http://206.189.178.169:3001/?freshness=All&show=1&q=Ransomware-Us-Linux+INR+loc%3Ain Search: Ransomware Us Linux - Zipri.in

Ransomware Us Linux

Debug Information

Array
(
    [meilisearch] => Array
        (
            [url] => https://msin.fadunews.in/indexes/zipri/search
            [http_code] => 200
            [response] => {"hits":[],"query":"Ransomware-Us-Linux","processingTimeMs":2,"limit":3,"offset":0,"estimatedTotalHits":0}
            [curl_error] => 
            [parsed] => Array
                (
                    [hits] => Array
                        (
                        )

                    [query] => Ransomware-Us-Linux
                    [processingTimeMs] => 2
                    [limit] => 3
                    [offset] => 0
                    [estimatedTotalHits] => 0
                )

        )

    [image_search] => Array
        (
            [url] => http://206.189.178.169:3001/?freshness=All&show=1&q=Ransomware-Us-Linux+INR+loc%3Ain
            [http_code] => 200
            [response] => {"name":"ransomware-us-linux inr loc:in","totalEstimatedMatches":404,"nextOffset":120,"currentOffset":0,"value":{"C459A457D72D70A03ED0501E7FD8964AF9D3B450":{"name":"1 US Dollar to Indian Rupee Today and in 1947 | USD to INR History ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.lXdb_O6fUnFzcP21wOqdUgHaE8?pid=Api","datePublished":"2023-09-29T11:51:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://images.forbesindia.com/blog/wp-content/uploads/media/images/2024/Jan/img_226625_usdollartoindianrupee.jpg","hostPageUrl":"https://www.forbesindia.com/article/explainers/1-usd-to-inr-history/88635/1","contentSize":"128370 B","width":900,"height":600,"cDNContentUrl":"https://th.bing.com/th/id/R.95775bfcee9f52717370fdb5c0ea9d52?rik=TJVKdX3SBwrjDQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"054B3D9FA4698DF7E1050DE30A07D27D754A954C","accentColor":"BC670F"},"A851A64C28C42FAD6AF0FE8F7515C837A43DF7F0":{"name":"Lockbit Linux ESXi Ransomware: Evasion Techniques and File Encryption ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.XHMgkwB_tKtZI_Xgr4rCvAHaE8?pid=Api","datePublished":"2025-08-19T14:09:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://blogs.npav.net/media/magefan_blog/Lockbit_Linux_ESXi_ransomware_evasion_techniques_1_.png","hostPageUrl":"https://blogs.npav.net/blogs/post/lockbit-linux-esxi-ransomware-evasion-techniques-and-file-encryption-process","contentSize":"300375 B","width":499,"height":333,"cDNContentUrl":"https://th.bing.com/th/id/R.5c732093007fb4ab5923f5e0af8ac2bc?rik=ihVqxIJM8tqmDw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"0F7FD34A738C5157F8EF0FA6DAF24C82C46A158A","accentColor":"018B48"},"AF671544E1A4869BF417871DABF427E14470BB84":{"name":"75% increase in ransomware attacks targeting Linux systems in 2022 ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.cozOkZQ_Krt16Ug4-TWs2AHaEu?pid=Api","datePublished":"2022-09-05T00:16:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://etimg.etb2bimg.com/thumb/msid-93984399,imgsize-27576,width-1200,height=765,overlay-etciosea/news/security/75-increase-in-ransomware-attacks-targeting-linux-systems-in-2022-report.jpg","hostPageUrl":"https://ciosea.economictimes.indiatimes.com/news/security/75-increase-in-ransomware-attacks-targeting-linux-systems-in-2022-report/93984399","contentSize":"56628 B","width":1200,"height":765,"cDNContentUrl":"https://th.bing.com/th/id/R.728cce91943f2abb75e94838f935acd8?rik=%2bnZRRB5KaLlPcQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"48BB07441E724FBAD178714FB9684A1E445176FA","accentColor":"7E7144"},"7251CC0B43FA5BA3BA57FE8F7515C837A43DF7F0":{"name":"Lockbit Linux ESXi Ransomware: Evasion Techniques and File Encryption ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.aNw04qeMmjpn3OwyVkOrvgHaE8?pid=Api","datePublished":"2025-08-19T14:09:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://blogs.npav.net/media/wysiwyg/Lockbit_Linux_ESXi_ransomware_evasion_techniques.png","hostPageUrl":"https://blogs.npav.net/blogs/post/lockbit-linux-esxi-ransomware-evasion-techniques-and-file-encryption-process","contentSize":"288919 B","width":499,"height":333,"cDNContentUrl":"https://th.bing.com/th/id/R.68dc34e2a78c9a3a67dcec325643abbe?rik=JxXMsDSvtTqrdQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"0F7FD34A738C5157F8EF75AB3AB5AF34B0CC1527","accentColor":"C20932"},"EFFC538CF2AF5DCBF49B4E3749E2B3B4A9242BD2":{"name":"Cyber Swachhta Kendra: Linux-Lilu/Lilocked Ransomware","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.3-ofBbr7Lwh_fwGklC1fngHaEr?pid=Api","datePublished":"2019-10-04T13:35:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.csk.gov.in/image/other/lilu1.jpg","hostPageUrl":"https://www.csk.gov.in/alerts/lilu.html","contentSize":"91968 B","width":770,"height":487,"cDNContentUrl":"https://th.bing.com/th/id/R.dfea1f05bafb2f087f7f01a4942d5f9e?rik=%2fs81yC%2f61bxPuQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"2DB2429A4B3B2E9473E4B94FBCD5FA2FC835CFFE","accentColor":"C99C02"},"A9B7A9FAD12A3D1F2C805552655045B673EB1161":{"name":"How to know if your system has been infected by Ransomware, and what to ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.p8W7YQ7baKWpSsKkBU5MmAHaEK?pid=Api","datePublished":"2017-06-11T21:33:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.zybra.in/wp-content/uploads/2017/05/WhatsApp-Image-2017-05-15-at-12.29.14-PM.jpeg","hostPageUrl":"https://www.zybra.in/blog/know-system-infected-ransomware/","contentSize":"85928 B","width":1080,"height":607,"cDNContentUrl":"https://th.bing.com/th/id/R.a7c5bb610edb68a5a94ac2a4054e4c98?rik=mnuarx2i0%2fHCCA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"1611BE376B540556255508C2F1D3A21DAF9A7B9A","accentColor":"7B3123"},"CFC9B2F8E516A1CC359ABC467294E51762A7E4FF":{"name":"Ransomware Data Recovery: Data Encrypted By Ransomware [2026]","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.XZkY7ma0qzTvbpJPgL1z1QHaEc?pid=Api","datePublished":"2017-04-28T12:09:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.stellarinfo.co.in/blog/wp-content/uploads/2018/05/How-to-Recover-Data-Encrypted-by-Ransomware.jpg","hostPageUrl":"https://www.stellarinfo.co.in/blog/ransomware-virus-removal/","contentSize":"41180 B","width":1000,"height":600,"cDNContentUrl":"https://th.bing.com/th/id/R.5d9918ee66b4ab34ef6e924f80bd73d5?rik=%2fJwrj15hGsxTqQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"FF4E7A26715E492764CBA953CC1A615E8F2B9CFC","accentColor":"CAA001"},"F8FAD61A9C8973F4268642B95F44B0C4873F4497":{"name":"Explainer: What is the WannaCry ransomware cyber attack and how to ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.6R2MJaO_4NT6Xjc7PS3CAAHaFY?pid=Api","datePublished":"2017-05-15T06:23:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://s01.sgp1.digitaloceanspaces.com/inline/837653-eflfjprmuu-1494826592.jpg","hostPageUrl":"https://scroll.in/latest/837653/what-is-ransomware-and-how-to-protect-your-precious-files-from-it","contentSize":"94883 B","width":800,"height":581,"cDNContentUrl":"https://th.bing.com/th/id/R.e91d8c25a3bfe0d4fa5e373b3d2dc200?rik=j69tocmYN09iaA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"7944F3784C0B44F59B2468624F3798C9A16DAF8F","accentColor":"B6A915"},"8710A9648C209AED60A94E3749E2B3B4A9242BD2":{"name":"Cyber Swachhta Kendra: Linux-Lilu/Lilocked Ransomware","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.9Y87t--WinyVZd_VI44p9gHaDa?pid=Api","datePublished":"2019-10-04T13:35:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.csk.gov.in/image/other/lilu2.jpg","hostPageUrl":"https://www.csk.gov.in/alerts/lilu.html","contentSize":"108632 B","width":939,"height":433,"cDNContentUrl":"https://th.bing.com/th/id/R.f58f3bb7ef968a7c9565dfd5238e29f6?rik=eAGaRsgCqd4Gmg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"2DB2429A4B3B2E9473E49A06DEA902C8469A0178","accentColor":"C89C03"},"A50C61AE26FC24F54AC84A47A764FF6D035DE94D":{"name":"Steering Clear of the “WannaCry” or “Wanna Decryptor” Ransomware Attack","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.C5lmWZuIGXUqEI-v3jBCAAAAAA?pid=Api","datePublished":"2017-05-13T15:47:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.splunk.com/content/dam/splunk-blogs/images/2016/12/Ransomware_Kill_Chain.png","hostPageUrl":"https://www.splunk.com/blog/2017/05/13/steering-clear-of-the-wannacry-or-wanna-decryptor-ransomware-attack.html","contentSize":"33733 B","width":474,"height":198,"cDNContentUrl":"https://th.bing.com/th/id/R.0b9966599b8819752a108fafde304200?rik=WsAW6mLPQl%2bkjA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"D49ED530D6FF467A74A48CA45F42CF62EA16C05A","accentColor":"AA2123"},"981372BC7E59458513951313D67CD4583E7859A4":{"name":"What is Ransomware?","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.f--SzwLAg316-5WoWYJYjQHaEL?pid=Api","datePublished":"2018-06-24T10:02:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://content.kaspersky-labs.com/fm/press-releases/f8/f8a374b2a1c586b1fd4750859a19c74f/processed/ransomware-q75.jpg","hostPageUrl":"https://www.kaspersky.co.in/resource-center/threats/ransomware","contentSize":"24137 B","width":710,"height":400,"cDNContentUrl":"https://th.bing.com/th/id/R.7fef92cf02c0837d7afb95a85982588d?rik=iTEny%2beVVFgxWQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"4A9587E3854DC76D31315931585495E7CB273189","accentColor":"B63115"},"1255C961F4F03F7E55404E3749E2B3B4A9242BD2":{"name":"Cyber