of Watering Hole Attacks, Part 2","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.DG9PI_M5gY_E0GYShINmBQHaJ2?pid=Api","datePublished":"2024-12-26T03:29:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://blogs.jpcert.or.jp/en/.assets/watering_hole_attack_2023_2-fig2.png","hostPageUrl":"https://sechub.in/view/2992590","contentSize":"324401 B","width":963,"height":1280,"cDNContentUrl":"https://th.bing.com/th/id/R.0c6f4f23f339818fc4d0661284836605?rik=PSCQKauPAWyxgw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"DB34BD633BD5EE3E150883B16C018FAB2990203D","accentColor":"317B9A"},"D5DD861B15CC71ECCAAA5D64BC1B2D55DE641809":{"name":"ChatGPT can be used to generate malicious code, finds research","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.91L2GAWbzkRqA7J_v_8oQwHaD3?pid=Api","datePublished":"2022-12-20T11:29:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://assets.techcircle.in/uploads/article-image/2022/12/images/31508-183673683-l.png","hostPageUrl":"https://www.techcircle.in/2022/12/20/chatgpt-can-be-used-to-generate-malicious-code-finds-research","contentSize":"94997 B","width":640,"height":334,"cDNContentUrl":"https://th.bing.com/th/id/R.f752f618059bce446a03b27fbfff2843?rik=Xd1osVHMF86sqg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"908146ED55D2B1CB46D5AAACCE17CC51B168DD5D","accentColor":"964C35"},"FBBA25DC4541BEE3DF36CF050ED7FA6203038484":{"name":"Russian Hackers Are Writing Malicious Codes On ChatGPT To Hack Your ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.2Ut9lueyZgAbU33W_8gXtAHaEF?pid=Api","datePublished":"2023-01-16T05:24:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://sm.mashable.com/mashable_in/photo/default/aaa_fsgn.jpg","hostPageUrl":"https://in.mashable.com/tech/45450/russian-hackers-are-writing-malicious-codes-on-chatgpt-to-hack-your-personal-data","contentSize":"122768 B","width":1062,"height":585,"cDNContentUrl":"https://th.bing.com/th/id/R.d94b7d96e7b266001b537dd6ffc817b4?rik=v6tSzVQU6z79Yw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"4848303026AF7DE050FC63FD3EEB1454CD52ABBF","accentColor":"A53226"},"869E9C463E372A1907B58051E3EE5DB336DB43BD":{"name":"Recent Cases of Watering Hole Attacks, Part 2","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.wwockrAuP-5fs8YyhNIinwHaEC?pid=Api","datePublished":"2024-12-26T03:29:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://blogs.jpcert.or.jp/en/.assets/watering_hole_attack_2023_2-fig5.png","hostPageUrl":"https://sechub.in/view/2992590","contentSize":"496149 B","width":1280,"height":698,"cDNContentUrl":"https://th.bing.com/th/id/R.c30a1c92b02e3fee5fb3c63284d2229f?rik=aOnJZONzopFwWw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"DB34BD633BD5EE3E15085B7091A273E364C9E968","accentColor":"BA9111"},"74B66EC7FE4D1FE9C6D686A62D41B58011929C1F":{"name":"Scanning a suspicious QR code? Beware! Check these tips | Tech News (HT ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.MLDmM-tpXHLO0v0_l2HzXAHaEK?pid=Api","datePublished":"2022-01-13T10:17:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://images.hindustantimes.com/tech/img/2022/01/13/1600x900/HK-LEGCO-3_1642068986048_1642069015157.jpg","hostPageUrl":"https://tech.hindustantimes.com/tech/news/scanning-a-suspicious-qr-code-beware-check-these-tips-71642068765382.html","contentSize":"299240 B","width":1600,"height":900,"cDNContentUrl":"https://th.bing.com/th/id/R.30b0e633eb695c72ced2fd3f9761f35c?rik=R2vmfO%2fU8Z5sbQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"F1C92911085B14D26A686D6C9EF1D4EF7CE66B47","accentColor":"326B6D"},"1D132821D274836F4C7C692378EE2BEEFC459312":{"name":"Recent Cases of Watering Hole Attacks, Part 1","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.otyeIFbyEfXiAZR5a2qp3gHaDf?pid=Api","datePublished":"2024-12-19T02:55:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://blogs.jpcert.or.jp/en/.assets/watering_hole_attack_2023_1-fig3.png","hostPageUrl":"https://sechub.in/view/2989271","contentSize":"275236 B","width":1280,"height":603,"cDNContentUrl":"https://th.bing.com/th/id/R.a2dc9e2056f211f5e20194796b6aa9de?rik=0TGCEi1HOPbExw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"213954CFEEB2EE873296C7C4F638472D128231D1","accentColor":"C70404"},"B6C229296AFF952E23C97079731461AC4E99BDC0":{"name":"QR code scams on the rise during festive celebrations; here’s how to be ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.C2-G72OwRH2Y9ft6GGMCCAHaEK?pid=Api","datePublished":"2023-11-11T16:26:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://akm-img-a-in.tosshub.com/businesstoday/images/story/202311/dmvyfg65kzmohjcfw2u6miig6u-sixteen_nine.jpg?size=948:533","hostPageUrl":"https://www.businesstoday.in/technology/news/story/qr-code-scams-on-the-rise-during-festive-celebrations-heres-how-to-be-safe-405472-2023-11-11","contentSize":"53329 B","width":948,"height":533,"cDNContentUrl":"https://th.bing.com/th/id/R.0b6f86ef63b0447d98f5fb7a18630208?rik=ayySkqb%2fWeIynA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"0CDB99E4CA16413797079C32E259FFA692922C6B","accentColor":"A82332"},"00FC758869F6486C54A2F1E5CE54D45D11E0F257":{"name":"IIT HARYANA","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.7ho5_DA_vHiWyT3pcuiTXQHaEK?pid=Api","datePublished":"2025-03-16T15:40:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.udacity.com/blog/wp-content/uploads/2020/06/HTML_Blog-scaled.jpeg","hostPageUrl":"https://www.iithry.org.in/","contentSize":"361798 B","width":2560,"height":1440,"cDNContentUrl":"https://th.bing.com/th/id/R.ee1a39fc303fbc7896c93de972e8935d?rik=AM9XiJZvhMZFKg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"752F0E11D54D45EC5E1F2A45C6846F968857CF00","accentColor":"0F6FBC"},"07DB04BEA4A2B140DA63CF050ED7FA6203038484":{"name":"Russian Hackers Are Writing Malicious Codes On ChatGPT To Hack Your ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.pa3lzc4GN69Sq5M1hEdoCQHaEe?pid=Api","datePublished":"2023-01-16T05:24:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://sm.mashable.com/t/mashable_in/photo/default/a-4_u3yt.1248.jpg","hostPageUrl":"https://in.mashable.com/tech/45450/russian-hackers-are-writing-malicious-codes-on-chatgpt-to-hack-your-personal-data","contentSize":"100935 B","width":1248,"height":754,"cDNContentUrl":"https://th.bing.com/th/id/R.a5ade5cdce0637af52ab933584476809?rik=cL1A60oqGwStNg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"4848303026AF7DE050FC36AD041B2A4AEB40BD70","accentColor":"034961"},"AA2CD736D4B332A11ABBC6794B5295D5A34087C4":{"name":"Hackers are using ChatGPT to create malware to steal your money - India ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.SkgvQMMcZV6MYkcBW2jYkQHaEK?pid=Api","datePublished":"2023-01-10T06:40:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://akm-img-a-in.tosshub.com/indiatoday/images/story/202301/chatgpt_code-sixteen_nine.jpg?VersionId=t9wxU0udqOYpoMwSfz7lRkDMYv0XaecT&size=690:388","hostPageUrl":"https://www.indiatoday.in/technology/news/story/hackers-are-using-chatgpt-to-create-malware-to-steal-your-money-2319565-2023-01-10","contentSize":"35536 B","width":690,"height":388,"cDNContentUrl":"https://th.bing.com/th/id/R.4a482f40c31c655e8c6247015b68d891?rik=qsJ9Y007Ixqhuw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"4C78043A5D5925B4976CBBA11A233B4D637DC2AA","accentColor":"62BE0D"},"1B277822CB4D1317A4C75BE74630C5B7402DE2F3":{"name":"Hacking vs Ethical Hacking: Check Key Differences and Similarities","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.tCw96pH8d49m1j70IWP9wAHaEK?pid=Api","datePublished":"2022-11-03T05:43:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://img.jagranjosh.com/images/2022/November/3112022/hacking.webp","hostPageUrl":"https://www.jagranjosh.com/general-knowledge/hacking-vs-ethical-hacking-check-key-differences-and-similarities-1667455060-1","contentSize":"39638 B","width":1200,"height":675,"cDNContentUrl":"https://th.bing.com/th/id/R.b42c3dea91fc778f66d63ef42163fdc0?rik=sXKHIrzUMXFKfA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"3F2ED2047B5C03647EB57C4A7131D4BC228772B1","accentColor":"C20909"},"5CC7A2C7A5CEBC6048822C1721CC16E8645DE5FE":{"name":"Explained: How Gautam Adani v/s Hindenburg saga has unfolded so far ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP._GajpLXOOBOmWoQkFmsMdwHaFS?pid=Api","datePublished":"2023-02-02T16:41:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://static.toiimg.com/thumb/imgsize-23456,msid-97558808,width-600,resizemode-4/97558808.jpg","hostPageUrl":"https://timesofindia.indiatimes.com/business/india-business/explainer-how-adani-v/s-hindenburg-saga-has-unfolded-so-far/articleshow/97558775.cms","contentSize":"26325 B","width":600,"height":428,"cDNContentUrl":"https://th.bing.com/th/id/R.fc66a3a4b5ce3813a65a8424166b0c77?rik=xXwqfFrsywaEKA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"EF5ED5468E61CC1271C2288406CBEC5A7C2A7CC5","accentColor":"9C722F"},"0FDFE076358E05A35F2DA1AEFDF2046707FC8D39":{"name":"Dealing With Malware & Hacked Sites: And The SEO Factor","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.kynYJ5z9vpxOYBR2KJBbaAHaC9?pid=Api","datePublished":"2012-01-29T18:54:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.webaholic.co.in/wp-content/uploads/2012/01/obfuscated-script.png","hostPageUrl":"https://www.webaholic.co.in/blog/dealing-with-malware-and-hacked-sites/","contentSize":"12432 B","width":581,"height":232,"cDNContentUrl":"https://th.bing.com/th/id/R.9329d8279cfdbe9c4e60147628905b68?rik=8P0OZ1PoUDr10g&pid=ImgRaw&r=0","isTransparent":false,"imageId":"93D8CF7076402FDFEA1AD2F53A50E853670EFDF0","accentColor":"7A6551"},"5E8F08F9EBDA553F6FCDCA9674C38C7CBC19A95B":{"name":"Delhi: Scammers use malicious QR codes to dupe online sellers while ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.GpW__b2TjOyGv1LXjIF2_QHaEK?pid=Api","datePublished":"2020-09-03T23:10:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://akm-img-a-in.tosshub.com/indiatoday/images/story/202009/QR_code__PTI__1200x768.jpeg?size=690:388","hostPageUrl":"https://www.indiatoday.in/crime/story/delhi-scammers-use-malicious-qr-codes-to-dupe-online-sellers-while-posing-as-army-men-1718415-2020-09-03","contentSize":"76126 B","width":690,"height":388,"cDNContentUrl":"https://th.bing.com/th/id/R.1a95bffdbd938cec86bf52d78c8176fd?rik=5fiAn76tVfP23A&pid=ImgRaw&r=0","isTransparent":false,"imageId":"B59A91CBC7C83C4769ACDCF6F355ADBE9F80F8E5","accentColor":"AC801F"},"C7CF7566AF88B312A112E5FEE56E71DF7751B0F2":{"name":"Fake Facebook profiles: Hackers posed as flirtatious women to target ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.0h2_OcnFjkmamALXac2rtQHaEK?pid=Api","datePublished":"2022-04-07T12:50:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://images.hindustantimes.com/tech/img/2022/04/07/1600x900/BCOEEUL7IVI55CUNHEWSDL4ZEE_1649308452988_1649308484715.jpg","hostPageUrl":"https://tech.hindustantimes.com/tech/news/fake-facebook-profiles-hackers-posed-as-flirtatious-women-to-target-israeli-officials-71649304659003.html","contentSize":"207840 B","width":1600,"height":900,"cDNContentUrl":"https://th.bing.com/th/id/R.d21dbf39c9c58e499a9802d769cdabb5?rik=fPxXZvqIOyEaIQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"2F0B1577FD17E65EEF5E211A213B88FA6657FC7C","accentColor":"076B18"},"C819D0E6A0A40AD788532C6FAB6328A73DDC124B":{"name":"How to protect your Samsung Smart TV from Hacking and Malicious Code ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.4voJnttVb4L9HVrSf-4LGAHaEK?pid=Api","datePublished":"2018-06-10T15:25:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://images.samsung.com/is/image/samsung/assets/in/support/tv-audio-video/how-to-protect-your-samsung-smart-tv-from-hacking-and-malicious-code/364.jpg","hostPageUrl":"https://www.samsung.com/in/support/tv-audio-video/how-to-protect-your-samsung-smart-tv-from-hacking-and-malicious-code/","contentSize":"12195 B","width":567,"height":319,"cDNContentUrl":"https://th.bing.com/th/id/R.e2fa099edb556f82fd1d5ad27fee0b18?rik=jJENbgpKoH2INQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"B421CDD37A8236BAF6C235887DA04A0A6E0D918C","accentColor":"0E60AF"},"57A1A46B942A4E5BBFAA2C6FAB6328A73DDC124B":{"name":"How to protect your Samsung Smart TV from Hacking and Malicious Code ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP._YnNuG95tgOFpN_-NON4SQHaEK?pid=Api","datePublished":"2018-06-10T15:25:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://images.samsung.com/is/image/samsung/assets/in/support/tv-audio-video/how-to-protect-your-samsung-smart-tv-from-hacking-and-malicious-code/308.jpg","hostPageUrl":"https://www.samsung.com/in/support/tv-audio-video/how-to-protect-your-samsung-smart-tv-from-hacking-and-malicious-code/","contentSize":"19941 B","width":567,"height":319,"cDNContentUrl":"https://th.bing.com/th/id/R.fd89cdb86f79b60385a4dffe34e37849?rik=dRpKtkmi5LX7qg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"B421CDD37A8236BAF6C2AAFBB5E4A249B64A1A75","accentColor":"C89A03"},"08C025375CBB959BA1372C6FAB6328A73DDC124B":{"name":"How to protect your Samsung Smart TV from Hacking and Malicious Code ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.E5u-qKD9yv-7oRBFb14krAHaEK?pid=Api","datePublished":"2018-06-10T15:25:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://images.samsung.com/is/image/samsung/assets/in/support/tv-audio-video/how-to-protect-your-samsung-smart-tv-from-hacking-and-malicious-code/362.jpg","hostPageUrl":"https://www.samsung.com/in/support/tv-audio-video/how-to-protect-your-samsung-smart-tv-from-hacking-and-malicious-code/","contentSize":"14536 B","width":567,"height":319,"cDNContentUrl":"https://th.bing.com/th/id/R.139bbea8a0fdcaffbba110456f5e24ac?rik=gAxSc8W7Wbkacw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"B421CDD37A8236BAF6C2731AB959BBC573520C80","accentColor":"1063AF"},"FCF0BFEA2CAECB03C1AE85E8EB1E105EAB6E819B":{"name":"Indian FinTech Ecosystem: Key Challenges and How To Deal With It ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.GJ9yiJDiUMb8Vkr0mhrnAQHaEy?pid=Api","datePublished":"2020-03-02T12:43:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://cisomag.com/wp-content/uploads/2019/09/shutterstock_1451268602.jpg","hostPageUrl":"https://community.nasscom.in/communities/digital-transformation/bfsi/indian-fintech-ecosytem-key-challenges-and-how-to-deal-with-it.html","contentSize":"94613 B","width":800,"height":517,"cDNContentUrl":"https://th.bing.com/th/id/R.189f728890e250c6fc564af49a1ae701?rik=zw%2f7rsLqvDAc6g&pid=ImgRaw&r=0","isTransparent":false,"imageId":"B918E6BAE501E1BE8E58EA1C30BCEAC2AEFB0FCF","accentColor":"C29909"},"2B9194DC5CD2EF5E42FC1CAC3DB74A2612354086":{"name":"Email still significant channel for malicious attacks: Forcepoint ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.ts2xePWXZ2YUGmuWmIEw2QHaDI?pid=Api","datePublished":"2022-11-28T07:53:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.itnext.in/sites/default/files/_article_images/cio/malicious%20file%20formats.png","hostPageUrl":"https://www.itnext.in/article/2016/04/29/email-still-significant-channel-malicious-attacks-forcepoint-report","contentSize":"14816 B","width":702,"height":297,"cDNContentUrl":"https://th.bing.com/th/id/R.b6cdb178f5976766141a6b96988130d9?rik=shlJzcUt%2fuUkzw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"6804532162A47BD3CAC1CF24E5FE2DC5CD4919B2","accentColor":"283BA3"},"5DED8C96846236F0BA44D85F45F21E847982B139":{"name":"chart activity of virus computer photo chahiye - Brainly.in","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.pXmKmAYgNiFmU-ZyzFh-MQHaEK?pid=Api","datePublished":"2022-06-10T07:01:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://hi-static.z-dn.net/files/d9e/dea963f1318baeaf8d92621296ebc38b.png","hostPageUrl":"https://brainly.in/question/52325767","contentSize":"160548 B","width":1366,"height":768,"cDNContentUrl":"https://th.bing.com/th/id/R.a5798a98062036216653e672cc587e31?rik=1d7IaUgmYw%2brRA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"931B289748E12F54F58D44AB0F63264869C8DED5","accentColor":"C09F0B"},"CB50A0A0190917350D0B938060D5797FB675395C":{"name":"Leverage Virtual - Home","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.IUYtcPQFCANaaiA6ULbfwQHaE7?pid=Api","datePublished":"2022-06-07T04:01:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://img1.wsimg.com/isteam/stock/gAEJr51","hostPageUrl":"https://leveragevirtual.com/","contentSize":"159749 B","width":1255,"height":836,"cDNContentUrl":"https://th.bing.com/th/id/R.21462d70f40508035a6a203a50b6dfc1?rik=vAUKCpGQcVPQsA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"C593576BF7975D060839B0D0537190910A0A05BC","accentColor":"377D93"},"E58B06E01711E663FD628DE9BA02707DA8C335D5":{"name":"Cyber Crime in India: Types of Cyber Crime, Impact & Safety Tips","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.WDmH0WfwpOZtIwqyaHrY9gHaFj?pid=Api","datePublished":"2020-11-26T12:55:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://okcredit-blog-images-prod.storage.googleapis.com/2020/11/cyber4-1.jpg","hostPageUrl":"https://okcredit.in/blog/growth-of-cyber-crime-in-india/","contentSize":"147219 B","width":2000,"height":1500,"cDNContentUrl":"https://th.bing.com/th/id/R.583987d167f0a4e66d230ab2687ad8f6?rik=XrhgDnERbjbfJg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"5D533C8AD70720AB9ED826DF366E11710E60B85E","accentColor":"000745"},"1B199EA8386060DBBEDDC63EFD6B2C2DD99C018D":{"name":"Garena Free Fire Max: Redeem Codes for July 11, 2025, Available Now ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.Hlm21IcVVZNPtu4rVt3okAHaEK?pid=Api","datePublished":"2025-07-11T04:20:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://sm.ign.com/t/ign_in/screenshot/default/free-fire-max-loading_ngzx.1280.jpg","hostPageUrl":"https://in.ign.com/garena-free-fire/235970/guide/garena-free-fire-max-redeem-codes-11-2025-available-now","contentSize":"188415 B","width":1200,"height":675,"cDNContentUrl":"https://th.bing.com/th/id/R.1e59b6d4871555934fb6ee2b56dde890?rik=sZHpioMGBr3r3Q&pid=ImgRaw&r=0","isTransparent":false,"imageId":"D810C99DD2C2B6DFE36CDDEBBD0606838AE991B1","accentColor":"1B77B0"},"EF1C15B25AC942873A402D307D82FF74093C3564":{"name":"what is computer virus? - Brainly.in","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.8ycEjpCZLx76whW_7wjBQgHaD6?pid=Api","datePublished":"2022-06-27T11:00:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://hi-static.z-dn.net/files/d78/0887e16034ffa810812c7913dccc7ce7.jpg","hostPageUrl":"https://brainly.in/question/52652559","contentSize":"42135 B","width":720,"height":380,"cDNContentUrl":"https://th.bing.com/th/id/R.f327048e90992f1efac215bfef08c142?rik=%2fsFRK6WcJHijBA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"4653C39047FF28D703D204A378249CA52B51C1FE","accentColor":"545658"},"4D2D3A53C626033ECE40A52173447DFBB0866762":{"name":"Download wallpaper 3840x2160 code, programming, text, lines, symbols ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.hcFv1ib657elvGRa0bS8ZwHaEK?pid=Api","datePublished":"2019-06-15T20:10:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://images.wallpaperscraft.com/image/single/code_programming_text_141192_3840x2160.jpg","hostPageUrl":"https://wallpaperscraft.com/download/code_programming_text_141192/3840x2160","contentSize":"1024249 B","width":3840,"height":2160,"cDNContentUrl":"https://th.bing.com/th/id/R.85c16fd626fae7b7a5bc645ad1b4bc67?rik=1NKjNWxiMOPsBA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"2676680BBFD74437125A04ECE330626C35A3D2D4","accentColor":"31769A"},"68188A58D05EE48020E525E08EEB369879F08A24":{"name":"Print Invoice with HSN/SAC in TallyPrime","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.q7ipgEroGdEacJ04IstePQHaG3?pid=Api","datePublished":"2022-01-14T01:52:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://help.tallysolutions.com/wp-content/uploads/2020/09/stock-item-gst-details-screen-tally.gif","hostPageUrl":"https://vedcrm.vedantsoft.in/knowledge-base/article/print-invoice-with-hsn-sac-in-tallyprime","contentSize":"18946 B","width":592,"height":549,"cDNContentUrl":"https://th.bing.com/th/id/R.abb8a9804ae819d11a709d3822cb5e3d?rik=hoGohQ3lTggCXg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"42A80F978963BEE80E525E02084EE50D85A88186","accentColor":"326E99"},"21BF4F800E787A49FF4A14F9A48D7C7B96BFFCC6":{"name":"Garena Free Fire Redeem Codes for April 14: Unlock exclusive goodies ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.ak0mvB4rGP8lIE4fOhEXQwHaEK?pid=Api","datePublished":"2024-04-14T02:59:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://images.hindustantimes.com/tech/img/2022/05/27/960x540/055_1653612384612_1653612405025.jpg","hostPageUrl":"https://tech.hindustantimes.com/gaming/news/garena-free-fire-redeem-codes-for-april-14-unlock-exclusive-goodies-today-like-weapons-character-skins-and-more-71713007782897.html","contentSize":"163502 B","width":960,"height":540,"cDNContentUrl":"https://th.bing.com/th/id/R.6a4d26bc1e2b18ff25204e1f3a111743?rik=Evv0COCHp5T%2fpA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"6CCFFB69B7C7D84A9F41A4FF94A787E008F4FB12","accentColor":"2E759D"},"2A4E99F02456D9F31C7D0081446E3E0ED5463657":{"name":"Tutorial At Home","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.blE3Aohpz5-4bSx_JKkMWwAAAA?pid=Api","datePublished":"2018-08-14T13:17:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.tutorialathome.in/postimg/2020/10/python-lucas-series.jpg","hostPageUrl":"https://www.tutorialathome.in/physics/acceleration-retardation","contentSize":"67456 B","width":400,"height":267,"cDNContentUrl":"https://th.bing.com/th/id/R.6e5137028869cf9fb86d2c7f24a90c5b?rik=ouSZD0JlnT%2fB1w&pid=ImgRaw&r=0","isTransparent":false,"imageId":"7563645DE0E3E6441800D7C13F9D65420F99E4A2","accentColor":"009DCC"},"ABC25073B8D056DF371395BE0070F6FBF7C82BD1":{"name":"Garena Free Fire MAX Redeem Codes for June 17: FREE in-game rewards ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.AyEjyUY1Sc_uHfad3krKAAHaEK?pid=Api","datePublished":"2023-06-17T00:48:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://images.hindustantimes.com/tech/img/2023/06/17/1600x900/Garena_Free_Fire_MAX_codes_1686962767149_1686962767354.jpg","hostPageUrl":"https://tech.hindustantimes.com/tech/news/garena-free-fire-max-redeem-codes-for-june-17-free-in-game-rewards-coming-your-way-71686962679364.html","contentSize":"413450 B","width":1600,"height":900,"cDNContentUrl":"https://th.bing.com/th/id/R.032123c9463549cfee1df69dde4aca00?rik=uiwFN4sNZf1zMQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"1DB28C7FBF6F0700EB593173FD650D8B37052CBA","accentColor":"6D303D"},"5AE804CB19138E6E355F08DF4FF0A51AA469DE78":{"name":"React App","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.Ql-Swn-AlLYpBW5zs3oFyQHaEx?pid=Api","datePublished":"2021-11-22T17:42:00.0000000Z","isFamilyFriendly":true,"contentUrl":"http://nativetechies.in/Images/Python.jpg","hostPageUrl":"http://nativetechies.in/","contentSize":"109124 B","width":1378,"height":888,"cDNContentUrl":"https://th.bing.com/th/id/R.425f92c27f8094b629056e73b37a05c9?rik=pY5AvJEx6OZT9Q&riu=http%3a%2f%2fnativetechies.in%2fImages%2fPython.jpg&ehk=Enj4VVGwnhEHbiO1%2f7X29sLXZw2lTB0%2fyq7p5WDIna8%3d&risl=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"87ED964AA15A0FF4FD80F553E6E83191BC408EA5","accentColor":"0073CC"},"B85652E1B36000FE7D886923492066ABF8CFF5DB":{"name":"Royal Blue Scrub Suit for Doctors Price, Information and Pictures","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.B0bjSCd24ld3ZhmZin78cAHaHa?pid=Api","datePublished":"2020-06-21T22:15:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.meddeal.in/image/cache/catalog/product/scrub-suit-royal-blue-664x664.jpg","hostPageUrl":"https://www.meddeal.in/scrub-suit-for-doctors-royal-blue.html","contentSize":"36934 B","width":664,"height":664,"cDNContentUrl":"https://th.bing.com/th/id/R.0746e3482776e257776619998a7efc70?rik=i2UlHjsGAO%2fXiA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"BD5FFC8FBA660294329688D7EF00063B1E25658B","accentColor":"233377"},"0D05BA59511348D025B7B24A05451B82433574B4":{"name":"Download wallpaper 1920x1080 code, programming, text, lines, symbols ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.DZgtXO7f3xJWtlWF6a7Q2AHaEK?pid=Api","datePublished":"2019-06-18T22:46:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://images.wallpaperscraft.com/image/single/code_programming_text_141192_1920x1080.jpg","hostPageUrl":"https://wallpaperscraft.com/download/code_programming_text_141192/1920x1080","contentSize":"211123 B","width":1920,"height":1080,"cDNContentUrl":"https://th.bing.com/th/id/R.0d982d5ceedfdf1256b65585e9aed0d8?rik=0FCrlRUxhA1Sew&pid=ImgRaw&r=0","isTransparent":false,"imageId":"4B47533428B15450A42B7B520D84311595AB50D0","accentColor":"327799"},"E8B3BBEC4037DFBC0297D0C635703778E6A8B6DD":{"name":"How to deal with the office gossipmonger | Femina.in","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.5sm8V4Bfv8UmTdhdaMMm_AHaE8?pid=Api","datePublished":"2016-10-25T19:17:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://femina.wwmindia.com/content/2016/Oct/in_1_1477394433.jpg","hostPageUrl":"https://www.femina.in/life/careers-and-money/how-to-deal-with-the-office-gossipmonger-27553.html","contentSize":"23666 B","width":640,"height":428,"cDNContentUrl":"https://th.bing.com/th/id/R.e6c9bc57805fbfc5264dd85d68c326fc?rik=jju7zgRz%2fcsgeQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"DD6B8A6E877307536C0D7920CBFD7304CEBB3B8E","accentColor":"AD1E40"},"F51E052219F50B24AF7DFB0D5FD6FC98677CE5EB":{"name":"Various Google Play ‘Beauty Camera’ Apps Send Users Pornographic ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.kxu3jbcihnZ3KZKwuQXeyQHaB1?pid=Api","datePublished":"2025-01-26T21:37:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://blog.trendmicro.com/trendlabs-security-intelligence/files/2019/01/malicious-camera-beauty-apps-2.png","hostPageUrl":"https://sechub.in/view/1538023","contentSize":"8216 B","width":773,"height":192,"cDNContentUrl":"https://th.bing.com/th/id/R.931bb78db7228676772992b0b905dec9?rik=X%2bFQIpFfsEL61w&pid=ImgRaw&r=0","isTransparent":false,"imageId":"BE5EC77689CF6DF5D0BFD7FA42B05F912250E15F","accentColor":"0000CC"},"B7C864459BFF203EB350083DF74EC8544C81B872":{"name":"Pipe Color Code, 52% OFF | www.elevate.in","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.iQcjFVQGXU1_xT4Gk_J_XwHaE4?pid=Api","datePublished":"2023-11-25T21:21:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.cralloys.com/wp-content/uploads/CRA-Color-Code-Chart-API5CRA-768x506.jpg","hostPageUrl":"https://www.elevate.in/?w=pipe-color-code-cc-KX4nKOIJ","contentSize":"59879 B","width":768,"height":506,"cDNContentUrl":"https://th.bing.com/th/id/R.8907231554065d4d7fc53e0693f27f5f?rik=e4xGVLn%2fAuM7BQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"278B18C4458CE47FD380053BE302FFB954468C7B","accentColor":"C60404"},"5D9F28A04789DB0A63B6468988AA07B5A8F05546":{"name":"Bombay Stock Exchange (BSE) introduces new functionality to prevent ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.Lb0pKhJg4ep-ibnm1PQ3kAHaFI?pid=Api","datePublished":"2015-01-03T11:44:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://akm-img-a-in.tosshub.com/indiatoday/images/story/201501/bse1-new291_650_010315040645.jpg","hostPageUrl":"https://www.indiatoday.in/education-today/gk-current-affairs/story/bombay-stock-exchange-bse-introduces-new-functionality-to-prevent-self-trades-233971-2015-01-03","contentSize":"32915 B","width":650,"height":451,"cDNContentUrl":"https://th.bing.com/th/id/R.2dbd292a1260e1ea7e89b9e6d4f43790?rik=1fmCCnSYvaA2aw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"64550F8A5B70AA8898646B36A0BD98740A82F9D5","accentColor":"0871B2"},"ACDBA774E3B357650EEA932D4A17BB77D24DD1B5":{"name":"HS codes RAILWAY OR TRAMWAY LOCOMOTIVES, ROLLING STOCK, TRACK FIXTURES ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.bHNDTpwccJdYlyfyotRbUwHaAy?pid=Api","datePublished":"2018-12-05T13:30:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://howtoexportimport.com/image/logo3.jpg","hostPageUrl":"https://howtoexportimport.com/HS-codes-RAILWAY-OR-TRAMWAY-LOCOMOTIVES-ROLLING-ST-793.aspx","contentSize":"30529 B","width":935,"height":100,"cDNContentUrl":"https://th.bing.com/th/id/R.6c73434e9c1c7097589727f2a2d45b53?rik=yr16Rz47dVbgrg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"5B1DD42D77BB71A4D239AEE056753B3E477ABDCA","accentColor":"9A6C31"},"CEC35F57C9C42BA9B9856C3E884D931D60E34F5C":{"name":"ChatGPT using Open AI solves coding problems for free, may put jobs of ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.k3aI7X_-UPorL4jxpYC1VwHaEK?pid=Api","datePublished":"2022-12-02T09:54:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://akm-img-a-in.tosshub.com/indiatoday/images/story/202212/coding_reuters-sixteen_nine.jpg?VersionId=BB7A90pJLxZgcqT5KFCUhs6vkBSI3Dul&size=690:388","hostPageUrl":"https://www.indiatoday.in/technology/features/story/chatgpt-using-open-ai-solves-coding-problems-for-free-may-put-jobs-of-many-coders-at-risk-in-future-2304491-2022-12-02","contentSize":"50798 B","width":690,"height":388,"cDNContentUrl":"https://th.bing.com/th/id/R.937688ed7ffe50fa2b2f88f1a580b557?rik=7Dz1dZxMspqbWA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"C5F43E06D139D488E3C6589B9AB24C9C75F53CEC","accentColor":"63C10A"},"84BC421301E96C45EBA23EBA88C107934D79CD2F":{"name":"Cybersecurity Alert: 8 Malicious NPM Packages Target Windows Chrome Users","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.PDK7HGnRpWTKAVIJJvGC1wHaE8?pid=Api","datePublished":"2025-09-01T13:50:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://blogs.npav.net/media/magefan_blog/Malicious_NPM_packages_targeting_Windows_Chrome_users_with_obfuscated_code_1_.png","hostPageUrl":"https://blogs.npav.net/blogs/post/cybersecurity-alert-8-malicious-npm-packages-target-windows-chrome-users","contentSize":"275326 B","width":499,"height":333,"cDNContentUrl":"https://th.bing.com/th/id/R.3c32bb1c69d1a564ca01520926f182d7?rik=SMskMRCexlS%2bKg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"F2DC97D439701C88ABE32ABE54C69E103124CB48","accentColor":"017CC4"},"80B2FBDA68A4038E6C9ECCB8C0423135D3F74A14":{"name":"Tally Customization. Tally.ERP 9 Sales, Support, Implementation ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.0-JwBE5OUXbIN174DhhT1wHaFj?pid=Api","datePublished":"2019-12-28T12:54:00.0000000Z","isFamilyFriendly":true,"contentUrl":"http://www.aaplautomation.com/tally_img/1351583508sBalance-Sheet-Normal-View.jpg","hostPageUrl":"http://www.aaplautomation.com/tally_addons-modules.php","contentSize":"88682 B","width":800,"height":600,"cDNContentUrl":"https://th.bing.com/th/id/R.d3e270044e4e5176c8375ef80e1853d7?rik=CCu%2frYZKMOjG6Q&riu=http%3a%2f%2fwww.aaplautomation.com%2ftally_img%2f1351583508sBalance-Sheet-Normal-View.jpg&ehk=qlrFqSMZ0SQpYJ5n3XcZjLvVQeJtj73LndypNsiY3ZQ%3d&risl=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"41A47F3D5313240C8BCCE9C6E8304A86ADBF2B08","accentColor":"2F9F2C"},"0B9F6D7214F11872BCF75E6E4A5B0B6AD55966B9":{"name":"Don’t share OTPs or scan random QR codes - 9 checks for cyber-safety of ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.9gov2lrQUjVUImx1IQkS8wHaFj?pid=Api","datePublished":"2021-04-23T07:34:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://img.etimg.com/thumb/msid-82211175,width-640,resizemode-4,imgsize-40728/dont-share-otps-or-scan-random-qr-codes.jpg","hostPageUrl":"https://economictimes.indiatimes.com/wealth/save/9-checks-for-cyber-safety-of-your-money-in-todays-digital-world/dont-share-otps-or-scan-random-qr-codes/slideshow/82211175.cms","contentSize":"41540 B","width":640,"height":480,"cDNContentUrl":"https://th.bing.com/th/id/R.f60a2fda5ad0523554226c75210912f3?rik=sPnWJ0EfgSfLfw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"9B66955DA6B0B5A4E6E57FCB27811F4127D6F9B0","accentColor":"934D38"},"4D07379CA31A6C6998056C3E884D931D60E34F5C":{"name":"ChatGPT using Open AI solves coding problems for free, may put jobs of ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.qN46d45NBSpsBlv3ebq1cgHaEK?pid=Api","datePublished":"2022-12-02T09:54:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://akm-img-a-in.tosshub.com/indiatoday/images/story/202212/coding_reuters-sixteen_nine.jpg?VersionId=BB7A90pJLxZgcqT5KFCUhs6vkBSI3Dul","hostPageUrl":"https://www.indiatoday.in/technology/features/story/chatgpt-using-open-ai-solves-coding-problems-for-free-may-put-jobs-of-many-coders-at-risk-in-future-2304491-2022-12-02","contentSize":"97998 B","width":1200,"height":675,"cDNContentUrl":"https://th.bing.com/th/id/R.a8de3a778e4d052a6c065bf779bab572?rik=1HBzyTqhxpaJUA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"C5F43E06D139D488E3C6508996C6A13AC97370D4","accentColor":"65C407"},"7AE21C8217AD82F7FF083256FB741CA9BF37853E":{"name":"Version C of Conficker worm to get going on April 1! | TopNews","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.xpkmMWjOChorpRAqyUPpBgAAAA?pid=Api","datePublished":"2022-11-16T04:17:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://topnews.in/files/Conficker-Version-C.jpg","hostPageUrl":"https://topnews.in/version-c-conficker-worm-get-going-april-1-2144211","contentSize":"45210 B","width":377,"height":358,"cDNContentUrl":"https://th.bing.com/th/id/R.c699263168ce0a1a2ba5102ac943e906?rik=py7BKHHaKH%2f%2fgA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E35873FB9AC147BF652380FF7F28DA7128C12EA7","accentColor":"8BBC0F"},"51723D99E5EC35D0AF31932D4A17BB77D24DD1B5":{"name":"HS codes RAILWAY OR TRAMWAY LOCOMOTIVES, ROLLING STOCK, TRACK FIXTURES ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.0CwwjumjJ5NTqSJsBMTU2AAAAA?pid=Api","datePublished":"2018-12-05T13:30:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://howtoexportimport.com/image/logo1.jpg","hostPageUrl":"https://howtoexportimport.com/HS-codes-RAILWAY-OR-TRAMWAY-LOCOMOTIVES-ROLLING-ST-793.aspx","contentSize":"18793 B","width":116,"height":100,"cDNContentUrl":"https://th.bing.com/th/id/R.d02c308ee9a3279353a9226c04c4d4d8?rik=FSfTmV7OUw36Ew&pid=ImgRaw&r=0","isTransparent":false,"imageId":"5B1DD42D77BB71A4D23913FA0D53CE5E99D32715","accentColor":"0B58C0"},"5326031391430FB886B69A1DEA745F95A190AABE":{"name":"Sutlej Textiles and Industries | Photo Gallery of Awards, Events, CSR ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.D-f8Vk28hAKDx17R4_CeHQHaFS?pid=Api","datePublished":"2021-09-09T16:44:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.sutlejtextiles.com/images/ctm/ctm9.jpg","hostPageUrl":"https://www.sutlejtextiles.com/photo-gallery.html","contentSize":"132034 B","width":1024,"height":731,"cDNContentUrl":"https://th.bing.com/th/id/R.0fe7fc564dbc840283c75ed1e3f09e1d?rik=NWIwMRk08Itoaw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"EBAA091A59F547AED1A96B688BF0341931306235","accentColor":"B21922"},"89AA331643955065D4EF9A1DEA745F95A190AABE":{"name":"Sutlej","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.e8nUq3sPS0KJ8mRxffJQugHaFS?pid=Api","datePublished":"2021-02-27T03:38:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.sutlejtextiles.com/images/btm/btm5.jpg","hostPageUrl":"https://sutlejtextiles.com/photo-gallery.html","contentSize":"201047 