Swachhta Kendra: Linux-Lilu/Lilocked Ransomware","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.XPodA_nuqqT3baLv0JTdBQHaDp?pid=Api","datePublished":"2019-10-04T13:35:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.csk.gov.in/image/other/lilu3.jpg","hostPageUrl":"https://www.csk.gov.in/alerts/lilu.html","contentSize":"57193 B","width":1012,"height":498,"cDNContentUrl":"https://th.bing.com/th/id/R.5cfa1d03f9eeaaa4f76da2efd094dd05?rik=IVWcFk8P8%2bdVBA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"2DB2429A4B3B2E9473E40455E7F30F4F169C5521","accentColor":"C99C02"},"2CE41672DC78F424A6538FEC7785AA5AD032582D":{"name":"Cyber Swachhta Kendra: BlackCat Ransomware","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.bUMXi8oWJWRJ5N3fgVcBDAHaGw?pid=Api","datePublished":"2022-09-15T22:35:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.csk.gov.in/image/other/BlackCat_1.jpg","hostPageUrl":"https://www.csk.gov.in/alerts/BlackCat_ransomware.html","contentSize":"30564 B","width":649,"height":592,"cDNContentUrl":"https://th.bing.com/th/id/R.6d43178bca16256449e4dddf8157010c?rik=wk5hJ82HT0JqNQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"D285230DA5AA5877CEF8356A424F87CD27614EC2","accentColor":"C0470B"},"B5890FC70D4BD58498406CCCFCBB6789838D6FE8":{"name":"Ransomware and Viruses: Top differences you should know | nasscom | The ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.JsNlmwtkzalhlan6cqs5HgHaEo?pid=Api","datePublished":"2020-10-09T09:57:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.znetlive.com/blog/wp-content/uploads/2020/09/ransomware-featured-compressed.jpg","hostPageUrl":"https://community.nasscom.in/communities/it-services/data-privacy-day/ransomware-and-viruses-top-differences-you-should-know.html","contentSize":"76490 B","width":1000,"height":625,"cDNContentUrl":"https://th.bing.com/th/id/R.26c3659b0b64cda96195a9fa72ab391e?rik=W5jwfNC0XUiJBA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"8EF6D8389876BBCFCCC60489485DB4D07CF0985B","accentColor":"0A326A"},"FAF695E60120C15D288E748BDCB642692639C6D6":{"name":"Worst Ransomware Attacks","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.cwDvLjc096KpBNIBAlGJUgHaEL?pid=Api","datePublished":"2018-08-05T17:18:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.kaspersky.co.in/content/en-in/images/repository/isc/2017-images/Ransomware-attacks-2017.jpg","hostPageUrl":"https://www.kaspersky.co.in/resource-center/threats/ransomware-threats-an-in-depth-guide","contentSize":"128049 B","width":710,"height":400,"cDNContentUrl":"https://th.bing.com/th/id/R.7300ef2e3734f7a2a904d20102518952?rik=r29ZbhACHNWC6A&pid=ImgRaw&r=0","isTransparent":false,"imageId":"6D6C936296246BCDB847E882D51C02106E596FAF","accentColor":"4D005E"},"6EADF34DC1DC075F27CE66E907D6DF5664AF1FD3":{"name":"What is ransomware as a service? | Kaspersky","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.kDJn7Kc7h37caMVxBKAYJwHaE7?pid=Api","datePublished":"2023-11-01T12:19:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://content.kaspersky-labs.com/fm/press-releases/ce/ce70b9289f191b50c92c10eb7da51696/processed/shutterstock1612695883-q75.jpg","hostPageUrl":"https://www.kaspersky.co.in/resource-center/definitions/what-is-ransomware-as-a-service","contentSize":"25010 B","width":670,"height":446,"cDNContentUrl":"https://th.bing.com/th/id/R.903267eca73b877edc68c57104a01827?rik=5to%2f1BzNcPVy7A&pid=ImgRaw&r=0","isTransparent":false,"imageId":"3DF1FA4665FD6D709E66EC72F570CD1CD43FDAE6","accentColor":"26748B"},"8A0477F40BF194E293B1A7663D557C360DA91053":{"name":"What Is Ransomware? - Cisco","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.aiiukI3kX7FF-G1fURxyggHaD4?pid=Api","datePublished":"2010-03-31T19:11:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.cisco.com/content/dam/cisco-cdc/site/us/en/images/security/what-is-ransomware-1200x630.png","hostPageUrl":"https://www.cisco.com/site/in/en/learn/topics/security/what-is-ransomware.html","contentSize":"40757 B","width":1200,"height":630,"cDNContentUrl":"https://th.bing.com/th/id/R.6a28ae908de45fb145f86d5f511c7282?rik=qEB3T7AfSS45Gw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"35019AD063C755D3667A1B392E491FB04F7740A8","accentColor":"00A2CC"},"24853F9F038A507F2A9E1F2C8D9AAF038C6EAB82":{"name":"Cyber Swachhta Kendra: RansomHub Ransomware","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.4V_VcdjYq7l4iVGeWtU8EwHaEA?pid=Api","datePublished":"2024-11-04T16:50:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.csk.gov.in/image/other/RansomHub_2.jpg","hostPageUrl":"https://www.csk.gov.in/alerts/RansomHub_Ransomware.html","contentSize":"73294 B","width":1076,"height":582,"cDNContentUrl":"https://th.bing.com/th/id/R.e15fd571d8d8abb97889519e5ad53c13?rik=Qljz%2bTCoBfei6Q&pid=ImgRaw&r=0","isTransparent":false,"imageId":"28BAE6C830FAA9D8C2F1E9A2F705A830F9F35842","accentColor":"666666"},"09CAE5ACD2A60FFE2C2F14FB91DB872CC4234183":{"name":"Methods to Recover Encrypted Excel Files - Stellar Data Recovery","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.-B7Wz3NMtTL0827zaMvLXgHaEc?pid=Api","datePublished":"2019-09-15T01:45:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.stellarinfo.co.in/blog/wp-content/uploads/2016/12/How-to-Recover-Excel-Files-Encrypted-by-Cerber-Ransomware-Virus-1.jpg","hostPageUrl":"https://www.stellarinfo.co.in/blog/recover-encrypted-excel-files/","contentSize":"92623 B","width":1000,"height":600,"cDNContentUrl":"https://th.bing.com/th/id/R.f81ed6cf734cb532f4f36ef368cbcb5e?rik=kKxeyi1q8O%2fC8g&pid=ImgRaw&r=0","isTransparent":false,"imageId":"3814324CC278BD19BF41F2C2EFF06A2DCA5EAC90","accentColor":"304075"},"F63095A235ABA4905D3C1A109BC792C0DC239D3C":{"name":"ransomware: US infiltrates big ransomware gang: 'We hacked the hackers ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.JnGCGGWBrrz57t-T1UryNgHaD4?pid=Api","datePublished":"2023-01-27T02:35:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://img.etimg.com/thumb/msid-97362803,width-1200,height-630,imgsize-97268,overlay-economictimes/articleshow.jpg","hostPageUrl":"https://economictimes.indiatimes.com/news/international/world-news/us-infiltrates-big-ransomware-gang-we-hacked-the-hackers/articleshow/97362777.cms","contentSize":"41002 B","width":1200,"height":630,"cDNContentUrl":"https://th.bing.com/th/id/R.267182186581aebcf9eedf93d54af236?rik=bwNZKlO6SgnVww&pid=ImgRaw&r=0","isTransparent":false,"imageId":"C3D932CD0C297CB901A1C3D5094ABA532A59036F","accentColor":"2951A2"},"29C15A9C1A458A2CF1B6FC8EDB7813DD66F7D100":{"name":"Full protection against Petya, WannaCry ransomware | ESET","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.ARW7N5ZtDAEOwxcwkk2zKgHaHa?pid=Api","datePublished":"2019-04-25T17:36:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.eset.com/fileadmin/ESET/US/Pages/features/ransomware-circle-lg.png","hostPageUrl":"https://www.eset.com/in/ransomware-attacks/","contentSize":"485724 B","width":500,"height":500,"cDNContentUrl":"https://th.bing.com/th/id/R.0115bb37966d0c010ec31730924db32a?rik=khylyaFUqMIfaw&pid=ImgRaw&r=0","isTransparent":true,"imageId":"001D7F66DD3187BDE8CF6B1FC2A854A1C9A51C92","accentColor":"0540C6"},"E83F531622FB86E8C07AD04EBAE3C069EB759676":{"name":"Wat u wel en niet moet doen om uzelf te beschermen tegen ransomware ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.E2gXRq82bDxc8pGhxaY9BAHaCm?pid=Api","datePublished":"2025-09-08T02:11:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.seqrite.com/blog/wp-content/uploads/2017/06/Dos-and-Donts-post-770x270.jpg","hostPageUrl":"https://www.seqrite.com/nl/blog/dos-and-donts-to-stay-safe-from-ransomware-infographic/","contentSize":"39827 B","width":770,"height":270,"cDNContentUrl":"https://th.bing.com/th/id/R.13681746af366c3c5cf291a1c5a63d04?rik=jvM1YSK%2faI4Mpw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"676957BE960C3EABE40DA70C8E68BF226135F38E","accentColor":"C69905"},"017E06A6DF409E123CC5F48D741325D8BDF35AFF":{"name":"Ransomware Encrypts Nearly 100,000 Files in Under 45 Minutes | Splunk","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.9nQQsVXpfu9MqxdnDNaQIgHaEc?pid=Api","datePublished":"2022-03-23T00:00:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.splunk.com/content/dam/splunk-blogs/images/en_us/2022/03/surge-ransomware-research-hero.png","hostPageUrl":"https://www.splunk.com/en_us/blog/security/ransomware-encrypts-nearly-100-000-files-in-under-45-minutes.html","contentSize":"55507 B","width":1000,"height":600,"cDNContentUrl":"https://th.bing.com/th/id/R.f67410b155e97eef4cab17670cd69022?rik=EOdgav0E6SHDXA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"FFA53FDB8D523147D84F5CC321E904FD6A60E710","accentColor":"24A7A6"},"251D5E08F8BC8CC4C534ADE82D4B8D07F61C1AA0":{"name":"Top 60 Linux commands every user should know + cheat sheet","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.TqjI5j4hE74W0I4MSqfyawHaDf?pid=Api","datePublished":"2019-05-28T13:25:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.hostinger.com/tutorials/wp-content/uploads/sites/2/2024/08/systemctl-command-lists-all-services-1024x482.png","hostPageUrl":"https://www.hostinger.in/tutorials/linux-commands","contentSize":"248917 