B","width":1024,"height":731,"cDNContentUrl":"https://th.bing.com/th/id/R.7bc9d4ab7b0f4b4289f264717df250ba?rik=mKozYTRZBVZN%2fg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"EBAA091A59F547AED1A9FE4D560559346133AA98","accentColor":"802D33"},"80CDA079F10CA64323AE9A1DEA745F95A190AABE":{"name":"Sutlej Textiles and Industries | Photo Gallery of Awards, Events, CSR ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.dnrzpDCSCDFSwWIJS1BwEAHaFS?pid=Api","datePublished":"2021-09-09T16:44:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.sutlejtextiles.com/images/ctm/ctm19.jpg","hostPageUrl":"https://www.sutlejtextiles.com/photo-gallery.html","contentSize":"135836 B","width":1024,"height":731,"cDNContentUrl":"https://th.bing.com/th/id/R.767af3a43092083152c162094b507010?rik=CNwKlx%2fAajQy6g&pid=ImgRaw&r=0","isTransparent":false,"imageId":"EBAA091A59F547AED1A9EA32346AC01F970ADC08","accentColor":"306F80"},"59E1B0454E6A2EBDA66A9A1DEA745F95A190AABE":{"name":"Sutlej Textiles and Industries | Photo Gallery of Awards, Events, CSR ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.2Y8euhkKFKwKV95ap5VQawHaEK?pid=Api","datePublished":"2021-09-09T16:44:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.sutlejtextiles.com/images/rtm/rtm43.jpg","hostPageUrl":"https://www.sutlejtextiles.com/photo-gallery.html","contentSize":"376360 B","width":1024,"height":576,"cDNContentUrl":"https://th.bing.com/th/id/R.d98f1eba190a14ac0a57de5aa795506b?rik=lR4LVOSm4ttqpg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"EBAA091A59F547AED1A9A66ADBE2A6E4540B1E95","accentColor":"476028"},"516447B9C9EE50B4C66B9A1DEA745F95A190AABE":{"name":"Sutlej Textiles and Industries | Photo Gallery of Awards, Events, CSR ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.N3_s4zuHuIzgyDAXMQLEcgHaE8?pid=Api","datePublished":"2021-09-09T16:44:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.sutlejtextiles.com/images/daman/daman7.jpg","hostPageUrl":"https://www.sutlejtextiles.com/photo-gallery.html","contentSize":"79979 B","width":1024,"height":683,"cDNContentUrl":"https://th.bing.com/th/id/R.377fece33b87b88ce0c830173102c472?rik=FUZ0m5zuBUtstg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"EBAA091A59F547AED1A9B66C4B05EE9C9B744615","accentColor":"747556"},"826FA406F06DF31AA3859A1DEA745F95A190AABE":{"name":"Sutlej","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.RCOEqiPhL7HDJ9891YDhlAHaFS?pid=Api","datePublished":"2021-02-27T03:38:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.sutlejtextiles.com/images/ctm/ctm56.jpg","hostPageUrl":"https://sutlejtextiles.com/photo-gallery.html","contentSize":"127367 B","width":1024,"height":731,"cDNContentUrl":"https://th.bing.com/th/id/R.442384aa23e12fb1c327df3dd580e194?rik=KPZKYA%2fWP6E6WA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"EBAA091A59F547AED1A9583AA13FD60F604AF628","accentColor":"716A5A"},"762558A4C705FA7302619A1DEA745F95A190AABE":{"name":"Sutlej Textiles and Industries | Photo Gallery of Awards, Events, CSR ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.jLO1tgMPPTyuRFl-FndszQHaE8?pid=Api","datePublished":"2021-09-09T16:44:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.sutlejtextiles.com/images/rtm/rtm36.jpg","hostPageUrl":"https://www.sutlejtextiles.com/photo-gallery.html","contentSize":"111444 B","width":1024,"height":683,"cDNContentUrl":"https://th.bing.com/th/id/R.8cb3b5b6030f3d3cae44597e16776ccd?rik=Z1KFSnxQrzcgFg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"EBAA091A59F547AED1A9162037AF507C4A855267","accentColor":"C55506"},"DD09057243CD3F3F896E47CB942DD7448EC9975F":{"name":"Upcoming Events | Sutlej Textiles and Industries Limited","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.QPSAHoOA9IS2Lhs_ngY9WAHaFT?pid=Api","datePublished":"2020-02-15T09:38:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.sutlejtextiles.com/images/heimtextil2019eventimg1.jpg","hostPageUrl":"https://www.sutlejtextiles.com/event.html","contentSize":"62915 B","width":562,"height":403,"cDNContentUrl":"https://th.bing.com/th/id/R.40f4801e8380f484b62e1b3f9e063d58?rik=3ZBQJzTc8%2fOY5g&pid=ImgRaw&r=0","isTransparent":false,"imageId":"F5799CE8447DD249BC74E698F3F3DC34275090DD","accentColor":"A27529"},"B82B46F25E5FA80A00819A1DEA745F95A190AABE":{"name":"Sutlej","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.Nwiwgrf6FumP20ZAr5oSBwHaE8?pid=Api","datePublished":"2021-02-27T03:38:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.sutlejtextiles.com/images/daman/daman8.jpg","hostPageUrl":"https://sutlejtextiles.com/photo-gallery.html","contentSize":"109671 B","width":1024,"height":683,"cDNContentUrl":"https://th.bing.com/th/id/R.3708b082b7fa16e98fdb4640af9a1207?rik=i7JkL%2bX1iqAAGA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"EBAA091A59F547AED1A91800A08AF5E52F64B28B","accentColor":"693D3D"},"6C14288533AEAD4D4ED49A1DEA745F95A190AABE":{"name":"Sutlej Textiles and Industries | Photo Gallery of Awards, Events, CSR ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.jEhgXgFu4iTg2x9QGYSJnwHaE8?pid=Api","datePublished":"2021-09-09T16:44:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.sutlejtextiles.com/images/daman/daman3.jpg","hostPageUrl":"https://www.sutlejtextiles.com/photo-gallery.html","contentSize":"95821 B","width":1024,"height":683,"cDNContentUrl":"https://th.bing.com/th/id/R.8c48605e016ee224e0db1f501984899f?rik=xkGCWDPq2tTkTQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"EBAA091A59F547AED1A94DE4D4DAEA33588241C6","accentColor":"0E6ABD"},"2C2E45C40F47F05640C97C0A725F4F35248CD58C":{"name":"Innovative Yarn Manufacturers | Melange Yarn Producers in India","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.GRfbWYGhPS47t82H3ZvPRAHaE8?pid=Api","datePublished":"2020-10-28T18:54:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.sutlejtextiles.com/images/yarn-faclities-img.jpg","hostPageUrl":"https://www.sutlejtextiles.com/innovation.html","contentSize":"47186 B","width":570,"height":381,"cDNContentUrl":"https://th.bing.com/th/id/R.1917db5981a13d2e3bb7cd87dd9bcf44?rik=wuJUTPB0D2UEnA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"C85DC84253F4F527A0C79C04650F74F04C54E2C2","accentColor":"06188B"}},"relatedSearches":[{"text":"Malicious QR Code","displayText":"Malicious QR Code","webSearchUrl":"https://www.bing.com/images/search?q=Malicious+QR+Code&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5494.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malicious+QR+Code","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Malicious+QR+Code&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malicious Meaning","displayText":"Malicious Meaning","webSearchUrl":"https://www.bing.com/images/search?q=Malicious+Meaning&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5496.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malicious+Meaning","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Malicious+Meaning&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Types of Malicious Code","displayText":"Types of Malicious Code","webSearchUrl":"https://www.bing.com/images/search?q=Types+of+Malicious+Code&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5498.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Types+of+Malicious+Code","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Types+of+Malicious+Code&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malicious Definition","displayText":"Malicious Definition","webSearchUrl":"https://www.bing.com/images/search?q=Malicious+Definition&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5500.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malicious+Definition","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Malicious+Definition&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malicious Site","displayText":"Malicious Site","webSearchUrl":"https://www.bing.com/images/search?q=Malicious+Site&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5502.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malicious+Site","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Malicious+Site&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malicious Code Icon","displayText":"Malicious Code Icon","webSearchUrl":"https://www.bing.com/images/search?q=Malicious+Code+Icon&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5504.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malicious+Code+Icon","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Malicious+Code+Icon&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malicious Code Sample","displayText":"Malicious Code Sample","webSearchUrl":"https://www.bing.com/images/search?q=Malicious+Code+Sample&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5506.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malicious+Code+Sample","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Malicious+Code+Sample&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Examples of Malicious Code","displayText":"Examples of Malicious Code","webSearchUrl":"https://www.bing.com/images/search?q=Examples+of+Malicious+Code&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5508.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Examples+of+Malicious+Code","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Examples+of+Malicious+Code&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malicious Code Attack","displayText":"Malicious Code Attack","webSearchUrl":"https://www.bing.com/images/search?q=Malicious+Code+Attack&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5510.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malicious+Code+Attack","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Malicious+Code+Attack&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malicious Virus Code","displayText":"Malicious Virus Code","webSearchUrl":"https://www.bing.com/images/search?q=Malicious+Virus+Code&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5512.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malicious+Virus+Code","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Malicious+Virus+Code&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Computer Malicious Code","displayText":"Computer Malicious Code","webSearchUrl":"https://www.bing.com/images/search?q=Computer+Malicious+Code&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5514.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Computer+Malicious+Code","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Computer+Malicious+Code&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malicious Adware","displayText":"Malicious Adware","webSearchUrl":"https://www.bing.com/images/search?q=Malicious+Adware&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5516.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malicious+Adware","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Malicious+Adware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Mobile Malicious Code","displayText":"Mobile Malicious Code","webSearchUrl":"https://www.bing.com/images/search?q=Mobile+Malicious+Code&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5518.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Mobile+Malicious+Code","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Mobile+Malicious+Code&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malicious File","displayText":"Malicious File","webSearchUrl":"https://www.bing.com/images/search?q=Malicious+File&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5520.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malicious+File","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Malicious+File&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malicious Code Certificate","displayText":"Malicious Code Certificate","webSearchUrl":"https://www.bing.com/images/search?q=Malicious+Code+Certificate&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5522.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malicious+Code+Certificate","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Malicious+Code+Certificate&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malicious Behavior","displayText":"Malicious Behavior","webSearchUrl":"https://www.bing.com/images/search?q=Malicious+Behavior&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5524.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malicious+Behavior","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Malicious+Behavior&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"What Is Malicious","displayText":"What Is Malicious","webSearchUrl":"https://www.bing.com/images/search?q=What+Is+Malicious&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5526.1","searchLink":"https://www.bing.com/api/v7/images/search?q=What+Is+Malicious","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=What+Is+Malicious&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malware Access","displayText":"Malware Access","webSearchUrl":"https://www.bing.com/images/search?q=Malware+Access&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5528.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+Access","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Malware+Access&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"How to Spot Malicious Code","displayText":"How to Spot Malicious Code","webSearchUrl":"https://www.bing.com/images/search?q=How+to+Spot+Malicious+Code&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5530.1","searchLink":"https://www.bing.com/api/v7/images/search?q=How+to+Spot+Malicious+Code","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=How+to+Spot+Malicious+Code&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"No Malicious Code Certificate","displayText":"No Malicious Code Certificate","webSearchUrl":"https://www.bing.com/images/search?q=No+Malicious+Code+Certificate&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5532.1","searchLink":"https://www.bing.com/api/v7/images/search?q=No+Malicious+Code+Certificate","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=No+Malicious+Code+Certificate&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Impact of Malicious Code","displayText":"Impact of Malicious Code","webSearchUrl":"https://www.bing.com/images/search?q=Impact+of+Malicious+Code&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5534.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Impact+of+Malicious+Code","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Impact+of+Malicious+Code&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malicious Code Journal","displayText":"Malicious Code Journal","webSearchUrl":"https://www.bing.com/images/search?q=Malicious+Code+Journal&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5536.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malicious+Code+Journal","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Malicious+Code+Journal&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malicious Python Code","displayText":"Malicious Python Code","webSearchUrl":"https://www.bing.com/images/search?q=Malicious+Python+Code&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5538.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malicious+Python+Code","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Malicious+Python+Code&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malicious Software Removal Tool","displayText":"Malicious Software Removal Tool","webSearchUrl":"https://www.bing.com/images/search?q=Malicious+Software+Removal+Tool&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5540.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malicious+Software+Removal+Tool","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Malicious+Software+Removal+Tool&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Cyber Malicious Code","displayText":"Cyber Malicious Code","webSearchUrl":"https://www.bing.com/images/search?q=Cyber+Malicious+Code&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5542.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Cyber+Malicious+Code","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Cyber+Malicious+Code&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malicious Code Cartoon","displayText":"Malicious Code Cartoon","webSearchUrl":"https://www.bing.com/images/search?q=Malicious+Code+Cartoon&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5544.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malicious+Code+Cartoon","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Malicious+Code+Cartoon&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malicious Code Detection","displayText":"Malicious Code Detection","webSearchUrl":"https://www.bing.com/images/search?q=Malicious+Code+Detection&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5546.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malicious+Code+Detection","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Malicious+Code+Detection&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malicious Code Meme","displayText":"Malicious Code Meme","webSearchUrl":"https://www.bing.com/images/search?q=Malicious+Code+Meme&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5548.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malicious+Code+Meme","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Malicious+Code+Meme&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malicious Websites","displayText":"Malicious Websites","webSearchUrl":"https://www.bing.com/images/search?q=Malicious+Websites&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5550.