B","width":1024,"height":482,"cDNContentUrl":"https://th.bing.com/th/id/R.4ea8c8e63e2113be16d08e0c4aa7f26b?rik=UtHlgI%2fLyExcQw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"0AA1C16F70D8B4D28EDA435C4CC8CB8F80E5D152","accentColor":"A53B26"},"CCE63FAD5C14F5E8870DD4DAA82C5AAE6883F97E":{"name":"Ransomware kosztuje polskie firmy średnio 1,5 mln zł - TELKO.in","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.vBsoMJjvD9iZMdn7SJRikQHaEK?pid=Api","datePublished":"2021-05-10T05:34:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.telko.in/download,7006,Ransomware_.jpg","hostPageUrl":"https://www.telko.in/ransomware-kosztuje-polskie-firmy-srednio-15-mln-zl","contentSize":"223490 B","width":1000,"height":562,"cDNContentUrl":"https://th.bing.com/th/id/R.bc1b283098ef0fd89931d9fb48946291?rik=zG7z2sVBX4540A&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E79F3886EAA5C28AAD4DD0788E5F41C5DAF36ECC","accentColor":"C14708"},"057ADD75B2F3E2EAED3790F1BB4AE568DEB1CA7E":{"name":"Cyber Swachhta Kendra: “Black Basta” Ransomware","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.JXqACRl79bdpfeuIQVZcmgHaEv?pid=Api","datePublished":"2022-06-09T14:39:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.csk.gov.in/image/other/Black_basta-paymentSite.jpg","hostPageUrl":"https://www.csk.gov.in/alerts/BlackBasta_ransomware.html","contentSize":"37951 B","width":747,"height":478,"cDNContentUrl":"https://th.bing.com/th/id/R.257a8009197bf5b7697deb8841565c9a?rik=UKfdVys%2fLq7ecw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E7AC1BED865EA4BB1F0973DEAE2E3F2B57DDA750","accentColor":"071016"},"C197865223D630AE97E6E695217F78ACC9494284":{"name":"300 Indian Banks Hit by Ransomware Attack","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.yzmCYYkciE7x4TDQMR8XOwHaEK?pid=Api","datePublished":"2024-08-01T08:50:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.studyiq.com/articles/wp-content/uploads/2024/08/01141351/Indian-Banks-hit-by-Ransomware-Attack-blog.png","hostPageUrl":"https://www.studyiq.com/articles/indian-banks-hit-by-ransomware-attack/","contentSize":"505160 B","width":1280,"height":720,"cDNContentUrl":"https://th.bing.com/th/id/R.cb398261891c884ef1e130d0311f173b?rik=HHloJTJtA%2bp5bg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"4824949CCA87F712596E6E79EA036D322568791C","accentColor":"0CBF79"},"FE4842B23C2C8BDAC114F5804517ACD5A0E9DCFD":{"name":"Linux: How to find the SAS/SATA/SSD hard drive serial number and ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP._5pRVH-W5WJC0Rciu4kiZwHaC6?pid=Api","datePublished":"2023-10-24T04:07:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://supportkb.dell.com/img/ka06P0000011MjXQAU/ka06P0000011MjXQAU_en_US_5.png","hostPageUrl":"https://www.dell.com/support/kbdoc/en-in/000212962/how-to-find-the-sas-sata-ssd-hard-drive-serial-number-and-physical-slot-mapping-on-the-power-edge-in-the-linux-operating-system-or-from-the-sos-report","contentSize":"131474 B","width":1874,"height":739,"cDNContentUrl":"https://th.bing.com/th/id/R.ff9a51547f96e56242d11722bb892267?rik=74QkK8PCuK0cQQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"DFCD9E0A5DCA7154085F411CADB8C2C32B2484EF","accentColor":"15C101"},"3595D04D760554C2EFFE42B5B7EF13FDE4FC9E22":{"name":"2023 Ransomware Attack on Indian Defence Unit: A DoPT Report Insight","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.WdtvKJNrkaHEQ_vvbJpVZgHaGe?pid=Api","datePublished":"2024-11-12T00:00:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://vajiramandravi.com/current-affairs/wp-content/uploads/2025/05/2023_ransomware_attack_on_indian_defence_unit_a_dopt_report_insight.webp","hostPageUrl":"https://vajiramandravi.com/current-affairs/2023-ransomware-attack-on-indian-defence-unit-a-dopt-report-insight/","contentSize":"12210 B","width":546,"height":478,"cDNContentUrl":"https://th.bing.com/th/id/R.59db6f28936b91a1c443fbef6c9a5566?rik=U1kN1GdQRSz%2b7w&pid=ImgRaw&r=0","isTransparent":false,"imageId":"22E9CF4EDF31FE7B5B24EFFE2C455067D40D5953","accentColor":"400000"},"D30B176B0130BD25259E92BAD72660E0FDAC3FDF":{"name":"Ransomware, IoT attacks rise in 2020: Study | itnext.in","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.UwBWZfOjCuGroIx0Rg9hbgHaE8?pid=Api","datePublished":"2020-11-05T15:21:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.itnext.in/sites/default/files/Ransomware_2.jpg","hostPageUrl":"https://www.itnext.in/article/2020/11/05/ransomware-iot-attacks-rise-2020-study","contentSize":"99280 B","width":750,"height":500,"cDNContentUrl":"https://th.bing.com/th/id/R.53005665f3a30ae1aba08c74460f616e?rik=PbBxthAD21JS6Q&pid=ImgRaw&r=0","isTransparent":false,"imageId":"FDF3CADF0E06627DAB29E95252DB0310B671B03D","accentColor":"AD3E1E"},"B514A3B04DC114B56EC49ACB807A9BEE54F33EF7":{"name":"India Is The Second Most Hit Country For Ransomware After U.S., Claims ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.yIU4z8peaXaUzfiXFUiyVQHaEK?pid=Api","datePublished":"2020-10-07T11:26:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://sm.mashable.com/mashable_in/seo/2/21739/21739_k28n.jpg","hostPageUrl":"https://in.mashable.com/tech/17481/india-is-the-second-most-hit-country-for-ransomware-after-us-claims-report","contentSize":"232752 B","width":1281,"height":721,"cDNContentUrl":"https://th.bing.com/th/id/R.c88538cfca5e697694cdf8971548b255?rik=W0E6C9QcQVvmTA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"7FE33F45EEB9A708BCA94CE65B411CD40B3A415B","accentColor":"CC6B00"},"3B0FBF4E84353BFAFE69D2634F24CFC18E01E1D9":{"name":"Remember The Sony Pictures Hack & WannaCry Ransomware? US Blames It On ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.XYuNyXTcZ9tmjETuV1aKwAHaE7?pid=Api","datePublished":"2018-09-07T13:35:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://im.indiatimes.in/content/2018/Sep/north_korean_hack_1536313625.jpg?w=725&h=483&cc=1&webp=1&q=75","hostPageUrl":"https://www.indiatimes.com/technology/news/remember-the-sony-pictures-hack-wannacry-ransomware-us-blames-it-on-this-north-korean-spy-352621.html","contentSize":"19634 B","width":725,"height":483,"cDNContentUrl":"https://th.bing.com/th/id/R.5d8b8dc974dc67db668c44ee57568ac0?rik=s%2fD75EhTs6%2fvlg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"9D1E10E81CFC42F4362D96EFAFB35348E4FBF0B3","accentColor":"AC321F"},"ADBBADBA1C9FA1ADEBFCAF6BEFE7D0D44368C6BE":{"name":"Ransomware Jokes And Memes","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.SsJLFEw4vUHBphVvhlkgOQHaD4?pid=Api","datePublished":"2020-04-28T17:57:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://img.mensxp.com/media/content/2017/May/ransomware-social-1495276473.jpg","hostPageUrl":"https://www.mensxp.com/special-features/today/37028-these-jokes-and-memes-on-the-lsquo-wannacry-rsquo-ransomware-has-us-rolling-on-the-floor.html","contentSize":"51252 B","width":800,"height":420,"cDNContentUrl":"https://th.bing.com/th/id/R.4ac24b144c38bd41c1a6156f86592039?rik=2rvaq8H5Gtq%2bzw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"EB6C86344D0D7EFEB6FACFBEDA1AF9C1ABDABBDA","accentColor":"C0530B"},"A806476574FCCB5A83568D941CE7A1655EFF1345":{"name":"Ransomware - US-Regierung warnt vor Lösegeld-Zahlung","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.iFvdfIxzRaWzESv_ViktGAHaEK?pid=Api","datePublished":"2020-10-08T18:22:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://web-assets.esetstatic.com/tn/-x700/wls/2020/10/wls_ransomware-treasury-warning-paying-up-fines_fhd.jpg","hostPageUrl":"https://www.welivesecurity.com/deutsch/2020/10/08/ransomware-us-regierung-warnt-vor-loesegeld-zahlung/","contentSize":"118262 B","width":1244,"height":700,"cDNContentUrl":"https://th.bing.com/th/id/R.885bdd7c8c7345a5b3112bff56292d18?rik=imB0VkfPvKU4ZQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"5431FFE5561A7EC149D86538A5BCCF475674608A","accentColor":"12787E"},"2009F255628F66DE7B5BD2634F24CFC18E01E1D9":{"name":"Remember The Sony Pictures Hack & WannaCry Ransomware? US Blames It On ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.QA6QUmPCok0TcM341HzgPgHaFj?pid=Api","datePublished":"2018-09-07T13:35:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://im.indiatimes.in/facebook/2018/Sep/north_korean_hack_1536313597.jpg?w=1200&h=900&cc=1&webp=1&q=75","hostPageUrl":"https://www.indiatimes.com/technology/news/remember-the-sony-pictures-hack-wannacry-ransomware-us-blames-it-on-this-north-korean-spy-352621.html","contentSize":"40560 B","width":1200,"height":900,"cDNContentUrl":"https://th.bing.com/th/id/R.400e905263c2a24d1370cdf8d47ce03e?rik=ApAvVSb4Zu23tQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"9D1E10E81CFC42F4362DB5B7ED66F826552F9002","accentColor":"096936"},"1400228AE5AC01F2D81B7E1DC955671CD317E2A6":{"name":"Ransomware Groundhog Day: Elevating Your Program in a High-Threat ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.5QG5bXA0tMpjL4YzFBelfwHaE8?pid=Api","datePublished":"2021-07-08T00:00:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.splunk.com/content/dam/splunk-blogs/images/en_us/2021/07/securitylaptop.jpg","hostPageUrl":"https://www.splunk.com/en_us/blog/security/ransomware-groundhog-day-elevating-your-program-in-a-high-threat-environment.html","contentSize":"385939 