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malicious+Websites","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Malicious+Websites&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Execution of Malicious Code","displayText":"Execution of Malicious Code","webSearchUrl":"https://www.bing.com/images/search?q=Execution+of+Malicious+Code&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5552.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Execution+of+Malicious+Code","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Execution+of+Malicious+Code&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Trojan Horse Malicious Code","displayText":"Trojan Horse Malicious Code","webSearchUrl":"https://www.bing.com/images/search?q=Trojan+Horse+Malicious+Code&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5554.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Trojan+Horse+Malicious+Code","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Trojan+Horse+Malicious+Code&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Zombie Malicious Code","displayText":"Zombie Malicious Code","webSearchUrl":"https://www.bing.com/images/search?q=Zombie+Malicious+Code&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5556.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Zombie+Malicious+Code","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Zombie+Malicious+Code&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malicious Code Certificate Format","displayText":"Malicious Code Certificate Format","webSearchUrl":"https://www.bing.com/images/search?q=Malicious+Code+Certificate+Format&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5558.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malicious+Code+Certificate+Format","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Malicious+Code+Certificate+Format&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malicious Behaviour","displayText":"Malicious Behaviour","webSearchUrl":"https://www.bing.com/images/search?q=Malicious+Behaviour&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5560.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malicious+Behaviour","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Malicious+Behaviour&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malicious Code On Ai","displayText":"Malicious Code On Ai","webSearchUrl":"https://www.bing.com/images/search?q=Malicious+Code+On+Ai&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5562.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malicious+Code+On+Ai","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Malicious+Code+On+Ai&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malicious Defenition","displayText":"Malicious Defenition","webSearchUrl":"https://www.bing.com/images/search?q=Malicious+Defenition&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5564.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malicious+Defenition","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Malicious+Defenition&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Website Contains Malicious Code","displayText":"Website Contains Malicious Code","webSearchUrl":"https://www.bing.com/images/search?q=Website+Contains+Malicious+Code&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5566.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Website+Contains+Malicious+Code","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Website+Contains+Malicious+Code&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malicious Code Logo","displayText":"Malicious Code Logo","webSearchUrl":"https://www.bing.com/images/search?q=Malicious+Code+Logo&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5568.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malicious+Code+Logo","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Malicious+Code+Logo&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Sample Malicious Code Policy PDF","displayText":"Sample Malicious Code Policy PDF","webSearchUrl":"https://www.bing.com/images/search?q=Sample+Malicious+Code+Policy+PDF&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5570.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Sample+Malicious+Code+Policy+PDF","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Sample+Malicious+Code+Policy+PDF&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malicious Error","displayText":"Malicious Error","webSearchUrl":"https://www.bing.com/images/search?q=Malicious+Error&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5572.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malicious+Error","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Malicious+Error&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"How Malicious Code Works","displayText":"How Malicious Code Works","webSearchUrl":"https://www.bing.com/images/search?q=How+Malicious+Code+Works&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5574.1","searchLink":"https://www.bing.com/api/v7/images/search?q=How+Malicious+Code+Works","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=How+Malicious+Code+Works&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Defending Against Malicious Code","displayText":"Defending Against Malicious Code","webSearchUrl":"https://www.bing.com/images/search?q=Defending+Against+Malicious+Code&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5576.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Defending+Against+Malicious+Code","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Defending+Against+Malicious+Code&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Define Malicious","displayText":"Define Malicious","webSearchUrl":"https://www.bing.com/images/search?q=Define+Malicious&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5578.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Define+Malicious","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Define+Malicious&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Non-Malicious","displayText":"Non-Malicious","webSearchUrl":"https://www.bing.com/images/search?q=Non-Malicious&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5580.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Non-Malicious","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Non-Malicious&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malicious Code Threats","displayText":"Malicious Code Threats","webSearchUrl":"https://www.bing.com/images/search?q=Malicious+Code+Threats&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5582.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malicious+Code+Threats","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Malicious+Code+Threats&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Prevention of Malicious Code","displayText":"Prevention of Malicious Code","webSearchUrl":"https://www.bing.com/images/search?q=Prevention+of+Malicious+Code&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5584.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Prevention+of+Malicious+Code","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Prevention+of+Malicious+Code&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malicious Intent","displayText":"Malicious Intent","webSearchUrl":"https://www.bing.com/images/search?q=Malicious+Intent&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5586.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malicious+Intent","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Malicious+Intent&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malicious Code Delivered","displayText":"Malicious Code Delivered","webSearchUrl":"https://www.bing.com/images/search?q=Malicious+Code+Delivered&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5588.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malicious+Code+Delivered","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Malicious+Code+Delivered&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malicious Country","displayText":"Malicious Country","webSearchUrl":"https://www.bing.com/images/search?q=Malicious+Country&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5590.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malicious+Country","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Malicious+Country&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malicious Code Malware Ransomware","displayText":"Malicious Code Malware Ransomware","webSearchUrl":"https://www.bing.com/images/search?q=Malicious+Code+Malware+Ransomware&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5592.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malicious+Code+Malware+Ransomware","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Malicious+Code+Malware+Ransomware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}}],"createdate":1769821081506}
[curl_error] =>
[product_name_used] => Malicious-Code-Stock
[parsed] => Array
(
[name] => malicious-code-stock inr loc:in
[totalEstimatedMatches] => 65
[nextOffset] => 64
[currentOffset] => 0
[value] => Array
(
[D675F3DDAFAB0C234EB4C2CE3441F58E0ED3B905] => Array
(
[name] => What is Malicious Code? | Malicious Code Definition
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.WYSOYzD17z0uJTBqcIVNBwHaEL?pid=Api
[datePublished] => 2017-07-03T23:42:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.kaspersky.co.in/content/en-in/images/repository/isc/2017-images/malicious-programs-img-03.jpg
[hostPageUrl] => https://www.kaspersky.co.in/resource-center/definitions/malicious-code
[contentSize] => 63667 B
[width] => 710
[height] => 400
[cDNContentUrl] => https://th.bing.com/th/id/R.59848e6330f5ef3d2e25306a70854d07?rik=bVc%2f3fq6wDLkSw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 509B3DE0E85F1443EC2C4BE432C0BAFADD3F576D
[accentColor] => 0E9DBD
)
[6D0D795BCEBEF10089A69983BA209720B9CB687B] => Array
(
[name] => Threat actors are injecting malicious codes into legitimate crypto projects
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.QAdRBXpE42Spym33OSJyqQHaEK?pid=Api
[datePublished] => 2025-04-13T17:16:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.cryptopolitan.com/wp-content/uploads/2025/04/Malicious-actors-are-injecting-malicious-codes-into-legitimate-crypto-projects.webp
[hostPageUrl] => https://cryptopanic.com/news/21056641/Threat-actors-are-injecting-malicious-codes-into-legitimate-crypto-projects
[contentSize] => 97080 B
[width] => 1280
[height] => 720
[cDNContentUrl] => https://th.bing.com/th/id/R.400751057a44e364a9ca6df7392272a9?rik=1tCXtezrHwCYag&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => B786BC9B027902AB38996A98001FEBECB597D0D6
[accentColor] => 090053
)
[BDF111DB0BFD5CB462A789A2B36B0C4E57C04B18] => Array
(
[name] => Identifying Malicious Code Through Reverse Engineering: Buy Identifying ...
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.FQ61-UFjfJABjFZgdEpImgAAAA?pid=Api
[datePublished] => 2022-04-25T07:38:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => http://rukmini1.flixcart.com/image/300/300/k95yhzk0/book/2/4/1/identifying-malicious-code-through-reverse-engineering-original-imafryr7zhzu8thb.jpeg
[hostPageUrl] => https://www.flipkart.com/identifying-malicious-code-through-reverse-engineering/p/itmfbdrjmdnwwyzm
[contentSize] => 30246 B
[width] => 183
[height] => 300
[cDNContentUrl] => https://th.bing.com/th/id/R.150eb5f941637c90018c5660744a489a?rik=2x8RvbDfxUsmeg&riu=http%3a%2f%2frukmini1.flixcart.com%2fimage%2f300%2f300%2fk95yhzk0%2fbook%2f2%2f4%2f1%2fidentifying-malicious-code-through-reverse-engineering-original-imafryr7zhzu8thb.jpeg&ehk=L0SAiQYiuh5yfFOyNSDMvSE6%2bkjb%2bW5GN2OXKF%2fjJS4%3d&risl=&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 81B40C75E4C0B63B2A987A264BC5DFB0BD111FDB
[accentColor] => 169FB5
)
[AACEB3087C4718BDDED3C2CE3441F58E0ED3B905] => Array
(
[name] => What is Malicious Code? | Malicious Code Definition
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.BIb4B4j0XiyGcdr9kWgYaAAAAA?pid=Api
[datePublished] => 2017-07-03T23:42:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://d3kwb303vesg1m.cloudfront.net/se/media/rc/side-banner-coin.gif
[hostPageUrl] => https://www.kaspersky.co.in/resource-center/definitions/malicious-code
[contentSize] => 111703 B
[width] => 300
[height] => 600
[proxyContentUrl] => https://tse2.mm.bing.net/th/id/OGC.0486f80788f45e2c8671dafd91681868?pid=Api&rurl=https%3a%2f%2fd3kwb303vesg1m.cloudfront.net%2fse%2fmedia%2frc%2fside-banner-coin.gif&ehk=uVsUSnm3%2b2PfiE1B9HMvMqXXaMytKgn3TDV17axbpzA%3d
[cDNContentUrl] => https://th.bing.com/th/id/R.0486f80788f45e2c8671dafd91681868?rik=quw7gMd0gdvtPQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 509B3DE0E85F1443EC2C3DEDDB8174C7803BECAA
[accentColor] => 118DBA
)
[46476997C228B5552ED18051E3EE5DB336DB43BD] => Array
(
[name] => Recent Cases of Watering Hole Attacks, Part 2
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.JlnDW6KhwXnPIXOEpjaWQQHaFU?pid=Api
[datePublished] => 2024-12-26T03:29:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://blogs.jpcert.or.jp/en/.assets/watering_hole_attack_2023_2-fig3.png
[hostPageUrl] => https://sechub.in/view/2992590
[contentSize] => 129010 B
[width] => 948
[height] => 680
[cDNContentUrl] => https://th.bing.com/th/id/R.2659c35ba2a1c179cf217384a6369641?rik=ZHSWeSyCW1XiHQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => DB34BD633BD5EE3E15081DE2555B822C79967464
[accentColor] => C90202
)
[09DB81A498D738B8DFE260CD4BA227ABC94099E1] => Array
(
[name] => Anti-Rootkit and Remediation Technology | Kaspersky
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.Lk4laaUHf-Sb_IXp1J8ykQHaEg?pid=Api
[datePublished] => 2021-03-05T18:04:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.kaspersky.com/content/en-global/enterprise-security/wiki-section/img/Anti-Rootkit-and-Remediation-Technology-1.png
[hostPageUrl] => https://www.kaspersky.co.in/enterprise-security/wiki-section/products/anti-rootkit-and-remediation-technology
[contentSize] => 90273 B
[width] => 1030
[height] => 626
[cDNContentUrl] => https://th.bing.com/th/id/R.2e4e2569a5077fe49bfc85e9d49f3291?rik=kL0YSol9g4v9Lg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 1E99049CBA722AB4DC062EFD8B837D894A18BD90
[accentColor] => 051515
)
[0E6D3C5A9305A4586FBA721EF0537DD25BF970B0] => Array
(
[name] => Ransomware Malicious Code in Python: Buy Ransomware Malicious Code in ...
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.xGisKz_NGJQlG9hwZf4AeAAAAA?pid=Api
[datePublished] => 2022-09-08T18:48:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => http://rukmini1.flixcart.com/image/300/300/jl9rf680/book/5/0/4/ransomware-malicious-code-in-python-original-imaf8f78cwddxyza.jpeg
[hostPageUrl] => https://www.flipkart.com/ransomware-malicious-code-python/p/itmf8dqg4duq8g6u
[contentSize] => 20275 B
[width] => 200
[height] => 300
[cDNContentUrl] => https://th.bing.com/th/id/R.c468ac2b3fcd1894251bd87065fe0078?rik=4NbDpTlQSoX2qw&riu=http%3a%2f%2frukmini1.flixcart.com%2fimage%2f300%2f300%2fjl9rf680%2fbook%2f5%2f0%2f4%2fransomware-malicious-code-in-python-original-imaf8f78cwddxyza.jpeg&ehk=KVxL2OHsvuG8EEDwZHsBXOgCedH9P0vvH28rGd3mZ7o%3d&risl=&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 0B079FB52DD7350FE127ABF6854A5039A5C3D6E0
[accentColor] => 416B8A
)
[D4397559FCE796FF50CEECA5D6F3EC4792EDA0F3] => Array
(
[name] => Cyber Swachhta Kendra: ViperSoftX Malware
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.adD0Jn-IwOMiTP6oqhE32AHaHJ?pid=Api
[datePublished] => 2023-05-03T14:18:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.csk.gov.in/image/other/execution_Vipersoftx.png
[hostPageUrl] => https://www.csk.gov.in/alerts/Vipersoftx.html
[contentSize] => 792729 B
[width] => 1600
[height] => 1545
[cDNContentUrl] => https://th.bing.com/th/id/R.69d0f4267f88c0e3224cfea8aa1137d8?rik=TZNXlc9%2baf8F7A&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 3F0ADE2974CE3F6D5ACEEC05FF697ECF9557934D
[accentColor] => 9C432F
)
[D3020992BAF810C61B388051E3EE5DB336DB43BD] => Array
(
[name] => Recent Cases of Watering Hole Attacks, Part 2
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.DG9PI_M5gY_E0GYShINmBQHaJ2?pid=Api
[datePublished] => 2024-12-26T03:29:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://blogs.jpcert.or.jp/en/.assets/watering_hole_attack_2023_2-fig2.png
[hostPageUrl] => https://sechub.in/view/2992590
[contentSize] => 324401 B
[width] => 963
[height] => 1280
[cDNContentUrl] => https://th.bing.com/th/id/R.0c6f4f23f339818fc4d0661284836605?rik=PSCQKauPAWyxgw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => DB34BD633BD5EE3E150883B16C018FAB2990203D
[accentColor] => 317B9A
)
[D5DD861B15CC71ECCAAA5D64BC1B2D55DE641809] => Array
(
[name] => ChatGPT can be used to generate malicious code, finds research
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.91L2GAWbzkRqA7J_v_8oQwHaD3?pid=Api
[datePublished] => 2022-12-20T11:29:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://assets.techcircle.in/uploads/article-image/2022/12/images/31508-183673683-l.png
[hostPageUrl] => https://www.techcircle.in/2022/12/20/chatgpt-can-be-used-to-generate-malicious-code-finds-research
[contentSize] => 94997 B
[width] => 640
[height] => 334
[cDNContentUrl] => https://th.bing.com/th/id/R.f752f618059bce446a03b27fbfff2843?rik=Xd1osVHMF86sqg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 908146ED55D2B1CB46D5AAACCE17CC51B168DD5D
[accentColor] => 964C35
)
[FBBA25DC4541BEE3DF36CF050ED7FA6203038484] => Array
(
[name] => Russian Hackers Are Writing Malicious Codes On ChatGPT To Hack Your ...
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.2Ut9lueyZgAbU33W_8gXtAHaEF?pid=Api
[datePublished] => 2023-01-16T05:24:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://sm.mashable.com/mashable_in/photo/default/aaa_fsgn.jpg
[hostPageUrl] => https://in.mashable.com/tech/45450/russian-hackers-are-writing-malicious-codes-on-chatgpt-to-hack-your-personal-data
[contentSize] => 122768 B
[width] => 1062
[height] => 585
[cDNContentUrl] => https://th.bing.com/th/id/R.d94b7d96e7b266001b537dd6ffc817b4?rik=v6tSzVQU6z79Yw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 4848303026AF7DE050FC63FD3EEB1454CD52ABBF
[accentColor] => A53226
)
[869E9C463E372A1907B58051E3EE5DB336DB43BD] => Array
(
[name] => Recent Cases of Watering Hole Attacks, Part 2
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.wwockrAuP-5fs8YyhNIinwHaEC?pid=Api
[datePublished] => 2024-12-26T03:29:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://blogs.jpcert.or.jp/en/.assets/watering_hole_attack_2023_2-fig5.png
[hostPageUrl] => https://sechub.in/view/2992590
[contentSize] => 496149 B
[width] => 1280
[height] => 698
[cDNContentUrl] => https://th.bing.com/th/id/R.c30a1c92b02e3fee5fb3c63284d2229f?rik=aOnJZONzopFwWw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => DB34BD633BD5EE3E15085B7091A273E364C9E968
[accentColor] => BA9111
)
[74B66EC7FE4D1FE9C6D686A62D41B58011929C1F] => Array
(
[name] => Scanning a suspicious QR code? Beware! Check these tips | Tech News (HT ...
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.MLDmM-tpXHLO0v0_l2HzXAHaEK?pid=Api
[datePublished] => 2022-01-13T10:17:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://images.hindustantimes.com/tech/img/2022/01/13/1600x900/HK-LEGCO-3_1642068986048_1642069015157.jpg
[hostPageUrl] => https://tech.hindustantimes.com/tech/news/scanning-a-suspicious-qr-code-beware-check-these-tips-71642068765382.html
[contentSize] => 299240 B
[width] => 1600
[height] => 900
[cDNContentUrl] => https://th.bing.com/th/id/R.30b0e633eb695c72ced2fd3f9761f35c?rik=R2vmfO%2fU8Z5sbQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => F1C92911085B14D26A686D6C9EF1D4EF7CE66B47
[accentColor] => 326B6D
)
[1D132821D274836F4C7C692378EE2BEEFC459312] => Array
(
[name] => Recent Cases of Watering Hole Attacks, Part 1
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.otyeIFbyEfXiAZR5a2qp3gHaDf?pid=Api
[datePublished] => 2024-12-19T02:55:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://blogs.jpcert.or.jp/en/.assets/watering_hole_attack_2023_1-fig3.png
[hostPageUrl] => https://sechub.in/view/2989271
[contentSize] => 275236 B
[width] => 1280
[height] => 603
[cDNContentUrl] => https://th.bing.com/th/id/R.a2dc9e2056f211f5e20194796b6aa9de?rik=0TGCEi1HOPbExw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 213954CFEEB2EE873296C7C4F638472D128231D1
[accentColor] => C70404
)
[B6C229296AFF952E23C97079731461AC4E99BDC0] => Array
(
[name] => QR code scams on the rise during festive celebrations; here’s how to be ...
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.C2-G72OwRH2Y9ft6GGMCCAHaEK?pid=Api
[datePublished] => 2023-11-11T16:26:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://akm-img-a-in.tosshub.com/businesstoday/images/story/202311/dmvyfg65kzmohjcfw2u6miig6u-sixteen_nine.jpg?size=948:533
[hostPageUrl] => https://www.businesstoday.in/technology/news/story/qr-code-scams-on-the-rise-during-festive-celebrations-heres-how-to-be-safe-405472-2023-11-11
[contentSize] => 53329 B
[width] => 948
[height] => 533
[cDNContentUrl] => https://th.bing.com/th/id/R.0b6f86ef63b0447d98f5fb7a18630208?rik=ayySkqb%2fWeIynA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 0CDB99E4CA16413797079C32E259FFA692922C6B
[accentColor] => A82332
)
[00FC758869F6486C54A2F1E5CE54D45D11E0F257] => Array
(
[name] => IIT HARYANA
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.7ho5_DA_vHiWyT3pcuiTXQHaEK?pid=Api
[datePublished] => 2025-03-16T15:40:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.udacity.com/blog/wp-content/uploads/2020/06/HTML_Blog-scaled.jpeg
[hostPageUrl] => https://www.iithry.org.in/
[contentSize] => 361798 B
[width] => 2560
[height] => 1440
[cDNContentUrl] => https://th.bing.com/th/id/R.ee1a39fc303fbc7896c93de972e8935d?rik=AM9XiJZvhMZFKg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 752F0E11D54D45EC5E1F2A45C6846F968857CF00
[accentColor] => 0F6FBC
)
[07DB04BEA4A2B140DA63CF050ED7FA6203038484] => Array
(
[name] => Russian Hackers Are Writing Malicious Codes On ChatGPT To Hack Your ...
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.pa3lzc4GN69Sq5M1hEdoCQHaEe?pid=Api
[datePublished] => 2023-01-16T05:24:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://sm.mashable.com/t/mashable_in/photo/default/a-4_u3yt.1248.jpg
[hostPageUrl] => https://in.mashable.com/tech/45450/russian-hackers-are-writing-malicious-codes-on-chatgpt-to-hack-your-personal-data
[contentSize] => 100935 B
[width] => 1248
[height] => 754
[cDNContentUrl] => https://th.bing.com/th/id/R.a5ade5cdce0637af52ab933584476809?rik=cL1A60oqGwStNg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 4848303026AF7DE050FC36AD041B2A4AEB40BD70
[accentColor] => 034961
)
[AA2CD736D4B332A11ABBC6794B5295D5A34087C4] => Array
(
[name] => Hackers are using ChatGPT to create malware to steal your money - India ...
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.SkgvQMMcZV6MYkcBW2jYkQHaEK?pid=Api
[datePublished] => 2023-01-10T06:40:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://akm-img-a-in.tosshub.com/indiatoday/images/story/202301/chatgpt_code-sixteen_nine.jpg?VersionId=t9wxU0udqOYpoMwSfz7lRkDMYv0XaecT&size=690:388
[hostPageUrl] => https://www.indiatoday.in/technology/news/story/hackers-are-using-chatgpt-to-create-malware-to-steal-your-money-2319565-2023-01-10
[contentSize] => 35536 B
[width] => 690
[height] => 388
[cDNContentUrl] => https://th.bing.com/th/id/R.4a482f40c31c655e8c6247015b68d891?rik=qsJ9Y007Ixqhuw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 4C78043A5D5925B4976CBBA11A233B4D637DC2AA
[accentColor] => 62BE0D
)
[1B277822CB4D1317A4C75BE74630C5B7402DE2F3] => Array
(
[name] => Hacking vs Ethical Hacking: Check Key Differences and Similarities
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.tCw96pH8d49m1j70IWP9wAHaEK?pid=Api
[datePublished] => 2022-11-03T05:43:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://img.jagranjosh.com/images/2022/November/3112022/hacking.webp
[hostPageUrl] => https://www.jagranjosh.com/general-knowledge/hacking-vs-ethical-hacking-check-key-differences-and-similarities-1667455060-1
[contentSize] => 39638 B
[width] => 1200
[height] => 675
[cDNContentUrl] => https://th.bing.com/th/id/R.b42c3dea91fc778f66d63ef42163fdc0?rik=sXKHIrzUMXFKfA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 3F2ED2047B5C03647EB57C4A7131D4BC228772B1
[accentColor] => C20909
)
[5CC7A2C7A5CEBC6048822C1721CC16E8645DE5FE] => Array
(
[name] => Explained: How Gautam Adani v/s Hindenburg saga has unfolded so far ...
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP._GajpLXOOBOmWoQkFmsMdwHaFS?pid=Api
[datePublished] => 2023-02-02T16:41:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://static.toiimg.com/thumb/imgsize-23456,msid-97558808,width-600,resizemode-4/97558808.jpg
[hostPageUrl] => https://timesofindia.indiatimes.com/business/india-business/explainer-how-adani-v/s-hindenburg-saga-has-unfolded-so-far/articleshow/97558775.cms
[contentSize] => 26325 B
[width] => 600
[height] => 428
[cDNContentUrl] => https://th.bing.com/th/id/R.fc66a3a4b5ce3813a65a8424166b0c77?rik=xXwqfFrsywaEKA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => EF5ED5468E61CC1271C2288406CBEC5A7C2A7CC5
[accentColor] => 9C722F
)
[0FDFE076358E05A35F2DA1AEFDF2046707FC8D39] => Array
(
[name] => Dealing With Malware & Hacked Sites: And The SEO Factor
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.kynYJ5z9vpxOYBR2KJBbaAHaC9?pid=Api
[datePublished] => 2012-01-29T18:54:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.webaholic.co.in/wp-content/uploads/2012/01/obfuscated-script.png
[hostPageUrl] => https://www.webaholic.co.in/blog/dealing-with-malware-and-hacked-sites/
[contentSize] => 12432 B
[width] => 581
[height] => 232
[cDNContentUrl] => https://th.bing.com/th/id/R.9329d8279cfdbe9c4e60147628905b68?rik=8P0OZ1PoUDr10g&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 93D8CF7076402FDFEA1AD2F53A50E853670EFDF0
[accentColor] => 7A6551
)
[5E8F08F9EBDA553F6FCDCA9674C38C7CBC19A95B] => Array
(
[name] => Delhi: Scammers use malicious QR codes to dupe online sellers while ...
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.GpW__b2TjOyGv1LXjIF2_QHaEK?pid=Api
[datePublished] => 2020-09-03T23:10:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://akm-img-a-in.tosshub.com/indiatoday/images/story/202009/QR_code__PTI__1200x768.jpeg?size=690:388
[hostPageUrl] => https://www.indiatoday.in/crime/story/delhi-scammers-use-malicious-qr-codes-to-dupe-online-sellers-while-posing-as-army-men-1718415-2020-09-03
[contentSize] => 76126 B
[width] => 690
[height] => 388
[cDNContentUrl] => https://th.bing.com/th/id/R.1a95bffdbd938cec86bf52d78c8176fd?rik=5fiAn76tVfP23A&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => B59A91CBC7C83C4769ACDCF6F355ADBE9F80F8E5
[accentColor] => AC801F
)
[C7CF7566AF88B312A112E5FEE56E71DF7751B0F2] => Array
(
[name] => Fake Facebook profiles: Hackers posed as flirtatious women to target ...
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.0h2_OcnFjkmamALXac2rtQHaEK?pid=Api
[datePublished] => 2022-04-07T12:50:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://images.hindustantimes.com/tech/img/2022/04/07/1600x900/BCOEEUL7IVI55CUNHEWSDL4ZEE_1649308452988_1649308484715.jpg
[hostPageUrl] => https://tech.hindustantimes.com/tech/news/fake-facebook-profiles-hackers-posed-as-flirtatious-women-to-target-israeli-officials-71649304659003.html
[contentSize] => 207840 B
[width] => 1600
[height] => 900
[cDNContentUrl] => https://th.bing.com/th/id/R.d21dbf39c9c58e499a9802d769cdabb5?rik=fPxXZvqIOyEaIQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 2F0B1577FD17E65EEF5E211A213B88FA6657FC7C
[accentColor] => 076B18
)
[C819D0E6A0A40AD788532C6FAB6328A73DDC124B] => Array
(
[name] => How to protect your Samsung Smart TV from Hacking and Malicious Code ...
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.4voJnttVb4L9HVrSf-4LGAHaEK?pid=Api
[datePublished] => 2018-06-10T15:25:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://images.samsung.com/is/image/samsung/assets/in/support/tv-audio-video/how-to-protect-your-samsung-smart-tv-from-hacking-and-malicious-code/364.jpg
[hostPageUrl] => https://www.samsung.com/in/support/tv-audio-video/how-to-protect-your-samsung-smart-tv-from-hacking-and-malicious-code/
[contentSize] => 12195 B
[width] => 567
[height] => 319
[cDNContentUrl] => https://th.bing.com/th/id/R.e2fa099edb556f82fd1d5ad27fee0b18?rik=jJENbgpKoH2INQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => B421CDD37A8236BAF6C235887DA04A0A6E0D918C
[accentColor] => 0E60AF
)
[57A1A46B942A4E5BBFAA2C6FAB6328A73DDC124B] => Array
(
[name] => How to protect your Samsung Smart TV from Hacking and Malicious Code ...
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP._YnNuG95tgOFpN_-NON4SQHaEK?pid=Api
[datePublished] => 2018-06-10T15:25:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://images.samsung.com/is/image/samsung/assets/in/support/tv-audio-video/how-to-protect-your-samsung-smart-tv-from-hacking-and-malicious-code/308.jpg
[hostPageUrl] => https://www.samsung.com/in/support/tv-audio-video/how-to-protect-your-samsung-smart-tv-from-hacking-and-malicious-code/
[contentSize] => 19941 B
[width] => 567
[height] => 319
[cDNContentUrl] => https://th.bing.com/th/id/R.fd89cdb86f79b60385a4dffe34e37849?rik=dRpKtkmi5LX7qg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => B421CDD37A8236BAF6C2AAFBB5E4A249B64A1A75
[accentColor] => C89A03
)
[08C025375CBB959BA1372C6FAB6328A73DDC124B] => Array
(
[name] => How to protect your Samsung Smart TV from Hacking and Malicious Code ...