B","width":1920,"height":1281,"cDNContentUrl":"https://th.bing.com/th/id/R.e501b96d7034b4ca632f86331417a57f?rik=QQAiqF7KEC%2bNsQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"6A2E713DC176559CD1E7B18D2F10CA5EA8220041","accentColor":"C60805"},"AA3C40F4CC8E37A08932AA5C0F301BB8238B8B07":{"name":"Ransomware Detection & Response Virtual Showcase – EMEA | Trellix","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.s3fT3mwAD-1Z07ni6GToUgHaHa?pid=Api","datePublished":"2023-10-13T23:07:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.trellix.com/en-us/img/headshots/graham-cluley-bw.jpg","hostPageUrl":"https://www.trellix.com/about/events/2023/ransomware-showcase/emea/","contentSize":"50217 B","width":650,"height":650,"cDNContentUrl":"https://th.bing.com/th/id/R.b377d3de6c000fed59d3b9e2e864e852?rik=qsMET8zocwqYIw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"70B8B8328BB103F0C5AA23980A73E8CC4F04C3AA","accentColor":"282828"},"34B71933E1EF1C534B55C7E6F73CB006A2C7CB01":{"name":"DHS Secretary Alejandro Mayorkas Gives Remarks at the International ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.MjFeRxZ78AzTtE6Hn9eKnQHaE7?pid=Api","datePublished":"2023-11-14T04:38:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.dhs.gov/medialibrary-assets/assets-temp/231101-h-ks211-0031.jpg","hostPageUrl":"https://www.cbp.gov/medialibrary/assets/images/49716","contentSize":"1143875 B","width":3500,"height":2333,"cDNContentUrl":"https://th.bing.com/th/id/R.32315e47167bf00cd3b44e879fd78a9d?rik=Q3uRMx7%2bwTW0VQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"10BC7C2A600BC37F6E7C55B435C1FE1E33917B43","accentColor":"91773A"},"B1D5A26CEDFCAAD54469AA5C0F301BB8238B8B07":{"name":"Ransomware Detection & Response Virtual Showcase – EMEA | Trellix","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.62e8GF_E3ZMOqa2m3KEGDQHaHa?pid=Api","datePublished":"2023-10-13T23:07:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.trellix.com/en-us/img/headshots/fabian-rech-headshot.jpg","hostPageUrl":"https://www.trellix.com/about/events/2023/ransomware-showcase/emea/","contentSize":"85765 B","width":800,"height":800,"cDNContentUrl":"https://th.bing.com/th/id/R.eb67bc185fc4dd930ea9ada6dca1060d?rik=G10qxt7Pql1Elg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"70B8B8328BB103F0C5AA96445DAACFDEC62A5D1B","accentColor":"005D82"},"9F4DE249BB6995FB984DECEC2658FE1473C1D86C":{"name":"Ransomware Detection & Response Virtual Showcase – APJ | Trellix","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.sB6Rjd6J3E6FiSUHzfmUxQHaHa?pid=Api","datePublished":"2023-10-13T23:07:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.trellix.com/en-us/img/headshots/vicki-batka-headshot.jpg","hostPageUrl":"https://www.trellix.com/about/events/2023/ransomware-showcase/apj/","contentSize":"71259 B","width":800,"height":800,"cDNContentUrl":"https://th.bing.com/th/id/R.b01e918dde89dc4e85892507cdf994c5?rik=%2bdQulLuWWb%2bJ1A&pid=ImgRaw&r=0","isTransparent":false,"imageId":"C68D1C3741EF8562CECED489BF5996BB942ED4F9","accentColor":"1C46AF"},"947D1B52569A1DB85F9581C15ACDB28F27BFB93F":{"name":"Rupee likely to go to 81 82 to the US dollar, or even higher. Here’s ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.8yK2Iflm2TH8U9nkiCAPEQHaEK?pid=Api","datePublished":"2022-09-22T15:16:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://akm-img-a-in.tosshub.com/businesstoday/images/story/202209/currency_-sixteen_nine.jpg","hostPageUrl":"https://www.businesstoday.in/latest/economy/story/rupee-likely-to-go-to-81-82-to-the-us-dollar-or-even-higher-heres-why-and-why-you-should-not-care-347977-2022-09-22","contentSize":"157636 B","width":1200,"height":675,"cDNContentUrl":"https://th.bing.com/th/id/R.f322b621f966d931fc53d9e488200f11?rik=SdexJWWp0Yv1WQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"F39BFB72F82BDCA51C1859F58BD1A96525B1D749","accentColor":"3A7A6A"},"CF244B5AA25E72CD026B825E0457AC58B0B4041C":{"name":"Cyber Swachhta Kendra: WastedLocker Ransomware","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.z1GC6kxUlgwnwdWbVOCHdwAAAA?pid=Api","datePublished":"2020-07-17T07:14:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.csk.gov.in/image/logo/info-sec.jpg","hostPageUrl":"https://www.csk.gov.in/alerts/WastedLockerRansomware.html","contentSize":"14853 B","width":266,"height":64,"cDNContentUrl":"https://th.bing.com/th/id/R.cf5182ea4c54960c27c1d59b54e08777?rik=%2fEK0pSrlJ9wgtg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"C1404B0B85CA7540E528B620DC27E52AA5B442FC","accentColor":"056A91"},"0B81244579DC6AE0475625BC450D4744BAA4A813":{"name":"Rimini Street kündigt Rimini Protect™ Advanced Hypervisor Security für ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.zpqxNYFAbmOd3FiGp9l5VgHaHa?pid=Api","datePublished":"2025-01-23T01:27:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://mms.businesswire.com/media/20250122857751/de/2359579/4/Vali_Cyber_Announcement.jpg","hostPageUrl":"https://boerse-social.com/2025/01/22/rimini_street_kandigt_rimini_protecta_advanced_hypervisor_security_far_vmware_nutanix_und_alle_anderen_linux-basierten_hypervisoren_an_die_von_vali_cybera_unterstatzt_wird_um_vor_ransomware_und_anderen_schwachstellen_zu_schatzen","contentSize":"179380 B","width":480,"height":480,"cDNContentUrl":"https://th.bing.com/th/id/R.ce9ab13581406e639ddc5886a7d97956?rik=sBhCVJfNpg50ZQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"318A4AAB4474D054CB5265740EA6CD97544218B0","accentColor":"C8AF03"},"60725A48CEC1301E291725C9B0CBDA99E787A412":{"name":"Image","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.TzBfLqT-PdVv3TKNLPIIPQHaDd?pid=Api","datePublished":"2021-01-31T17:37:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.linuxlifesciences.com/Image/banner2.jpg","hostPageUrl":"https://linuxlifesciences.com/","contentSize":"852935 B","width":1500,"height":700,"cDNContentUrl":"https://th.bing.com/th/id/R.4f305f2ea4fe3dd56fdd328d2cf2083d?rik=BielhOwcA%2bGScQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"214A787E99ADBC0B9C527192E1031CEC84A52706","accentColor":"30669B"},"57B687266579E07C707EE664A691E3E39AB23B4C":{"name":"Building wave of ransomware attacks strike US hospitals","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.b7_r-coS9_mF8XN1ckbIpwHaE8?pid=Api","datePublished":"2022-07-21T12:25:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://media.dtnext.in/imported/import/Articles/2020/Oct/202010291059153717_Building-wave-of-ransomware-attacks-strike-US-hospitals_SECVPF.gif","hostPageUrl":"https://www.dtnext.in/world/2020/10/29/building-wave-of-ransomware-attacks-strike-us-hospitals","contentSize":"80017 B","width":620,"height":414,"cDNContentUrl":"https://th.bing.com/th/id/R.6fbfebf9ca12f7f985f173757246c8a7?rik=dWt4YlaXDscH5w&pid=ImgRaw&r=0","isTransparent":false,"imageId":"C4B32BA93E3E196A466EE707C70E975662786B75","accentColor":"182B6C"},"AE59430787171D8A6182D414271FABEC7BDF494B":{"name":"OpsPatuk: DragonForce starts ransomware attacks","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.xK0LG4Q32qQc-WW75WNvYAHaLw?pid=Api","datePublished":"2022-06-27T01:28:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://gumlet.assettype.com/freepressjournal/2022-06/41b03a6a-7e7d-4eb4-91d8-e1220689a192/Screenshot_2022_06_24_19_44_19_95_948cd9899890cbd5c2798760b2b95377.jpg","hostPageUrl":"https://www.freepressjournal.in/mumbai/opspatuk-dragonforce-starts-ransomware-attacks","contentSize":"173025 B","width":1080,"height":1715,"cDNContentUrl":"https://th.bing.com/th/id/R.c4ad0b1b8437daa41cf965bbe5636f60?rik=6pU0cHhx0agWKA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"B494FDB7CEBAF172414D2816A8D17178703495EA","accentColor":"B3181E"},"32EDD0B2D3A6B9E498C9BA1E80B0107BD78E4F43":{"name":"रैंसमवेयर सुरक्षा सेवाएं और समाधान . द्वारा phoenixNAP","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.fXhptFN8xS3_6T98C9sHgwAAAA?pid=Api","datePublished":"2022-02-20T03:21:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://phoenixnap.com/wp-content/uploads/2021/08/phoenixNAP-Linux-Ransomware-Blog.jpg","hostPageUrl":"https://phoenixnap.in/%E0%A4%B0%E0%A5%88%E0%A4%82%E0%A4%B8%E0%A4%AE%E0%A4%B5%E0%A5%87%E0%A4%AF%E0%A4%B0-%E0%A4%B8%E0%A5%81%E0%A4%B0%E0%A4%95%E0%A5%8D%E0%A4%B7%E0%A4%BE","contentSize":"15626 B","width":400,"height":267,"cDNContentUrl":"https://th.bing.com/th/id/R.7d7869b4537cc52dffe93f7c0bdb0783?rik=I94NKz1qm06JnA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"34F4E87DB7010B08E1AB9C894E9B6A3D2B0DDE23","accentColor":"0796C4"},"34900794EA15843D9FF3600BCD77B4DBFA5A4AA2":{"name":"Hoe klaar bent u voor de evolutie van ransomware? | Seqrite","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.mNT1718cBWqNPqsNxesRtAHaFj?pid=Api","datePublished":"2025-09-09T17:23:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.seqrite.com/blog/wp-content/uploads/2018/04/virtual-reality-1802469_640.jpg","hostPageUrl":"https://www.seqrite.com/nl/blog/how-ready-are-you-for-the-evolution-of-ransomware/","contentSize":"116131 B","width":640,"height":480,"cDNContentUrl":"https://th.bing.com/th/id/R.98d4f5ef5f1c056a8d3eab0dc5eb11b4?rik=QwlwSa5RSNP5Pw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"2AA4A5AFBD4B77DCB0063FF9D34851AE49700943","accentColor":"12A3B9"},"53C4158F530B801158410842C44096434844C527":{"name":"US Claims That North Korea Has Attacked 3,00,000 Computers In 150 ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.8QWK7h8iXppqbmMSNwvU7gHaD4?pid=Api","datePublished":"2017-12-19T12:40:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://im.indiatimes.in/media/content/2017/Dec/wannacry_attack_1513681442_725x725.jpg","hostPageUrl":"https://www.indiatimes.com/news/world/us-claims-that-north-korea-has-attacked-3-00-000-computers-in-150-countries-with-wannacry-virus-335954.html","contentSize":"42585 B","width":725,"height":380,"cDNContentUrl":"https://th.bing.com/th/id/R.f1058aee1f225e9a6a6e6312370bd4ee?rik=NUxR%2bDWwCBGFFA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"725C44843469044C248014851108B035F8514C35","accentColor":"AE321D"},"AC36A3CCA1E5188BE8AC58396E3FA3B65FE1A0A3":{"name":"Rupee vs US dollar: Domestic currency rises 12 paise in early trade to ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.bzxqLGU1C2A3iE7JPRbygwHaEK?pid=Api","datePublished":"2023-02-03T05:02:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://akm-img-a-in.tosshub.com/businesstoday/images/story/202302/rupee_3-sixteen_nine.jpg","hostPageUrl":"https://www.businesstoday.in/commodities/story/rupee-vs-us-dollar-domestic-currency-rises-12-paise-in-early-trade-to-8208-after-closing-at-a-low-of-8220-368773-2023-02-03","contentSize":"95897 B","width":1200,"height":675,"cDNContentUrl":"https://th.bing.com/th/id/R.6f3c6a2c65350b6037884ec93d16f283?rik=ymM6zBpegbiOyg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"3A0A1EF56B3AF3E69385CA8EB8815E1ACC3A63CA","accentColor":"6B3A28"},"88CDEFFED2CEE0CABAEDF69EFCFEBF66B3372D7D":{"name":"List of top companies affected by Petya aka ExPetr ransomware - IBTimes ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.fVZu4WBT-xpmDKDEvS6sAwHaDy?pid=Api","datePublished":"2017-06-28T11:22:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://data1.ibtimes.co.in/en/full/652996/petya-expetr-goldeneye-ransomware-companies-affected.jpg","hostPageUrl":"https://www.ibtimes.co.in/petya-aka-expetr-ransomware-list-top-companies-affected-by-latest-cyberattack-732596","contentSize":"45921 B","width":896,"height":459,"cDNContentUrl":"https://th.bing.com/th/id/R.7d566ee16053fb1a660ca0c4bd2eac03?rik=iNz%2b7y3sDqyr3g&pid=ImgRaw&r=0","isTransparent":false,"imageId":"D7D2733B66FBEFCFE96FDEABAC0EEC2DEFFEDC88","accentColor":"99C407"},"2C0572B7A5476B819AE1825E0457AC58B0B4041C":{"name":"Cyber Swachhta Kendra: WastedLocker Ransomware","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.9-wBL0OmWLlL6K1qTvo4qwAAAA?pid=Api","datePublished":"2020-07-17T07:14:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.csk.gov.in/image/logo/security-.jpg","hostPageUrl":"https://www.csk.gov.in/alerts/WastedLockerRansomware.html","contentSize":"9176 B","width":266,"height":64,"cDNContentUrl":"https://th.bing.com/th/id/R.f7ec012f43a658b94be8ad6a4efa38ab?rik=wlAne1p0thipHg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"C1404B0B85CA7540E5281EA918B6745A7B2750C2","accentColor":"09679F"},"1A0B83FEC84ED3F8F92B069056DCCF73028839C2":{"name":"US says it 'hacked the hackers' to bring down ransomware gang, helping ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.Q0qTMKKJmj713clXJd4b7QHaEK?pid=Api","datePublished":"2023-01-27T02:11:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://akm-img-a-in.tosshub.com/indiatoday/images/story/202301/us_dept-sixteen_nine.png?VersionId=6dGfjOMJ3yAFPoApeBDgQKNBExdVC_U1","hostPageUrl":"https://www.indiatoday.in/world/story/us-says-it-hacked-the-hackers-to-bring-down-ransomware-gang-helping-300-victims-2326948-2023-01-27","contentSize":"250844 B","width":1200,"height":675,"cDNContentUrl":"https://th.bing.com/th/id/R.434a9330a2899a3ef5ddc95725de1bed?rik=obA474zkPY%2bfsg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"2C93882037FCCD650960B29F8F3DE48CEF38B0A1","accentColor":"58524A"},"2118A119A432F40A08D5DAB7E38C34D704E90BBF":{"name":"Why Rupee is falling against Dollar currently-2018","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.PMbtBLwqxATHrN0po2_HlgHaEK?pid=Api","datePublished":"2018-07-08T19:43:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://img.jagranjosh.com/imported/images/E/Articles/why-rupee-falling-reasons.jpg","hostPageUrl":"https://www.jagranjosh.com/general-knowledge/why-rupee-is-falling-against-dollar-1530858596-1","contentSize":"102541 B","width":1200,"height":675,"cDNContentUrl":"https://th.bing.com/th/id/R.3cc6ed04bc2ac404c7acdd29a36fc796?rik=EoEakUojT6CAXQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"FBB09E407D43C83E7BAD5D80A04F234A911A8112","accentColor":"C72904"},"5D34840C3B4CCCE582A6D5742FFE4A0E7644AD00":{"name":"LINUX: Easy Linux For Beginners, Your Step-By-Step Guide To Learning ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.aYJBqGawdfcDcw-qZbimNAHaJF?pid=Api","datePublished":"2016-04-05T23:16:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/81x4US1TqYL._SL1500_.jpg","hostPageUrl":"https://www.amazon.in/LINUX-Beginners-Step-Step-Operating-ebook/dp/B01CF1FORK","contentSize":"136190 B","width":1223,"height":1500,"cDNContentUrl":"https://th.bing.com/th/id/R.698241a866b075f703730faa65b8a634?rik=1UNIwLPEzF4oag&pid=ImgRaw&r=0","isTransparent":false,"imageId":"00DA4467E0A4EFF2475D6A285ECCC4B3C04843D5","accentColor":"C60A05"},"D4D40B6040B32C041B2958DCDECA0F36B0C83C81":{"name":"Buy AKKO ACR PRO Alice Plus 68-Key Hot Swappable Split Wired Mechanical ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.yZ2neMDI_yl9P3f7XcWlpQHaEk?pid=Api","datePublished":"2022-11-18T21:24:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://i5.walmartimages.com/asr/599f9bff-0c09-4c61-91e0-44a8c4546c2c.ee066d99c1ead70ba85b7ce7710ae077.jpeg","hostPageUrl":"https://www.ubuy.co.in/product/7UKWQJZMO-akko-acr-pro-alice-plus-68-key-hot-swappable-split-wired-mechanical-gaming-keyboard-with-double-shot-pbt-asa-keycaps-for-win-mac-linuxblack-pink","contentSize":"55542 B","width":1375,"height":848,"cDNContentUrl":"https://th.bing.com/th/id/R.c99da778c0c8ff297d3f77fb5dc5a5a5?rik=TU2wBgQ7wkCxkg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"18C38C0B63F0ACEDCD8592B140C23B0406B04D4D","accentColor":"7E554D"},"0DE3452DDDC3F0EED145AF6BEFE7D0D44368C6BE":{"name":"Ransomware Jokes And Memes","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.w_5TH2g_hnX94aNZrqeo4AHaE6?pid=Api","datePublished":"2017-05-20T10:38:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://img.mensxp.com/media/content/2017/May/image-2-youtube-1495275645.jpg","hostPageUrl":"https://www.mensxp.com/special-features/today/37028-these-jokes-and-memes-on-the-lsquo-wannacry-rsquo-ransomware-has-us-rolling-on-the-floor.html","contentSize":"49065 B","width":1000,"height":664,"cDNContentUrl":"https://th.bing.com/th/id/R.c3fe531f683f8675fde1a359aea7a8e0?rik=0D5U0t08D%2b4dVA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"EB6C86344D0D7EFEB6FA541DEE0F3CDDD2543ED0","accentColor":"005753"},"A44A9B07493597BFA5491D8E84800412E6EA4CEA":{"name":"Linux Reseller Hosting India","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.agO90Vf90TIxeTfmUcr-hQHaD3?pid=Api","datePublished":"2018-05-02T07:27:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.thinknexgen.com/images/pages/lnx_resell_fb.jpg","hostPageUrl":"https://www.thinknexgen.com/services/web-hosting/linux-reseller","contentSize":"192478 B","width":1200,"height":627,"cDNContentUrl":"https://th.bing.com/th/id/R.6a03bdd157fdd132317937e651cafe85?rik=SqS5cJRTeftalA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"AEC4AE6E21400848E8D1945AFB79539470B9A44A","accentColor":"051C5C"},"D0123ACE71A9F208B6710627F2774CACAEC44DB6":{"name":"Tech trends 2022: Web 3.0, cryptocurrency bitcoin, Ransomware, Big Tech ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.2fJ9r3MPNm-dq3DnW8Z59wHaEK?pid=Api","datePublished":"2021-12-01T08:48:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://images.hindustantimes.com/tech/img/2021/12/01/1600x900/US-MIAMI-HOSTS-CRYPTOCURRENCY-AND-NFT-CONFERENCE-4_1638347805918_1638347851761.jpg","hostPageUrl":"https://tech.hindustantimes.com/tech/news/tech-trends-2022-web-3-0-cryptocurrency-ransomware-big-tech-war-how-life-may-change-71638347385476.html","contentSize":"398723 B","width":1600,"height":900,"cDNContentUrl":"https://th.bing.com/th/id/R.d9f27daf730f366f9dab70e75bc679f7?rik=DSGj7BeaL4BrFw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"6BD44CEACAC4772F7260176B802F9A17ECA3210D","accentColor":"7C3C20"},"CB8D533A8A292AF8E88EF5F6E37B4AAC4E7C3F3D":{"name":"Introduction to Embedded Linux Part 5 | DigiKey","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.T5V7TOmlJ5KgxWbGUgdh4gHaEK?pid=Api","datePublished":"2021-11-25T22:12:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://cf-images.us-east-1.prod.boltdns.net/v1/static/1571595843001/6dab6f18-e16b-43a2-a7cb-bca3864cb912/b56e3965-9025-4301-ba46-d8f1744f5211/1280x720/match/image.jpg","hostPageUrl":"https://www.digikey.in/en/videos/d/digi-key-electronics/introduction-to-embedded-linux-part-5-patch-device-tree-for-i2c-in-yocto","contentSize":"335413 B","width":1280,"height":720,"cDNContentUrl":"https://th.bing.com/th/id/R.4f957b4ce9a52792a0c566c6520761e2?rik=vNg1o6iSoo%2bO6A&pid=ImgRaw&r=0","isTransparent":false,"imageId":"D3F3C7E4CAA4B73E6F5FE88E8FA292A8A335D8BC","accentColor":"C70405"},"885CBB16315FDEA76C7025C9B0CBDA99E787A412":{"name":"logo","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.muPnBkPioHev-IYLbKou-gAAAA?pid=Api","datePublished":"2021-01-31T17:37:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.linuxlifesciences.com/Image/logo.png","hostPageUrl":"https://linuxlifesciences.com/","contentSize":"29287 