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.E5u-qKD9yv-7oRBFb14krAHaEK?pid=Api
[datePublished] => 2018-06-10T15:25:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://images.samsung.com/is/image/samsung/assets/in/support/tv-audio-video/how-to-protect-your-samsung-smart-tv-from-hacking-and-malicious-code/362.jpg
[hostPageUrl] => https://www.samsung.com/in/support/tv-audio-video/how-to-protect-your-samsung-smart-tv-from-hacking-and-malicious-code/
[contentSize] => 14536 B
[width] => 567
[height] => 319
[cDNContentUrl] => https://th.bing.com/th/id/R.139bbea8a0fdcaffbba110456f5e24ac?rik=gAxSc8W7Wbkacw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => B421CDD37A8236BAF6C2731AB959BBC573520C80
[accentColor] => 1063AF
)
[FCF0BFEA2CAECB03C1AE85E8EB1E105EAB6E819B] => Array
(
[name] => Indian FinTech Ecosystem: Key Challenges and How To Deal With It ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.GJ9yiJDiUMb8Vkr0mhrnAQHaEy?pid=Api
[datePublished] => 2020-03-02T12:43:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://cisomag.com/wp-content/uploads/2019/09/shutterstock_1451268602.jpg
[hostPageUrl] => https://community.nasscom.in/communities/digital-transformation/bfsi/indian-fintech-ecosytem-key-challenges-and-how-to-deal-with-it.html
[contentSize] => 94613 B
[width] => 800
[height] => 517
[cDNContentUrl] => https://th.bing.com/th/id/R.189f728890e250c6fc564af49a1ae701?rik=zw%2f7rsLqvDAc6g&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => B918E6BAE501E1BE8E58EA1C30BCEAC2AEFB0FCF
[accentColor] => C29909
)
[2B9194DC5CD2EF5E42FC1CAC3DB74A2612354086] => Array
(
[name] => Email still significant channel for malicious attacks: Forcepoint ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.ts2xePWXZ2YUGmuWmIEw2QHaDI?pid=Api
[datePublished] => 2022-11-28T07:53:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.itnext.in/sites/default/files/_article_images/cio/malicious%20file%20formats.png
[hostPageUrl] => https://www.itnext.in/article/2016/04/29/email-still-significant-channel-malicious-attacks-forcepoint-report
[contentSize] => 14816 B
[width] => 702
[height] => 297
[cDNContentUrl] => https://th.bing.com/th/id/R.b6cdb178f5976766141a6b96988130d9?rik=shlJzcUt%2fuUkzw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 6804532162A47BD3CAC1CF24E5FE2DC5CD4919B2
[accentColor] => 283BA3
)
[5DED8C96846236F0BA44D85F45F21E847982B139] => Array
(
[name] => chart activity of virus computer photo chahiye - Brainly.in
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.pXmKmAYgNiFmU-ZyzFh-MQHaEK?pid=Api
[datePublished] => 2022-06-10T07:01:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://hi-static.z-dn.net/files/d9e/dea963f1318baeaf8d92621296ebc38b.png
[hostPageUrl] => https://brainly.in/question/52325767
[contentSize] => 160548 B
[width] => 1366
[height] => 768
[cDNContentUrl] => https://th.bing.com/th/id/R.a5798a98062036216653e672cc587e31?rik=1d7IaUgmYw%2brRA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 931B289748E12F54F58D44AB0F63264869C8DED5
[accentColor] => C09F0B
)
[CB50A0A0190917350D0B938060D5797FB675395C] => Array
(
[name] => Leverage Virtual - Home
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.IUYtcPQFCANaaiA6ULbfwQHaE7?pid=Api
[datePublished] => 2022-06-07T04:01:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://img1.wsimg.com/isteam/stock/gAEJr51
[hostPageUrl] => https://leveragevirtual.com/
[contentSize] => 159749 B
[width] => 1255
[height] => 836
[cDNContentUrl] => https://th.bing.com/th/id/R.21462d70f40508035a6a203a50b6dfc1?rik=vAUKCpGQcVPQsA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => C593576BF7975D060839B0D0537190910A0A05BC
[accentColor] => 377D93
)
[E58B06E01711E663FD628DE9BA02707DA8C335D5] => Array
(
[name] => Cyber Crime in India: Types of Cyber Crime, Impact & Safety Tips
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.WDmH0WfwpOZtIwqyaHrY9gHaFj?pid=Api
[datePublished] => 2020-11-26T12:55:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://okcredit-blog-images-prod.storage.googleapis.com/2020/11/cyber4-1.jpg
[hostPageUrl] => https://okcredit.in/blog/growth-of-cyber-crime-in-india/
[contentSize] => 147219 B
[width] => 2000
[height] => 1500
[cDNContentUrl] => https://th.bing.com/th/id/R.583987d167f0a4e66d230ab2687ad8f6?rik=XrhgDnERbjbfJg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 5D533C8AD70720AB9ED826DF366E11710E60B85E
[accentColor] => 000745
)
[1B199EA8386060DBBEDDC63EFD6B2C2DD99C018D] => Array
(
[name] => Garena Free Fire Max: Redeem Codes for July 11, 2025, Available Now ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.Hlm21IcVVZNPtu4rVt3okAHaEK?pid=Api
[datePublished] => 2025-07-11T04:20:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://sm.ign.com/t/ign_in/screenshot/default/free-fire-max-loading_ngzx.1280.jpg
[hostPageUrl] => https://in.ign.com/garena-free-fire/235970/guide/garena-free-fire-max-redeem-codes-11-2025-available-now
[contentSize] => 188415 B
[width] => 1200
[height] => 675
[cDNContentUrl] => https://th.bing.com/th/id/R.1e59b6d4871555934fb6ee2b56dde890?rik=sZHpioMGBr3r3Q&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => D810C99DD2C2B6DFE36CDDEBBD0606838AE991B1
[accentColor] => 1B77B0
)
[EF1C15B25AC942873A402D307D82FF74093C3564] => Array
(
[name] => what is computer virus? - Brainly.in
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.8ycEjpCZLx76whW_7wjBQgHaD6?pid=Api
[datePublished] => 2022-06-27T11:00:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://hi-static.z-dn.net/files/d78/0887e16034ffa810812c7913dccc7ce7.jpg
[hostPageUrl] => https://brainly.in/question/52652559
[contentSize] => 42135 B
[width] => 720
[height] => 380
[cDNContentUrl] => https://th.bing.com/th/id/R.f327048e90992f1efac215bfef08c142?rik=%2fsFRK6WcJHijBA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 4653C39047FF28D703D204A378249CA52B51C1FE
[accentColor] => 545658
)
[4D2D3A53C626033ECE40A52173447DFBB0866762] => Array
(
[name] => Download wallpaper 3840x2160 code, programming, text, lines, symbols ...
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.hcFv1ib657elvGRa0bS8ZwHaEK?pid=Api
[datePublished] => 2019-06-15T20:10:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://images.wallpaperscraft.com/image/single/code_programming_text_141192_3840x2160.jpg
[hostPageUrl] => https://wallpaperscraft.com/download/code_programming_text_141192/3840x2160
[contentSize] => 1024249 B
[width] => 3840
[height] => 2160
[cDNContentUrl] => https://th.bing.com/th/id/R.85c16fd626fae7b7a5bc645ad1b4bc67?rik=1NKjNWxiMOPsBA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 2676680BBFD74437125A04ECE330626C35A3D2D4
[accentColor] => 31769A
)
[68188A58D05EE48020E525E08EEB369879F08A24] => Array
(
[name] => Print Invoice with HSN/SAC in TallyPrime
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.q7ipgEroGdEacJ04IstePQHaG3?pid=Api
[datePublished] => 2022-01-14T01:52:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://help.tallysolutions.com/wp-content/uploads/2020/09/stock-item-gst-details-screen-tally.gif
[hostPageUrl] => https://vedcrm.vedantsoft.in/knowledge-base/article/print-invoice-with-hsn-sac-in-tallyprime
[contentSize] => 18946 B
[width] => 592
[height] => 549
[cDNContentUrl] => https://th.bing.com/th/id/R.abb8a9804ae819d11a709d3822cb5e3d?rik=hoGohQ3lTggCXg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 42A80F978963BEE80E525E02084EE50D85A88186
[accentColor] => 326E99
)
[21BF4F800E787A49FF4A14F9A48D7C7B96BFFCC6] => Array
(
[name] => Garena Free Fire Redeem Codes for April 14: Unlock exclusive goodies ...
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.ak0mvB4rGP8lIE4fOhEXQwHaEK?pid=Api
[datePublished] => 2024-04-14T02:59:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://images.hindustantimes.com/tech/img/2022/05/27/960x540/055_1653612384612_1653612405025.jpg
[hostPageUrl] => https://tech.hindustantimes.com/gaming/news/garena-free-fire-redeem-codes-for-april-14-unlock-exclusive-goodies-today-like-weapons-character-skins-and-more-71713007782897.html
[contentSize] => 163502 B
[width] => 960
[height] => 540
[cDNContentUrl] => https://th.bing.com/th/id/R.6a4d26bc1e2b18ff25204e1f3a111743?rik=Evv0COCHp5T%2fpA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 6CCFFB69B7C7D84A9F41A4FF94A787E008F4FB12
[accentColor] => 2E759D
)
[2A4E99F02456D9F31C7D0081446E3E0ED5463657] => Array
(
[name] => Tutorial At Home
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.blE3Aohpz5-4bSx_JKkMWwAAAA?pid=Api
[datePublished] => 2018-08-14T13:17:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.tutorialathome.in/postimg/2020/10/python-lucas-series.jpg
[hostPageUrl] => https://www.tutorialathome.in/physics/acceleration-retardation
[contentSize] => 67456 B
[width] => 400
[height] => 267
[cDNContentUrl] => https://th.bing.com/th/id/R.6e5137028869cf9fb86d2c7f24a90c5b?rik=ouSZD0JlnT%2fB1w&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 7563645DE0E3E6441800D7C13F9D65420F99E4A2
[accentColor] => 009DCC
)
[ABC25073B8D056DF371395BE0070F6FBF7C82BD1] => Array
(
[name] => Garena Free Fire MAX Redeem Codes for June 17: FREE in-game rewards ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.AyEjyUY1Sc_uHfad3krKAAHaEK?pid=Api
[datePublished] => 2023-06-17T00:48:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://images.hindustantimes.com/tech/img/2023/06/17/1600x900/Garena_Free_Fire_MAX_codes_1686962767149_1686962767354.jpg
[hostPageUrl] => https://tech.hindustantimes.com/tech/news/garena-free-fire-max-redeem-codes-for-june-17-free-in-game-rewards-coming-your-way-71686962679364.html
[contentSize] => 413450 B
[width] => 1600
[height] => 900
[cDNContentUrl] => https://th.bing.com/th/id/R.032123c9463549cfee1df69dde4aca00?rik=uiwFN4sNZf1zMQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 1DB28C7FBF6F0700EB593173FD650D8B37052CBA
[accentColor] => 6D303D
)
[5AE804CB19138E6E355F08DF4FF0A51AA469DE78] => Array
(
[name] => React App
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.Ql-Swn-AlLYpBW5zs3oFyQHaEx?pid=Api
[datePublished] => 2021-11-22T17:42:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => http://nativetechies.in/Images/Python.jpg
[hostPageUrl] => http://nativetechies.in/
[contentSize] => 109124 B
[width] => 1378
[height] => 888
[cDNContentUrl] => https://th.bing.com/th/id/R.425f92c27f8094b629056e73b37a05c9?rik=pY5AvJEx6OZT9Q&riu=http%3a%2f%2fnativetechies.in%2fImages%2fPython.jpg&ehk=Enj4VVGwnhEHbiO1%2f7X29sLXZw2lTB0%2fyq7p5WDIna8%3d&risl=&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 87ED964AA15A0FF4FD80F553E6E83191BC408EA5
[accentColor] => 0073CC
)
[B85652E1B36000FE7D886923492066ABF8CFF5DB] => Array
(
[name] => Royal Blue Scrub Suit for Doctors Price, Information and Pictures
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.B0bjSCd24ld3ZhmZin78cAHaHa?pid=Api
[datePublished] => 2020-06-21T22:15:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.meddeal.in/image/cache/catalog/product/scrub-suit-royal-blue-664x664.jpg
[hostPageUrl] => https://www.meddeal.in/scrub-suit-for-doctors-royal-blue.html
[contentSize] => 36934 B
[width] => 664
[height] => 664
[cDNContentUrl] => https://th.bing.com/th/id/R.0746e3482776e257776619998a7efc70?rik=i2UlHjsGAO%2fXiA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => BD5FFC8FBA660294329688D7EF00063B1E25658B
[accentColor] => 233377
)
[0D05BA59511348D025B7B24A05451B82433574B4] => Array
(
[name] => Download wallpaper 1920x1080 code, programming, text, lines, symbols ...
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.DZgtXO7f3xJWtlWF6a7Q2AHaEK?pid=Api
[datePublished] => 2019-06-18T22:46:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://images.wallpaperscraft.com/image/single/code_programming_text_141192_1920x1080.jpg
[hostPageUrl] => https://wallpaperscraft.com/download/code_programming_text_141192/1920x1080
[contentSize] => 211123 B
[width] => 1920
[height] => 1080
[cDNContentUrl] => https://th.bing.com/th/id/R.0d982d5ceedfdf1256b65585e9aed0d8?rik=0FCrlRUxhA1Sew&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 4B47533428B15450A42B7B520D84311595AB50D0
[accentColor] => 327799
)
[E8B3BBEC4037DFBC0297D0C635703778E6A8B6DD] => Array
(
[name] => How to deal with the office gossipmonger | Femina.in
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.5sm8V4Bfv8UmTdhdaMMm_AHaE8?pid=Api
[datePublished] => 2016-10-25T19:17:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://femina.wwmindia.com/content/2016/Oct/in_1_1477394433.jpg
[hostPageUrl] => https://www.femina.in/life/careers-and-money/how-to-deal-with-the-office-gossipmonger-27553.html
[contentSize] => 23666 B
[width] => 640
[height] => 428
[cDNContentUrl] => https://th.bing.com/th/id/R.e6c9bc57805fbfc5264dd85d68c326fc?rik=jju7zgRz%2fcsgeQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => DD6B8A6E877307536C0D7920CBFD7304CEBB3B8E
[accentColor] => AD1E40
)
[F51E052219F50B24AF7DFB0D5FD6FC98677CE5EB] => Array
(
[name] => Various Google Play ‘Beauty Camera’ Apps Send Users Pornographic ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.kxu3jbcihnZ3KZKwuQXeyQHaB1?pid=Api
[datePublished] => 2025-01-26T21:37:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://blog.trendmicro.com/trendlabs-security-intelligence/files/2019/01/malicious-camera-beauty-apps-2.png
[hostPageUrl] => https://sechub.in/view/1538023
[contentSize] => 8216 B
[width] => 773
[height] => 192
[cDNContentUrl] => https://th.bing.com/th/id/R.931bb78db7228676772992b0b905dec9?rik=X%2bFQIpFfsEL61w&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => BE5EC77689CF6DF5D0BFD7FA42B05F912250E15F
[accentColor] => 0000CC
)
[B7C864459BFF203EB350083DF74EC8544C81B872] => Array
(
[name] => Pipe Color Code, 52% OFF | www.elevate.in
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.iQcjFVQGXU1_xT4Gk_J_XwHaE4?pid=Api
[datePublished] => 2023-11-25T21:21:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.cralloys.com/wp-content/uploads/CRA-Color-Code-Chart-API5CRA-768x506.jpg
[hostPageUrl] => https://www.elevate.in/?w=pipe-color-code-cc-KX4nKOIJ
[contentSize] => 59879 B
[width] => 768
[height] => 506
[cDNContentUrl] => https://th.bing.com/th/id/R.8907231554065d4d7fc53e0693f27f5f?rik=e4xGVLn%2fAuM7BQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 278B18C4458CE47FD380053BE302FFB954468C7B
[accentColor] => C60404
)
[5D9F28A04789DB0A63B6468988AA07B5A8F05546] => Array
(
[name] => Bombay Stock Exchange (BSE) introduces new functionality to prevent ...
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.Lb0pKhJg4ep-ibnm1PQ3kAHaFI?pid=Api
[datePublished] => 2015-01-03T11:44:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://akm-img-a-in.tosshub.com/indiatoday/images/story/201501/bse1-new291_650_010315040645.jpg
[hostPageUrl] => https://www.indiatoday.in/education-today/gk-current-affairs/story/bombay-stock-exchange-bse-introduces-new-functionality-to-prevent-self-trades-233971-2015-01-03
[contentSize] => 32915 B
[width] => 650
[height] => 451
[cDNContentUrl] => https://th.bing.com/th/id/R.2dbd292a1260e1ea7e89b9e6d4f43790?rik=1fmCCnSYvaA2aw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 64550F8A5B70AA8898646B36A0BD98740A82F9D5
[accentColor] => 0871B2
)
[ACDBA774E3B357650EEA932D4A17BB77D24DD1B5] => Array
(
[name] => HS codes RAILWAY OR TRAMWAY LOCOMOTIVES, ROLLING STOCK, TRACK FIXTURES ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.bHNDTpwccJdYlyfyotRbUwHaAy?pid=Api
[datePublished] => 2018-12-05T13:30:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://howtoexportimport.com/image/logo3.jpg
[hostPageUrl] => https://howtoexportimport.com/HS-codes-RAILWAY-OR-TRAMWAY-LOCOMOTIVES-ROLLING-ST-793.aspx
[contentSize] => 30529 B
[width] => 935
[height] => 100
[cDNContentUrl] => https://th.bing.com/th/id/R.6c73434e9c1c7097589727f2a2d45b53?rik=yr16Rz47dVbgrg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 5B1DD42D77BB71A4D239AEE056753B3E477ABDCA
[accentColor] => 9A6C31
)
[CEC35F57C9C42BA9B9856C3E884D931D60E34F5C] => Array
(
[name] => ChatGPT using Open AI solves coding problems for free, may put jobs of ...
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.k3aI7X_-UPorL4jxpYC1VwHaEK?pid=Api
[datePublished] => 2022-12-02T09:54:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://akm-img-a-in.tosshub.com/indiatoday/images/story/202212/coding_reuters-sixteen_nine.jpg?VersionId=BB7A90pJLxZgcqT5KFCUhs6vkBSI3Dul&size=690:388
[hostPageUrl] => https://www.indiatoday.in/technology/features/story/chatgpt-using-open-ai-solves-coding-problems-for-free-may-put-jobs-of-many-coders-at-risk-in-future-2304491-2022-12-02
[contentSize] => 50798 B
[width] => 690
[height] => 388
[cDNContentUrl] => https://th.bing.com/th/id/R.937688ed7ffe50fa2b2f88f1a580b557?rik=7Dz1dZxMspqbWA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => C5F43E06D139D488E3C6589B9AB24C9C75F53CEC
[accentColor] => 63C10A
)
[84BC421301E96C45EBA23EBA88C107934D79CD2F] => Array
(
[name] => Cybersecurity Alert: 8 Malicious NPM Packages Target Windows Chrome Users
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.PDK7HGnRpWTKAVIJJvGC1wHaE8?pid=Api
[datePublished] => 2025-09-01T13:50:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://blogs.npav.net/media/magefan_blog/Malicious_NPM_packages_targeting_Windows_Chrome_users_with_obfuscated_code_1_.png
[hostPageUrl] => https://blogs.npav.net/blogs/post/cybersecurity-alert-8-malicious-npm-packages-target-windows-chrome-users
[contentSize] => 275326 B
[width] => 499
[height] => 333
[cDNContentUrl] => https://th.bing.com/th/id/R.3c32bb1c69d1a564ca01520926f182d7?rik=SMskMRCexlS%2bKg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => F2DC97D439701C88ABE32ABE54C69E103124CB48
[accentColor] => 017CC4
)
[80B2FBDA68A4038E6C9ECCB8C0423135D3F74A14] => Array
(
[name] => Tally Customization. Tally.ERP 9 Sales, Support, Implementation ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.0-JwBE5OUXbIN174DhhT1wHaFj?pid=Api
[datePublished] => 2019-12-28T12:54:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => http://www.aaplautomation.com/tally_img/1351583508sBalance-Sheet-Normal-View.jpg
[hostPageUrl] => http://www.aaplautomation.com/tally_addons-modules.php
[contentSize] => 88682 B
[width] => 800
[height] => 600
[cDNContentUrl] => https://th.bing.com/th/id/R.d3e270044e4e5176c8375ef80e1853d7?rik=CCu%2frYZKMOjG6Q&riu=http%3a%2f%2fwww.aaplautomation.com%2ftally_img%2f1351583508sBalance-Sheet-Normal-View.jpg&ehk=qlrFqSMZ0SQpYJ5n3XcZjLvVQeJtj73LndypNsiY3ZQ%3d&risl=&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 41A47F3D5313240C8BCCE9C6E8304A86ADBF2B08
[accentColor] => 2F9F2C
)
[0B9F6D7214F11872BCF75E6E4A5B0B6AD55966B9] => Array
(
[name] => Don’t share OTPs or scan random QR codes - 9 checks for cyber-safety of ...
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.9gov2lrQUjVUImx1IQkS8wHaFj?pid=Api
[datePublished] => 2021-04-23T07:34:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://img.etimg.com/thumb/msid-82211175,width-640,resizemode-4,imgsize-40728/dont-share-otps-or-scan-random-qr-codes.jpg
[hostPageUrl] => https://economictimes.indiatimes.com/wealth/save/9-checks-for-cyber-safety-of-your-money-in-todays-digital-world/dont-share-otps-or-scan-random-qr-codes/slideshow/82211175.cms
[contentSize] => 41540 B
[width] => 640
[height] => 480
[cDNContentUrl] => https://th.bing.com/th/id/R.f60a2fda5ad0523554226c75210912f3?rik=sPnWJ0EfgSfLfw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 9B66955DA6B0B5A4E6E57FCB27811F4127D6F9B0
[accentColor] => 934D38
)
[4D07379CA31A6C6998056C3E884D931D60E34F5C] => Array
(
[name] => ChatGPT using Open AI solves coding problems for free, may put jobs of ...
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.qN46d45NBSpsBlv3ebq1cgHaEK?pid=Api
[datePublished] => 2022-12-02T09:54:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://akm-img-a-in.tosshub.com/indiatoday/images/story/202212/coding_reuters-sixteen_nine.jpg?VersionId=BB7A90pJLxZgcqT5KFCUhs6vkBSI3Dul
[hostPageUrl] => https://www.indiatoday.in/technology/features/story/chatgpt-using-open-ai-solves-coding-problems-for-free-may-put-jobs-of-many-coders-at-risk-in-future-2304491-2022-12-02
[contentSize] => 97998 B
[width] => 1200
[height] => 675
[cDNContentUrl] => https://th.bing.com/th/id/R.a8de3a778e4d052a6c065bf779bab572?rik=1HBzyTqhxpaJUA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => C5F43E06D139D488E3C6508996C6A13AC97370D4
[accentColor] => 65C407
)
[7AE21C8217AD82F7FF083256FB741CA9BF37853E] => Array
(
[name] => Version C of Conficker worm to get going on April 1! | TopNews
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.xpkmMWjOChorpRAqyUPpBgAAAA?pid=Api
[datePublished] => 2022-11-16T04:17:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://topnews.in/files/Conficker-Version-C.jpg
[hostPageUrl] => https://topnews.in/version-c-conficker-worm-get-going-april-1-2144211
[contentSize] => 45210 B
[width] => 377
[height] => 358
[cDNContentUrl] => https://th.bing.com/th/id/R.c699263168ce0a1a2ba5102ac943e906?rik=py7BKHHaKH%2f%2fgA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => E35873FB9AC147BF652380FF7F28DA7128C12EA7
[accentColor] => 8BBC0F
)
[51723D99E5EC35D0AF31932D4A17BB77D24DD1B5] => Array
(
[name] => HS codes RAILWAY OR TRAMWAY LOCOMOTIVES, ROLLING STOCK, TRACK FIXTURES ...
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.0CwwjumjJ5NTqSJsBMTU2AAAAA?pid=Api
[datePublished] => 2018-12-05T13:30:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://howtoexportimport.com/image/logo1.jpg
[hostPageUrl] => https://howtoexportimport.com/HS-codes-RAILWAY-OR-TRAMWAY-LOCOMOTIVES-ROLLING-ST-793.aspx
[contentSize] => 18793 B
[width] => 116
[height] => 100
[cDNContentUrl] => https://th.bing.com/th/id/R.d02c308ee9a3279353a9226c04c4d4d8?rik=FSfTmV7OUw36Ew&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 5B1DD42D77BB71A4D23913FA0D53CE5E99D32715
[accentColor] => 0B58C0
)
[5326031391430FB886B69A1DEA745F95A190AABE] => Array
(
[name] => Sutlej Textiles and Industries | Photo Gallery of Awards, Events, CSR ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.D-f8Vk28hAKDx17R4_CeHQHaFS?pid=Api
[datePublished] => 2021-09-09T16:44:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.sutlejtextiles.com/images/ctm/ctm9.jpg
[hostPageUrl] => https://www.sutlejtextiles.com/photo-gallery.html
[contentSize] => 132034 B
[width] => 1024
[height] => 731
[cDNContentUrl] => https://th.bing.com/th/id/R.0fe7fc564dbc840283c75ed1e3f09e1d?rik=NWIwMRk08Itoaw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => EBAA091A59F547AED1A96B688BF0341931306235
[accentColor] => B21922
)
[89AA331643955065D4EF9A1DEA745F95A190AABE] => Array
(
[name] => Sutlej
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.e8nUq3sPS0KJ8mRxffJQugHaFS?pid=Api
[datePublished] => 2021-02-27T03:38:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.sutlejtextiles.com/images/btm/btm5.jpg
[hostPageUrl] => https://sutlejtextiles.com/photo-gallery.html
[contentSize] => 201047 B
[width] => 1024
[height] => 731
[cDNContentUrl] => https://th.bing.com/th/id/R.7bc9d4ab7b0f4b4289f264717df250ba?rik=mKozYTRZBVZN%2fg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => EBAA091A59F547AED1A9FE4D560559346133AA98
[accentColor] => 802D33
)
[80CDA079F10CA64323AE9A1DEA745F95A190AABE] => Array
(
[name] => Sutlej Textiles and Industries | Photo Gallery of Awards, Events, CSR ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.dnrzpDCSCDFSwWIJS1BwEAHaFS?pid=Api
[datePublished] => 2021-09-09T16:44:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.sutlejtextiles.com/images/ctm/ctm19.jpg
[hostPageUrl] => https://www.sutlejtextiles.com/photo-gallery.html
[contentSize] => 135836 B
[width] => 1024
[height] => 731
[cDNContentUrl] => https://th.bing.com/th/id/R.767af3a43092083152c162094b507010?rik=CNwKlx%2fAajQy6g&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => EBAA091A59F547AED1A9EA32346AC01F970ADC08
[accentColor] => 306F80
)
[59E1B0454E6A2EBDA66A9A1DEA745F95A190AABE] => Array
(
[name] => Sutlej Textiles and Industries | Photo Gallery of Awards, Events, CSR ...
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.2Y8euhkKFKwKV95ap5VQawHaEK?pid=Api
[datePublished] => 2021-09-09T16:44:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.sutlejtextiles.com/images/rtm/rtm43.jpg
[hostPageUrl] => https://www.sutlejtextiles.com/photo-gallery.html
[contentSize] => 376360 B
[width] => 1024
[height] => 576
[cDNContentUrl] => https://th.bing.com/th/id/R.d98f1eba190a14ac0a57de5aa795506b?rik=lR4LVOSm4ttqpg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => EBAA091A59F547AED1A9A66ADBE2A6E4540B1E95
[accentColor] => 476028
)
[516447B9C9EE50B4C66B9A1DEA745F95A190AABE] => Array
(
[name] => Sutlej Textiles and Industries | Photo Gallery of Awards, Events, CSR ...
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.N3_s4zuHuIzgyDAXMQLEcgHaE8?pid=Api
[datePublished] => 2021-09-09T16:44:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.sutlejtextiles.com/images/daman/daman7.jpg
[hostPageUrl] => https://www.sutlejtextiles.com/photo-gallery.html
[contentSize] => 79979 B
[width] => 1024
[height] => 683
[cDNContentUrl] => https://th.bing.com/th/id/R.377fece33b87b88ce0c830173102c472?rik=FUZ0m5zuBUtstg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => EBAA091A59F547AED1A9B66C4B05EE9C9B744615
[accentColor] => 747556
)
[826FA406F06DF31AA3859A1DEA745F95A190AABE] => Array
(
[name] => Sutlej
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.RCOEqiPhL7HDJ9891YDhlAHaFS?pid=Api
[datePublished] => 2021-02-27T03:38:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.sutlejtextiles.com/images/ctm/ctm56.jpg
[hostPageUrl] => https://sutlejtextiles.com/photo-gallery.html
[contentSize] => 127367 B
[width] => 1024
[height] => 731
[cDNContentUrl] => https://th.bing.com/th/id/R.442384aa23e12fb1c327df3dd580e194?rik=KPZKYA%2fWP6E6WA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => EBAA091A59F547AED1A9583AA13FD60F604AF628
[accentColor] => 716A5A
)
[762558A4C705FA7302619A1DEA745F95A190AABE] => Array
(
[name] => Sutlej Textiles and Industries | Photo Gallery of Awards, Events, CSR ...
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.jLO1tgMPPTyuRFl-FndszQHaE8?pid=Api
[datePublished] => 2021-09-09T16:44:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.sutlejtextiles.com/images/rtm/rtm36.jpg
[hostPageUrl] => https://www.sutlejtextiles.com/photo-gallery.html
[contentSize] => 111444 B
[width] => 1024
[height] => 683
[cDNContentUrl] => https://th.bing.com/th/id/R.8cb3b5b6030f3d3cae44597e16776ccd?rik=Z1KFSnxQrzcgFg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => EBAA091A59F547AED1A9162037AF507C4A855267
[accentColor] => C55506
)
[DD09057243CD3F3F896E47CB942DD7448EC9975F] => Array
(
[name] => Upcoming Events | Sutlej Textiles and Industries Limited
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.QPSAHoOA9IS2Lhs_ngY9WAHaFT?pid=Api
[datePublished] => 2020-02-15T09:38:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.sutlejtextiles.com/images/heimtextil2019eventimg1.jpg
[hostPageUrl] => https://www.sutlejtextiles.com/event.html
[contentSize] => 62915 B
[width] => 562
[height] => 403
[cDNContentUrl] => https://th.bing.com/th/id/R.40f4801e8380f484b62e1b3f9e063d58?rik=3ZBQJzTc8%2fOY5g&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => F5799CE8447DD249BC74E698F3F3DC34275090DD
[accentColor] => A27529
)
[B82B46F25E5FA80A00819A1DEA745F95A190AABE] => Array
(
[name] => Sutlej
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.Nwiwgrf6FumP20ZAr5oSBwHaE8?pid=Api
[datePublished] => 2021-02-27T03:38:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.sutlejtextiles.com/images/daman/daman8.jpg
[hostPageUrl] => https://sutlejtextiles.com/photo-gallery.html
[contentSize] => 109671 B
[width] => 1024
[height] => 683
[cDNContentUrl] => https://th.bing.com/th/id/R.3708b082b7fa16e98fdb4640af9a1207?rik=i7JkL%2bX1iqAAGA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => EBAA091A59F547AED1A91800A08AF5E52F64B28B
[accentColor] => 693D3D
)
[6C14288533AEAD4D4ED49A1DEA745F95A190AABE] => Array
(
[name] => Sutlej Textiles and Industries | Photo Gallery of Awards, Events, CSR ...