B","width":189,"height":82,"cDNContentUrl":"https://th.bing.com/th/id/R.9ae3e70643e2a077aff8860b6caa2efa?rik=iMW7YRP17XrGBw&pid=ImgRaw&r=0","isTransparent":true,"imageId":"214A787E99ADBC0B9C5207C67AEDF51361BBC588","accentColor":"BB6010"},"9F7DA18FB714D5736F084A220DCCA199C91F08A8":{"name":"Ransomware Cyber-Attacks Surge Over Two-Fold In India In First Half of ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.POLbIOtbFrTS9FDQwME_NwHaBj?pid=Api","datePublished":"2023-08-04T16:49:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWQ_G1EeAe64Z5OITqwjmp7l2B8qf7VcyT_Fp6AMRQaBlTHNVqfWMA0x65fELIM7N-K0Q1fNv1pWATFMEb0m-1u-TerjK3AWps1DcI2g5k37Y3zIYYWTZaM5hkLVEubpxGVaLSK90lT1wpO7pzHG21vL1pofCfWhMBMLFD9qoMpbQZGH2CYQkiS8kO0bw/s16000/Cybercrime.jpg","hostPageUrl":"https://www.indiandefensenews.in/2023/08/ransomware-cyber-attacks-surge-over-two.html","contentSize":"23916 B","width":670,"height":140,"cDNContentUrl":"https://th.bing.com/th/id/R.3ce2db20eb5b16b4d2f450d0c0c13f37?rik=%2bdca%2bHtBXTf2gA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"8A80F19C991ACCD022A480F6375D417BF81AD7F9","accentColor":"223B6B"},"506F5CD254C716E052DB9971B5152A87FC78EB57":{"name":"Rupee Fall: रुपया टूटने के क्या-क्या नुकसान हैं? पहली बार 90 तक लुढ़का ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.p3Y0gy2CP22R2DPSLjtHDwHaEK?pid=Api","datePublished":"2025-12-03T05:18:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://akm-img-a-in.tosshub.com/aajtak/images/story/202512/692fc4669e9d7-rupee-fall-030224766-16x9.jpg?size=948:533","hostPageUrl":"https://www.aajtak.in/business/news/story/india-rupee-slips-90-against-dollar-first-time-in-history-hits-record-low-know-its-impact-tutc-dskc-2402212-2025-12-03","contentSize":"43543 B","width":948,"height":533,"cDNContentUrl":"https://th.bing.com/th/id/R.a77634832d823f6d91d833d22e3b470f?rik=BfbFLUV8YQ4lvQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"75BE87CF78A2515B1799BD250E617C452DC5F605","accentColor":"C69E05"},"8B00ED6A9575F692BF7238F9FF7BEFDDDADAF3CF":{"name":"Linux SysAdmin - HOT Technologies","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.-iryxvqUCiYVapJQwzDs3wAAAA?pid=Api","datePublished":"2021-01-15T01:08:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.hariomtatsat.co.in/img/sysadmin.png","hostPageUrl":"https://www.hariomtatsat.co.in/sysadmin.php","contentSize":"7420 B","width":300,"height":480,"cDNContentUrl":"https://th.bing.com/th/id/R.fa2af2c6fa940a26156a9250c330ecdf?rik=uADepllXbyn7Jw&pid=ImgRaw&r=0","isTransparent":true,"imageId":"FC3FADADDDFEB7FF9F8327FB296F5759A6DE00B8","accentColor":"0EBD0E"},"DD1CA6DC9052F9950ACFEE256AE1B21252D22467":{"name":"Indian Government Warns Windows Users Against Akira Ransomware; Here’s ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.paxhJWojEuMvwZquLk91aQHaEK?pid=Api","datePublished":"2023-07-26T05:42:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://sm.mashable.com/t/mashable_in/photo/default/untitled-design-1_bhed.1200.jpg","hostPageUrl":"https://in.mashable.com/tech/57048/indian-government-warns-windows-users-against-akira-ransomware-heres-how-you-can-stay-safe","contentSize":"33035 B","width":1200,"height":675,"cDNContentUrl":"https://th.bing.com/th/id/R.a5ac61256a2312e32fc19aae2e4f7569?rik=3cFqzQkln1mg%2fA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"76422D25212B1EA652EEFCA0599F2509CD6AC1DD","accentColor":"C98902"},"EB887792E8BEFED214375CDD091A6044A5D32466":{"name":"Cyber Swachhta Kendra: Akira Ransomware","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.ZMNyzzzrBJm9SULOLgWSvQHaBd?pid=Api","datePublished":"2023-07-25T18:42:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.csk.gov.in/image/logo/csk.gif","hostPageUrl":"https://www.csk.gov.in/alerts/Akira_ransomware.html","contentSize":"8474 B","width":585,"height":116,"cDNContentUrl":"https://th.bing.com/th/id/R.64c372cf3ceb0499bd4942ce2e0592bd?rik=voh3KY7r7y1Bcw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"66423D5A4406A190DDC573412DEFEB8E297788BE","accentColor":"CC7800"},"05442FFD0A28BEF3E188A2D7EB5C9FADF182C792":{"name":"Endpoint Security (ENS) | Trellix","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.dSj98-cz8SIDDWgPFafHtgHaDv?pid=Api","datePublished":"2018-05-28T13:11:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.trellix.com/en-us/img/product-screens/trellix-edr/trellix-edr-tour-1.png","hostPageUrl":"https://www.trellix.com/ja-jp/products/endpoint-security/","contentSize":"128764 B","width":1920,"height":970,"cDNContentUrl":"https://th.bing.com/th/id/R.7528fdf3e733f122030d680f15a7c7b6?rik=UETy36CC6z8eiA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"297C281FDAF9C5BE7D2A881E3FEB82A0DFF24450","accentColor":"1F89AC"},"BD2B86D1ADC3AA495D27F63EF5F3ADE38DEDE064":{"name":"rupee dollar: Why the worst of rupee's fall could be over - The ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.SrAo_6xNK7xHCqLkg_MpHwHaE-?pid=Api","datePublished":"2022-07-27T15:49:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://img.etimg.com/photo/msid-93168980/graph.jpg","hostPageUrl":"https://economictimes.indiatimes.com/news/economy/indicators/why-the-worst-of-rupees-fall-could-be-over/articleshow/93168926.cms","contentSize":"15796 B","width":630,"height":423,"cDNContentUrl":"https://th.bing.com/th/id/R.4ab028ffac4d2bbc470aa2e483f3291f?rik=27JoHdo8qpTVcg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"460EDED83EDA3F5FE36F72D594AA3CDA1D68B2DB","accentColor":"A6252F"},"B8612F68160C143502D5E053428508405B2DDC6E":{"name":"Ransomware Spotlight: Play | Trend Micro (IN)","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.5z58KZvqeUwHi_OSDblHPQHaEH?pid=Api","datePublished":"2023-07-21T07:13:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://documents.trendmicro.com/images/TEx/articles/RSPlay-Figure7-7fWsMMd.jpg","hostPageUrl":"https://www.trendmicro.com/vinfo/in/security/news/ransomware-spotlight/ransomware-spotlight-play","contentSize":"66218 B","width":900,"height":500,"cDNContentUrl":"https://th.bing.com/th/id/R.e73e7c299bea794c078bf3920db9473d?rik=ixbyhmHAQVMgXQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E6CDD2B504805824350E5D205341C06186F2168B","accentColor":"B4171D"},"C2E88BF61C67048CD0FEE0BB32D83EA65B594ADD":{"name":"Windows Server 2019安装Linux子系统 - 天雨的博客 - Masterain","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.QTqeBrQxVSV577iykalOkwHaDg?pid=Api","datePublished":"2020-03-20T03:12:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://blogpic.irain.in/imgs/2019/10/a63cb8504eeb4671.png","hostPageUrl":"https://blog.irain.in/archives/Windows_Server_2019_Subsystem.html","contentSize":"18324 B","width":776,"height":367,"cDNContentUrl":"https://th.bing.com/th/id/R.413a9e06b431552579efb8b291a94e93?rik=LI64b8F2QMgN7w&pid=ImgRaw&r=0","isTransparent":false,"imageId":"DDA495B56AE38D23BB0EEF0DC84076C16FB88E2C","accentColor":"B1411A"},"6FACA28D844756C1C62F076601F8713E904B8E7A":{"name":"Kali Linux Guia Completa Para Principiantes Aprende Kali Linux Paso ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.V81M1TBUdo56j2PfckO9VgHaHa?pid=Api","datePublished":"2025-08-02T17:11:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/81u+I9XeeML.jpg","hostPageUrl":"https://www.desertcart.in/products/227547783-kali-linux-guia-completa-para-principiantes-aprende-kali-linux-paso","contentSize":"420043 B","width":2400,"height":2400,"cDNContentUrl":"https://th.bing.com/th/id/R.57cd4cd53054768e7a8f63df7243bd56?rik=9soq2Eh0ZRxs8g&pid=ImgRaw&r=0","isTransparent":false,"imageId":"A7E8B409E3178F106670F26C1C657448D82ACAF6","accentColor":"A5269F"},"0B37B7FC7ECD56D10D1149CF816A255D8D4400CD":{"name":"McLaren Health hit with ransomware attack; many patients in Michigan ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.LvBw1u4tXkWT1pBHDDa3kQHaEK?pid=Api","datePublished":"2023-10-06T17:33:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://cloudfront-us-east-1.images.arcpublishing.com/910mediagroup/ZHJDTCNMWNCENCBFIW3Y6GMXUI.jpg?timestamp=19","hostPageUrl":"https://www.9and10news.com/2023/10/06/mclaren-health-hit-with-ransomware-attack-many-patients-in-michigan-could-be-affected/","contentSize":"328992 B","width":1920,"height":1080,"cDNContentUrl":"https://th.bing.com/th/id/R.2ef070d6ee2d5e4593d690470c36b791?rik=sHN7z%2bfcZR3QEQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"DC0044D8D552A618FC9411D01D65DCE7CF7B73B0","accentColor":"0937C2"},"9ED0FC4CB6D0EE13290719348C6D8651AA477706":{"name":"रैंसमवेयर अटैक के लिए सबसे बड़ा टारगेट बनी भारत की मैन्युफैक्चरिंग ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.iuQ0yKbg5VTYBWUvi6yrswHaEK?pid=Api","datePublished":"2024-03-27T11:47:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://static.tnnbt.in/thumb/msid-108822042,thumbsize-57834,width-1280,height-720,resizemode-75/108822042.jpg","hostPageUrl":"https://www.timesnowhindi.com/tech-gadgets/indian-manufacturing-sector-worst-hit-by-ransomware-attack-says-report-article-108822085","contentSize":"103841 B","width":1280,"height":720,"cDNContentUrl":"https://th.bing.com/th/id/R.8ae434c8a6e0e554d805652f8bacabb3?rik=6Q3PxGsN7jGScA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"607774AA1568D6C84391709231EE0D6BC4CF0DE9","accentColor":"08C369"},"F0D3B928869DF59AC92CA30B584A8FC2838012C3":{"name":"Ourtutorials - Linux Commands","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.YdkNv4kzJ8-LHY44qLq0zwHaBj?pid=Api","datePublished":"2022-01-02T09:16:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.ourtutorials.in/linux/img/linux.jpg","hostPageUrl":"https://www.ourtutorials.in/linux/index.php","contentSize":"539346 B","width":1900,"height":400,"cDNContentUrl":"https://th.bing.com/th/id/R.61d90dbf893327cf8b1d8e38a8bab4cf?rik=Dz2bgmjZX6mcwg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"3C2108382CF8A485B03AC29CA95FD968829B3D0F","accentColor":"C49A07"},"25D93326E65091C4E76DAA8FFBB03644C6601632":{"name":"Quick Heal Receives U.S Patent For Anti-Ransomware Solution - MobyGeek.com","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.jMIkh51iuz0Fy2qxF7T_xgHaD4?pid=Api","datePublished":"2019-07-18T22:53:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://img.mobygeek.com/crop/1200x628/2019/07/17/quick-heal-technologies-ipo-0829.jpg","hostPageUrl":"https://mobygeek.com/features/quick-heal-receives-us-patent-for-anti-ransomware-solution-6687","contentSize":"124758 B","width":1200,"height":628,"cDNContentUrl":"https://th.bing.com/th/id/R.8cc224879d62bb3d05cb6ab117b4ffc6?rik=Up0zYm4FGUx%2b1g&pid=ImgRaw&r=0","isTransparent":false,"imageId":"2361066C44630BBFF8AAD67E4C19056E62339D52","accentColor":"276BA4"},"56ABFBE9B61CFD4019E7825E0457AC58B0B4041C":{"name":"Cyber Swachhta Kendra: WastedLocker Ransomware","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.CURvlDS1MViTCRp5eRDU7gAAAA?pid=Api","datePublished":"2020-07-17T07:14:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.csk.gov.in/image/logo/certin.jpg","hostPageUrl":"https://www.csk.gov.in/alerts/WastedLockerRansomware.html","contentSize":"10633 B","width":266,"height":64,"cDNContentUrl":"https://th.bing.com/th/id/R.09446f9434b5315893091a797910d4ee?rik=Zbq%2fnmvB3wSRfg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"C1404B0B85CA7540E5287E9104DFC16B9EBFBA65","accentColor":"057DBC"},"C60EBAF316C9A7B688C1F38DAB3C5BA55A8CD7C9":{"name":"How To Run Linux On Android? | Cashify Blog","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.fnkWcH2WGDWnBCxAfnhLNwHaDt?pid=Api","datePublished":"2023-04-23T21:34:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://s3b.cashify.in/gpro/uploads/2023/04/21135747/How-To-Run-Linux-On-Android_.jpg","hostPageUrl":"https://www.cashify.in/how-to-install-run-linux-on-android","contentSize":"40992 B","width":1200,"height":600,"cDNContentUrl":"https://th.bing.com/th/id/R.7e7916707d961835a7042c407e784b37?rik=bOCrP2GcemuIHA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"9C7DC8A55AB5C3BAD83F1C886B7A9C613FABE06C","accentColor":"CB8400"},"43FB3C699B57B54C1B817E35789BCEA17FEF6668":{"name":"Blisko 40 proc. polskich firm zaatakowanych przez ransomware płaci ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.EmM5OYOaA5it6geaZRLHkgHaEK?pid=Api","datePublished":"2024-07-10T05:43:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.telko.in/download,10684,sophos_wykres1.jpg","hostPageUrl":"https://www.telko.in/blisko-40-proc-polskich-firm-zaatakowanych-przez-ransomware-placi-okup","contentSize":"440766 B","width":1920,"height":1080,"cDNContentUrl":"https://th.bing.com/th/id/R.12633939839a0398adea079a6512c792?rik=NL%2fDlrl1W8SxGA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"8666FEF71AECB98753E718B1C45B75B996C3BF34","accentColor":"0170CA"},"8154A2AE0EA7EF95F2A3740F0A1549A86D68C648":{"name":"Unit 42 Research: Ransomware Impact on Indian Manufacturing","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.41LVQOFypny4QtYhQz2q7QHaEa?pid=Api","datePublished":"2024-03-27T07:28:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://img-cdn.thepublive.com/fit-in/1200x675/filters:format(webp)/smstreet/media/media_files/wMZX7KoeKW5Z8WFqPK6v.jpg","hostPageUrl":"https://smestreet.in/technology/unit-42-research-ransomware-impact-on-indian-manufacturing-4422337","contentSize":"28276 B","width":1133,"height":675,"cDNContentUrl":"https://th.bing.com/th/id/R.e352d540e172a67cb842d621433daaed?rik=GEUq6uB6%2flkvOg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"846C86D68A9451A0F0473A2F59FE7AE0EA2A4518","accentColor":"545748"},"57B253D50E62660A87293D6C9857D6DC5526464E":{"name":"Manual \"nomodeset\" Kernel Boot Line Option for Linux Booting | Dell India","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.ZtNj0-rSZxr_xoTrf1yLtAHaEw?pid=Api","datePublished":"2020-12-14T07:25:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://supportkb.dell.com/img/ka02R000000i0LDQAY/ka02R000000i0LDQAY_en_US_4.jpeg","hostPageUrl":"https://www.dell.com/support/kbdoc/en-in/000123893/manual-nomodeset-kernel-boot-line-option-for-linux-booting","contentSize":"77191 B","width":700,"height":450,"cDNContentUrl":"https://th.bing.com/th/id/R.66d363d3ead2671affc684eb7f5c8bb4?rik=dSs1XeAmZqB4kg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E4646255CD6D7589C6D39278A06626E05D352B75","accentColor":"2C001E"},"4667F32BE58CCF0CAE0A443CFA2B45A1604C67B2":{"name":"300 small Indian Banks hit by ransomware attack, payment systems ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.qRJnG7IISPfhgEO8NsXCYwAAAA?pid=Api","datePublished":"2024-07-31T17:44:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://akm-img-a-in.tosshub.com/businesstoday/images/story/202407/66aa767bc440e-ransomware-attack-forces-hundreds-of-small-indian-banks-offline--sources-say-313802375-16x9.jpg?size=948:533","hostPageUrl":"https://www.businesstoday.in/india/story/300-small-indian-banks-hit-by-ransomware-attack-payment-systems-temporarily-shutdown-report-439640-2024-07-31","contentSize":"64988 B","width":474,"height":266,"cDNContentUrl":"https://th.bing.com/th/id/R.a912671bb20848f7e18043bc36c5c263?rik=ZHY%2fsl7I%2fMDqoA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"2B76C4061A54B2AFC344A0EAC0FCC85EB23F7664","accentColor":"1892B3"},"35C9A1EB14C9511069043D7C5C6F2DAE3158C764":{"name":"Buy LINUX® Configuration and Installation (Slackware S.) Book Online at ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.AhJS8JQP0udKARmN09k4_gAAAA?pid=Api","datePublished":"2020-09-18T02:04:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/51uS39PDHML._SX342_SY445_.jpg","hostPageUrl":"https://www.amazon.in/Configuration-Installation-Slackware-Patrick-Volkerding/dp/0764570056","contentSize":"24766 B","width":342,"height":437,"cDNContentUrl":"https://th.bing.com/th/id/R.021252f0940fd2e74a01198dd3d938fe?rik=U5wavkGcFQGWQA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"467C8513EAD2F6C5C7D3409601159C41BE1A9C53","accentColor":"0B1AC0"},"B01D49545225DDE811C4821F4FBE6B7C59E10B99":{"name":"'Trade in Rupee will be the biggest way forward': Amit Shah calls it ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.sQcMdVcZWca1O4TmznuyZAHaEK?pid=Api","datePublished":"2024-05-09T08:02:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://akm-img-a-in.tosshub.com/businesstoday/images/story/202405/663c82036513e-india-has-started-trade-in-the-rupee-with-neighbouring-countries--including-nepal-and-bhutan-095753647-16x9.jpg","hostPageUrl":"https://www.businesstoday.in/latest/economy/story/trade-in-rupee-will-be-the-biggest-way-forward-amit-shah-calls-it-top-priority-for-new-government-428895-2024-05-09","contentSize":"92464 B","width":1200,"height":675,"cDNContentUrl":"https://th.bing.com/th/id/R.b1070c75571959c6b53b84e6ce7bb264?rik=C9GURSVS3Y4RTA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"99B01E95C7B6EBF4F1284C118EDD52254594D10B","accentColor":"6E4318"},"6DA8D51574A779D575BAA2D7EB5C9FADF182C792":{"name":"Endpoint Security (ENS) | Trellix","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.68apSK7rrVjKuj7HGW6dhQHaDw?pid=Api","datePublished":"2018-05-28T13:11:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.trellix.com/en-us/img/product-screens/trellix-edr/trellix-edr-tour-2.png","hostPageUrl":"https://www.trellix.com/ja-jp/products/endpoint-security/","contentSize":"137750 B","width":1920,"height":975,"cDNContentUrl":"https://th.bing.com/th/id/R.ebc6a948aeebad58caba3ec7196e9d85?rik=1opdUUd6l11Xqw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"297C281FDAF9C5BE7D2AAB575D977A47515D8AD6","accentColor":"B81212"},"41084751D78BECA1453528FFF59B5D484985EFBC":{"name":"Linux Shared Web Hosting Services India","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.sxCgP8YwprUf8CnBVmqoOgHaD3?pid=Api","datePublished":"2019-06-05T11:24:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.thinknexgen.com/images/pages/lnx_host_fb.jpg","hostPageUrl":"https://www.thinknexgen.com/services/web-hosting/linux-shared","contentSize":"185627 B","width":1200,"height":627,"cDNContentUrl":"https://th.bing.com/th/id/R.b310a03fc630a6b51ff029c1566aa83a?rik=FIB0FX24zhpUUw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"CBFE589484D5B95FFF8253541ACEB87D15748014","accentColor":"051A5B"},"E6A563517132C88CA22449A9448B6DABFA615526":{"name":"Ransomware Cyber attack on AIIMS Delhi server","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.6ROctFkJIRK2XSZt2UKdbwHaEc?pid=Api","datePublished":"2022-11-24T12:11:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://medicaldialogues.in/h-upload/2022/11/24/191905-why-sudden-increase-in-melioidosis-cases-in-india-1500-900px-8.jpg","hostPageUrl":"https://medicaldialogues.in/mdtv/top-videos/ransomware-cyber-attack-on-aiims-delhi-server-102870","contentSize":"136244 