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.jEhgXgFu4iTg2x9QGYSJnwHaE8?pid=Api
[datePublished] => 2021-09-09T16:44:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.sutlejtextiles.com/images/daman/daman3.jpg
[hostPageUrl] => https://www.sutlejtextiles.com/photo-gallery.html
[contentSize] => 95821 B
[width] => 1024
[height] => 683
[cDNContentUrl] => https://th.bing.com/th/id/R.8c48605e016ee224e0db1f501984899f?rik=xkGCWDPq2tTkTQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => EBAA091A59F547AED1A94DE4D4DAEA33588241C6
[accentColor] => 0E6ABD
)
[2C2E45C40F47F05640C97C0A725F4F35248CD58C] => Array
(
[name] => Innovative Yarn Manufacturers | Melange Yarn Producers in India
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.GRfbWYGhPS47t82H3ZvPRAHaE8?pid=Api
[datePublished] => 2020-10-28T18:54:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.sutlejtextiles.com/images/yarn-faclities-img.jpg
[hostPageUrl] => https://www.sutlejtextiles.com/innovation.html
[contentSize] => 47186 B
[width] => 570
[height] => 381
[cDNContentUrl] => https://th.bing.com/th/id/R.1917db5981a13d2e3bb7cd87dd9bcf44?rik=wuJUTPB0D2UEnA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => C85DC84253F4F527A0C79C04650F74F04C54E2C2
[accentColor] => 06188B
)
)
[relatedSearches] => Array
(
[0] => Array
(
[text] => Malicious QR Code
[displayText] => Malicious QR Code
[webSearchUrl] => https://www.bing.com/images/search?q=Malicious+QR+Code&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5494.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Malicious+QR+Code
[thumbnail] => Array
(
[thumbnailUrl] => https://tse1.mm.bing.net/th?q=Malicious+QR+Code&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[1] => Array
(
[text] => Malicious Meaning
[displayText] => Malicious Meaning
[webSearchUrl] => https://www.bing.com/images/search?q=Malicious+Meaning&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5496.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Malicious+Meaning
[thumbnail] => Array
(
[thumbnailUrl] => https://tse2.mm.bing.net/th?q=Malicious+Meaning&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[2] => Array
(
[text] => Types of Malicious Code
[displayText] => Types of Malicious Code
[webSearchUrl] => https://www.bing.com/images/search?q=Types+of+Malicious+Code&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5498.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Types+of+Malicious+Code
[thumbnail] => Array
(
[thumbnailUrl] => https://tse4.mm.bing.net/th?q=Types+of+Malicious+Code&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[3] => Array
(
[text] => Malicious Definition
[displayText] => Malicious Definition
[webSearchUrl] => https://www.bing.com/images/search?q=Malicious+Definition&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5500.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Malicious+Definition
[thumbnail] => Array
(
[thumbnailUrl] => https://tse4.mm.bing.net/th?q=Malicious+Definition&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[4] => Array
(
[text] => Malicious Site
[displayText] => Malicious Site
[webSearchUrl] => https://www.bing.com/images/search?q=Malicious+Site&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5502.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Malicious+Site
[thumbnail] => Array
(
[thumbnailUrl] => https://tse4.mm.bing.net/th?q=Malicious+Site&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[5] => Array
(
[text] => Malicious Code Icon
[displayText] => Malicious Code Icon
[webSearchUrl] => https://www.bing.com/images/search?q=Malicious+Code+Icon&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5504.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Malicious+Code+Icon
[thumbnail] => Array
(
[thumbnailUrl] => https://tse3.mm.bing.net/th?q=Malicious+Code+Icon&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[6] => Array
(
[text] => Malicious Code Sample
[displayText] => Malicious Code Sample
[webSearchUrl] => https://www.bing.com/images/search?q=Malicious+Code+Sample&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5506.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Malicious+Code+Sample
[thumbnail] => Array
(
[thumbnailUrl] => https://tse2.mm.bing.net/th?q=Malicious+Code+Sample&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[7] => Array
(
[text] => Examples of Malicious Code
[displayText] => Examples of Malicious Code
[webSearchUrl] => https://www.bing.com/images/search?q=Examples+of+Malicious+Code&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5508.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Examples+of+Malicious+Code
[thumbnail] => Array
(
[thumbnailUrl] => https://tse4.mm.bing.net/th?q=Examples+of+Malicious+Code&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[8] => Array
(
[text] => Malicious Code Attack
[displayText] => Malicious Code Attack
[webSearchUrl] => https://www.bing.com/images/search?q=Malicious+Code+Attack&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5510.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Malicious+Code+Attack
[thumbnail] => Array
(
[thumbnailUrl] => https://tse4.mm.bing.net/th?q=Malicious+Code+Attack&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[9] => Array
(
[text] => Malicious Virus Code
[displayText] => Malicious Virus Code
[webSearchUrl] => https://www.bing.com/images/search?q=Malicious+Virus+Code&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5512.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Malicious+Virus+Code
[thumbnail] => Array
(
[thumbnailUrl] => https://tse3.mm.bing.net/th?q=Malicious+Virus+Code&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[10] => Array
(
[text] => Computer Malicious Code
[displayText] => Computer Malicious Code
[webSearchUrl] => https://www.bing.com/images/search?q=Computer+Malicious+Code&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5514.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Computer+Malicious+Code
[thumbnail] => Array
(
[thumbnailUrl] => https://tse3.mm.bing.net/th?q=Computer+Malicious+Code&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[11] => Array
(
[text] => Malicious Adware
[displayText] => Malicious Adware
[webSearchUrl] => https://www.bing.com/images/search?q=Malicious+Adware&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5516.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Malicious+Adware
[thumbnail] => Array
(
[thumbnailUrl] => https://tse1.mm.bing.net/th?q=Malicious+Adware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[12] => Array
(
[text] => Mobile Malicious Code
[displayText] => Mobile Malicious Code
[webSearchUrl] => https://www.bing.com/images/search?q=Mobile+Malicious+Code&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5518.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Mobile+Malicious+Code
[thumbnail] => Array
(
[thumbnailUrl] => https://tse4.mm.bing.net/th?q=Mobile+Malicious+Code&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[13] => Array
(
[text] => Malicious File
[displayText] => Malicious File
[webSearchUrl] => https://www.bing.com/images/search?q=Malicious+File&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5520.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Malicious+File
[thumbnail] => Array
(
[thumbnailUrl] => https://tse3.mm.bing.net/th?q=Malicious+File&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[14] => Array
(
[text] => Malicious Code Certificate
[displayText] => Malicious Code Certificate
[webSearchUrl] => https://www.bing.com/images/search?q=Malicious+Code+Certificate&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5522.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Malicious+Code+Certificate
[thumbnail] => Array
(
[thumbnailUrl] => https://tse3.mm.bing.net/th?q=Malicious+Code+Certificate&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[15] => Array
(
[text] => Malicious Behavior
[displayText] => Malicious Behavior
[webSearchUrl] => https://www.bing.com/images/search?q=Malicious+Behavior&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5524.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Malicious+Behavior
[thumbnail] => Array
(
[thumbnailUrl] => https://tse3.mm.bing.net/th?q=Malicious+Behavior&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[16] => Array
(
[text] => What Is Malicious
[displayText] => What Is Malicious
[webSearchUrl] => https://www.bing.com/images/search?q=What+Is+Malicious&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5526.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=What+Is+Malicious
[thumbnail] => Array
(
[thumbnailUrl] => https://tse3.mm.bing.net/th?q=What+Is+Malicious&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[17] => Array
(
[text] => Malware Access
[displayText] => Malware Access
[webSearchUrl] => https://www.bing.com/images/search?q=Malware+Access&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5528.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+Access
[thumbnail] => Array
(
[thumbnailUrl] => https://tse4.mm.bing.net/th?q=Malware+Access&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[18] => Array
(
[text] => How to Spot Malicious Code
[displayText] => How to Spot Malicious Code
[webSearchUrl] => https://www.bing.com/images/search?q=How+to+Spot+Malicious+Code&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5530.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=How+to+Spot+Malicious+Code
[thumbnail] => Array
(
[thumbnailUrl] => https://tse3.mm.bing.net/th?q=How+to+Spot+Malicious+Code&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[19] => Array
(
[text] => No Malicious Code Certificate
[displayText] => No Malicious Code Certificate
[webSearchUrl] => https://www.bing.com/images/search?q=No+Malicious+Code+Certificate&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5532.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=No+Malicious+Code+Certificate
[thumbnail] => Array
(
[thumbnailUrl] => https://tse4.mm.bing.net/th?q=No+Malicious+Code+Certificate&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[20] => Array
(
[text] => Impact of Malicious Code
[displayText] => Impact of Malicious Code
[webSearchUrl] => https://www.bing.com/images/search?q=Impact+of+Malicious+Code&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5534.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Impact+of+Malicious+Code
[thumbnail] => Array
(
[thumbnailUrl] => https://tse1.mm.bing.net/th?q=Impact+of+Malicious+Code&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[21] => Array
(
[text] => Malicious Code Journal
[displayText] => Malicious Code Journal
[webSearchUrl] => https://www.bing.com/images/search?q=Malicious+Code+Journal&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5536.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Malicious+Code+Journal
[thumbnail] => Array
(
[thumbnailUrl] => https://tse3.mm.bing.net/th?q=Malicious+Code+Journal&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[22] => Array
(
[text] => Malicious Python Code
[displayText] => Malicious Python Code
[webSearchUrl] => https://www.bing.com/images/search?q=Malicious+Python+Code&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5538.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Malicious+Python+Code
[thumbnail] => Array
(
[thumbnailUrl] => https://tse4.mm.bing.net/th?q=Malicious+Python+Code&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[23] => Array
(
[text] => Malicious Software Removal Tool
[displayText] => Malicious Software Removal Tool
[webSearchUrl] => https://www.bing.com/images/search?q=Malicious+Software+Removal+Tool&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5540.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Malicious+Software+Removal+Tool
[thumbnail] => Array
(
[thumbnailUrl] => https://tse4.mm.bing.net/th?q=Malicious+Software+Removal+Tool&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[24] => Array
(
[text] => Cyber Malicious Code
[displayText] => Cyber Malicious Code
[webSearchUrl] => https://www.bing.com/images/search?q=Cyber+Malicious+Code&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5542.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Cyber+Malicious+Code
[thumbnail] => Array
(
[thumbnailUrl] => https://tse3.mm.bing.net/th?q=Cyber+Malicious+Code&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[25] => Array
(
[text] => Malicious Code Cartoon
[displayText] => Malicious Code Cartoon
[webSearchUrl] => https://www.bing.com/images/search?q=Malicious+Code+Cartoon&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5544.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Malicious+Code+Cartoon
[thumbnail] => Array
(
[thumbnailUrl] => https://tse4.mm.bing.net/th?q=Malicious+Code+Cartoon&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[26] => Array
(
[text] => Malicious Code Detection
[displayText] => Malicious Code Detection
[webSearchUrl] => https://www.bing.com/images/search?q=Malicious+Code+Detection&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5546.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Malicious+Code+Detection
[thumbnail] => Array
(
[thumbnailUrl] => https://tse3.mm.bing.net/th?q=Malicious+Code+Detection&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[27] => Array
(
[text] => Malicious Code Meme
[displayText] => Malicious Code Meme
[webSearchUrl] => https://www.bing.com/images/search?q=Malicious+Code+Meme&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5548.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Malicious+Code+Meme
[thumbnail] => Array
(
[thumbnailUrl] => https://tse4.mm.bing.net/th?q=Malicious+Code+Meme&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[28] => Array
(
[text] => Malicious Websites
[displayText] => Malicious Websites
[webSearchUrl] => https://www.bing.com/images/search?q=Malicious+Websites&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5550.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Malicious+Websites
[thumbnail] => Array
(
[thumbnailUrl] => https://tse3.mm.bing.net/th?q=Malicious+Websites&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[29] => Array
(
[text] => Execution of Malicious Code
[displayText] => Execution of Malicious Code
[webSearchUrl] => https://www.bing.com/images/search?q=Execution+of+Malicious+Code&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5552.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Execution+of+Malicious+Code
[thumbnail] => Array
(
[thumbnailUrl] => https://tse1.mm.bing.net/th?q=Execution+of+Malicious+Code&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[30] => Array
(
[text] => Trojan Horse Malicious Code
[displayText] => Trojan Horse Malicious Code
[webSearchUrl] => https://www.bing.com/images/search?q=Trojan+Horse+Malicious+Code&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5554.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Trojan+Horse+Malicious+Code
[thumbnail] => Array
(
[thumbnailUrl] => https://tse3.mm.bing.net/th?q=Trojan+Horse+Malicious+Code&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[31] => Array
(
[text] => Zombie Malicious Code
[displayText] => Zombie Malicious Code
[webSearchUrl] => https://www.bing.com/images/search?q=Zombie+Malicious+Code&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5556.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Zombie+Malicious+Code
[thumbnail] => Array
(
[thumbnailUrl] => https://tse4.mm.bing.net/th?q=Zombie+Malicious+Code&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[32] => Array
(
[text] => Malicious Code Certificate Format
[displayText] => Malicious Code Certificate Format
[webSearchUrl] => https://www.bing.com/images/search?q=Malicious+Code+Certificate+Format&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5558.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Malicious+Code+Certificate+Format
[thumbnail] => Array
(
[thumbnailUrl] => https://tse4.mm.bing.net/th?q=Malicious+Code+Certificate+Format&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[33] => Array
(
[text] => Malicious Behaviour
[displayText] => Malicious Behaviour
[webSearchUrl] => https://www.bing.com/images/search?q=Malicious+Behaviour&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5560.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Malicious+Behaviour
[thumbnail] => Array
(
[thumbnailUrl] => https://tse2.mm.bing.net/th?q=Malicious+Behaviour&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[34] => Array
(
[text] => Malicious Code On Ai
[displayText] => Malicious Code On Ai
[webSearchUrl] => https://www.bing.com/images/search?q=Malicious+Code+On+Ai&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5562.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Malicious+Code+On+Ai
[thumbnail] => Array
(
[thumbnailUrl] => https://tse1.mm.bing.net/th?q=Malicious+Code+On+Ai&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[35] => Array
(
[text] => Malicious Defenition
[displayText] => Malicious Defenition
[webSearchUrl] => https://www.bing.com/images/search?q=Malicious+Defenition&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5564.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Malicious+Defenition
[thumbnail] => Array
(
[thumbnailUrl] => https://tse4.mm.bing.net/th?q=Malicious+Defenition&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[36] => Array
(
[text] => Website Contains Malicious Code
[displayText] => Website Contains Malicious Code
[webSearchUrl] => https://www.bing.com/images/search?q=Website+Contains+Malicious+Code&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5566.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Website+Contains+Malicious+Code
[thumbnail] => Array
(
[thumbnailUrl] => https://tse4.mm.bing.net/th?q=Website+Contains+Malicious+Code&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[37] => Array
(
[text] => Malicious Code Logo
[displayText] => Malicious Code Logo
[webSearchUrl] => https://www.bing.com/images/search?q=Malicious+Code+Logo&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5568.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Malicious+Code+Logo
[thumbnail] => Array
(
[thumbnailUrl] => https://tse1.mm.bing.net/th?q=Malicious+Code+Logo&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[38] => Array
(
[text] => Sample Malicious Code Policy PDF
[displayText] => Sample Malicious Code Policy PDF
[webSearchUrl] => https://www.bing.com/images/search?q=Sample+Malicious+Code+Policy+PDF&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5570.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Sample+Malicious+Code+Policy+PDF
[thumbnail] => Array
(
[thumbnailUrl] => https://tse2.mm.bing.net/th?q=Sample+Malicious+Code+Policy+PDF&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[39] => Array
(
[text] => Malicious Error
[displayText] => Malicious Error
[webSearchUrl] => https://www.bing.com/images/search?q=Malicious+Error&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5572.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Malicious+Error
[thumbnail] => Array
(
[thumbnailUrl] => https://tse3.mm.bing.net/th?q=Malicious+Error&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[40] => Array
(
[text] => How Malicious Code Works
[displayText] => How Malicious Code Works
[webSearchUrl] => https://www.bing.com/images/search?q=How+Malicious+Code+Works&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5574.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=How+Malicious+Code+Works
[thumbnail] => Array
(
[thumbnailUrl] => https://tse2.mm.bing.net/th?q=How+Malicious+Code+Works&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[41] => Array
(
[text] => Defending Against Malicious Code
[displayText] => Defending Against Malicious Code
[webSearchUrl] => https://www.bing.com/images/search?q=Defending+Against+Malicious+Code&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5576.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Defending+Against+Malicious+Code
[thumbnail] => Array
(
[thumbnailUrl] => https://tse1.mm.bing.net/th?q=Defending+Against+Malicious+Code&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[42] => Array
(
[text] => Define Malicious
[displayText] => Define Malicious
[webSearchUrl] => https://www.bing.com/images/search?q=Define+Malicious&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5578.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Define+Malicious
[thumbnail] => Array
(
[thumbnailUrl] => https://tse2.mm.bing.net/th?q=Define+Malicious&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[43] => Array
(
[text] => Non-Malicious
[displayText] => Non-Malicious
[webSearchUrl] => https://www.bing.com/images/search?q=Non-Malicious&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5580.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Non-Malicious
[thumbnail] => Array
(
[thumbnailUrl] => https://tse3.mm.bing.net/th?q=Non-Malicious&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[44] => Array
(
[text] => Malicious Code Threats
[displayText] => Malicious Code Threats
[webSearchUrl] => https://www.bing.com/images/search?q=Malicious+Code+Threats&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5582.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Malicious+Code+Threats
[thumbnail] => Array
(
[thumbnailUrl] => https://tse1.mm.bing.net/th?q=Malicious+Code+Threats&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[45] => Array
(
[text] => Prevention of Malicious Code
[displayText] => Prevention of Malicious Code
[webSearchUrl] => https://www.bing.com/images/search?q=Prevention+of+Malicious+Code&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5584.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Prevention+of+Malicious+Code
[thumbnail] => Array
(
[thumbnailUrl] => https://tse3.mm.bing.net/th?q=Prevention+of+Malicious+Code&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[46] => Array
(
[text] => Malicious Intent
[displayText] => Malicious Intent
[webSearchUrl] => https://www.bing.com/images/search?q=Malicious+Intent&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5586.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Malicious+Intent
[thumbnail] => Array
(
[thumbnailUrl] => https://tse3.mm.bing.net/th?q=Malicious+Intent&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[47] => Array
(
[text] => Malicious Code Delivered
[displayText] => Malicious Code Delivered
[webSearchUrl] => https://www.bing.com/images/search?q=Malicious+Code+Delivered&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5588.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Malicious+Code+Delivered
[thumbnail] => Array
(
[thumbnailUrl] => https://tse2.mm.bing.net/th?q=Malicious+Code+Delivered&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[48] => Array
(
[text] => Malicious Country
[displayText] => Malicious Country
[webSearchUrl] => https://www.bing.com/images/search?q=Malicious+Country&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5590.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Malicious+Country
[thumbnail] => Array
(
[thumbnailUrl] => https://tse3.mm.bing.net/th?q=Malicious+Country&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[49] => Array
(
[text] => Malicious Code Malware Ransomware
[displayText] => Malicious Code Malware Ransomware
[webSearchUrl] => https://www.bing.com/images/search?q=Malicious+Code+Malware+Ransomware&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5592.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Malicious+Code+Malware+Ransomware
[thumbnail] => Array
(
[thumbnailUrl] => https://tse2.mm.bing.net/th?q=Malicious+Code+Malware+Ransomware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
)
[createdate] => 1769821081506
)
[json_error] => No error
[products_count] => 64
[related_searches_count] => 50
[first_product_sample] => Array
(
[name] => What is Malicious Code? | Malicious Code Definition
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.WYSOYzD17z0uJTBqcIVNBwHaEL?pid=Api
[datePublished] => 2017-07-03T23:42:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.kaspersky.co.in/content/en-in/images/repository/isc/2017-images/malicious-programs-img-03.jpg
[hostPageUrl] => https://www.kaspersky.co.in/resource-center/definitions/malicious-code
[contentSize] => 63667 B
[width] => 710
[height] => 400
[cDNContentUrl] => https://th.bing.com/th/id/R.59848e6330f5ef3d2e25306a70854d07?rik=bVc%2f3fq6wDLkSw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 509B3DE0E85F1443EC2C4BE432C0BAFADD3F576D
[accentColor] => 0E9DBD
)
)
[skipped_products] => Array
(
)
)