B","width":1500,"height":900,"cDNContentUrl":"https://th.bing.com/th/id/R.e9139cb459092112b65d266dd9429d6f?rik=blo2FRcjjMgqQg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"625516AFBAD6B8449A94422AC88C231715365A6E","accentColor":"58134B"},"C94671192CDEF4DD9C5452B7E87F7D33E8FA9ACD":{"name":"Top 20 Basic Kali Linux Commands - Yeah Hub","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.RY9dpXvCESRoSG9vej9_3AHaFV?pid=Api","datePublished":"2018-08-12T01:16:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.yeahhub.com/wp-content/uploads/2018/04/kali-linux-command5.png","hostPageUrl":"https://www.yeahhub.com/top-20-basic-kali-linux-commands/","contentSize":"221282 B","width":852,"height":613,"cDNContentUrl":"https://th.bing.com/th/id/R.458f5da57bc2112468486f6f7a3f7fdc?rik=nGQXkcLtT93JRQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"DCA9AF8E33D7F78E7B2545C9DD4FEDC29117649C","accentColor":"AC1F20"},"5CF7F047AEF55212F4AE1057C1FEB4B33D4EE73C":{"name":"Linux Life Sciences Pvt. Ltd.","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.VlUlD8zPhlhkcVRogJ6mWwHaBR?pid=Api","datePublished":"2024-09-19T08:53:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://linuxlifesciences.com/resource/Image/inr-abt.jpg","hostPageUrl":"https://linuxlifesciences.com/resource/Our_Facilities.aspx","contentSize":"39647 B","width":1080,"height":186,"cDNContentUrl":"https://th.bing.com/th/id/R.5655250fcccf865864715468809ea65b?rik=xX8PdOpfJSFP6g&pid=ImgRaw&r=0","isTransparent":false,"imageId":"C37EE4D33B4BEF1C7501EA4F21255FEA740F7FC5","accentColor":"AD681E"},"81095FC2195EAF1E947EF1CCF78077C24C2E304D":{"name":"17 Kali Linux Package Manager - ARKIT","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.gfUJTaKqpLDwzBkEWsOwMwHaFj?pid=Api","datePublished":"2016-10-22T14:31:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://arkit.co.in/wp-content/uploads/2016/06/17-Kali-Linux-Package-Manager.png","hostPageUrl":"https://arkit.co.in/kali-linux-installation/17-kali-linux-package-manager/","contentSize":"69934 B","width":800,"height":600,"cDNContentUrl":"https://th.bing.com/th/id/R.81f5094da2aaa4b0f0cc19045ac3b033?rik=GJD1LJHl%2buFJ5w&pid=ImgRaw&r=0","isTransparent":false,"imageId":"D403E2C42C77087FCC1FE749E1FAE5912CF59018","accentColor":"CB9F00"},"1835DC1FEC32C5E7E025FD2A656B1E172B0AF167":{"name":"Sophos India, Sophos Ransomware Report, Ransomware Report, Cyber ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.lfcrwHq0C8mmhgu0ooAJiAHaEh?pid=Api","datePublished":"2022-05-04T08:25:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://gumlet.assettype.com/digitalterminal%2Fimport%2Fuploads%2Fnews%2F1651652595s_The%20ransomware%20situation%20in%20India%20is%20worrying--------Sunil%20Sharma%20Managing%20Director%20Sales%20India%20and%20SAARC%20Sophos.jpg?w=1200&auto=format%2Ccompress&ogImage=true&enlarge=true","hostPageUrl":"https://digitalterminal.in/news/28876.html","contentSize":"106408 B","width":1200,"height":734,"cDNContentUrl":"https://th.bing.com/th/id/R.95f72bc07ab40bc9a6860bb4a2800988?rik=gVPN8c4jXH4OUg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"761FA0B271E1B656A2DF520E7E5C23CEF1CD5381","accentColor":"0D4462"},"9C03C85464E99122A7C2923221BA5318D2C0DC85":{"name":"How to convert rupees to dollars and dollars to rupees? - Goodreturns","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.h9CajyI_2eqfLJ_QPp02vQHaFM?pid=Api","datePublished":"2014-09-15T05:48:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://images.goodreturns.in/img/2020/04/rsdollarnew-1587702986.jpg","hostPageUrl":"https://www.goodreturns.in/classroom/2014/09/how-convert-rupees-dollars-dollars-rupees-303596.html","contentSize":"47888 B","width":660,"height":463,"cDNContentUrl":"https://th.bing.com/th/id/R.87d09a8f223fd9ea9f2c9fd03e9d36bd?rik=yTCMRUaeGSJ6LA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"58CD0C2D8135AB1223292C7A22199E46458C30C9","accentColor":"664021"},"1F2646A66441E08C437958DCDECA0F36B0C83C81":{"name":"Buy AKKO ACR PRO Alice Plus 68-Key Hot Swappable Split Wired Mechanical ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.trkb1wL8rqDypkPdzo6fLAHaHH?pid=Api","datePublished":"2022-11-18T21:24:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://i5.walmartimages.com/asr/94f72f4b-529c-48af-9c07-f65abd3e9e9a.569e30efbbd89ae16110720a8a2784c1.jpeg","hostPageUrl":"https://www.ubuy.co.in/product/7UKWQJZMO-akko-acr-pro-alice-plus-68-key-hot-swappable-split-wired-mechanical-gaming-keyboard-with-double-shot-pbt-asa-keycaps-for-win-mac-linuxblack-pink","contentSize":"93435 B","width":1500,"height":1441,"cDNContentUrl":"https://th.bing.com/th/id/R.b6b91bd702fcaea0f2a643ddce8e9f2c?rik=8WJkakYUDsg0lw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"18C38C0B63F0ACEDCD859734C80E14466A6462F1","accentColor":"7A7A51"},"EA202FAC23DF92F5B4BAA68F50F17FD5FC4C774A":{"name":"How to setup Docker on Linux","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.Hs8m3rknO8Q1jnGSJtHoHAHaEK?pid=Api","datePublished":"2024-11-06T01:12:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://thesmartbug.com/content/images/2024/11/featureImage-4.webp","hostPageUrl":"https://thesmartbug.com/blog/how-to-setup-docker-on-linux/","contentSize":"20672 B","width":1080,"height":607,"cDNContentUrl":"https://th.bing.com/th/id/R.1ecf26deb9273bc4358e719226d1e81c?rik=rgLyyjL9KV9Lqw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"A477C4CF5DF71F05F86AAB4B5F29FD32CAF202AE","accentColor":"C89E03"},"CF9B0D8CFC7D159AB8F4634132A0B48EB2D54E39":{"name":"Ransomware attack shuts down payment systems in nearly 300 Indian banks","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.X-WD3uAmv9KinZaGJIK0mQHaEo?pid=Api","datePublished":"2024-07-31T18:31:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://english.varthabharati.in/storage/uploads/india/Cyber_vb_54.jpeg","hostPageUrl":"https://english.varthabharati.in/india/ransomware-attack-shuts-down-payment-systems-in-nearly-300-indian-banks","contentSize":"79345 B","width":960,"height":600,"cDNContentUrl":"https://th.bing.com/th/id/R.5fe583dee026bfd2a29d96862482b499?rik=%2fLnQyM%2fXUamLTw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"93E45D2BE84B0A2314364F8BA951D7CFC8D0B9FC","accentColor":"0EA3BD"},"CFE3C5CB77B56D3D606F49D5ACE5C332AEA2ED4D":{"name":"Did You Know About India's Rs 10,000 Rupee Note","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.Qyyu_FCL4-xgRIGY_DN5kQHaCT?pid=Api","datePublished":"2022-06-08T13:45:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://im.indiatimes.in/content/2022/Jun/did-you-know--about-10000-rupee-note_62a090b2bb179.jpg","hostPageUrl":"https://www.indiatimes.com/worth/news/did-you-know-india-used-to-have-10000-rupee-note-571697.html","contentSize":"166388 B","width":681,"height":212,"cDNContentUrl":"https://th.bing.com/th/id/R.432caefc508be3ec60448198fc337991?rik=%2fD5cvHdb1tMG9g&pid=ImgRaw&r=0","isTransparent":false,"imageId":"D4DE2AEA233C5ECA5D94F606D3D65B77BC5C3EFC","accentColor":"7A6151"},"E4322578C46798D8A2BC6DD24082AD606EEE1D1A":{"name":"Rupee Rises 7 Paise To Settle At 83.18 Against US Dollar","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.JFmHJlNiEnhWTHshg7DHWgHaEK?pid=Api","datePublished":"2023-10-11T10:38:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://gumlet.assettype.com/freepressjournal/2023-01/309a5744-7633-4e31-8365-dc99ff76ad37/american_one_dollar_bank_note_indian_ten_rupee_notes_close_up_image_macro_172415082.jpg","hostPageUrl":"https://www.freepressjournal.in/business/rupee-rises-7-paise-to-settle-at-8318-against-us-dollar","contentSize":"107586 B","width":800,"height":450,"cDNContentUrl":"https://th.bing.com/th/id/R.2459872653621278564c7b2183b0c75a?rik=TiNSh0x2iY0qyw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"A1D1EEE606DA28042DD6CB2A8D89764C8752234E","accentColor":"3D8E65"},"CEF01B906995A50E58584BC1D742F4BD155B6239":{"name":"Certificate Course in System Administration using Unix/Linux ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.EUWhRZTrfJPJ-MBR8ABzBQHaDt?pid=Api","datePublished":"2021-02-15T18:26:00.0000000Z","isFamilyFriendly":true,"contentUrl":"http://nielit.gov.in/sites/default/files/Aurangabad/LinuxUNIX-Certification-Training-Bundle.jpg","hostPageUrl":"https://www.nielit.gov.in/content/certificate-course-system-administration-using-unixlinux","contentSize":"71436 B","width":630,"height":315,"cDNContentUrl":"https://th.bing.com/th/id/R.1145a14594eb7c93c9f8c051f0007305?rik=7A%2bxCZZZWuCFhQ&riu=http%3a%2f%2fnielit.gov.in%2fsites%2fdefault%2ffiles%2fAurangabad%2fLinuxUNIX-Certification-Training-Bundle.jpg&ehk=fjnmUFPQySubRJXdjKq7jdn4GXSytz%2bSO0CI6ZiRmz4%3d&risl=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"9326B551DB4F247D1CB48585E05A599609B10FEC","accentColor":"C9A402"},"7984291C4ACFC840C0F0831C98A3A39E4665504B":{"name":"Linux sigue creciendo en cuota de mercado, alcanza el 4% de los ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.ClLSsMx-tsGqLCLRObhqJAHaEK?pid=Api","datePublished":"2024-03-05T19:18:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://cdn.4pmtech.com/wp-content/uploads/2024/03/US-Linux.webp","hostPageUrl":"https://4pmtech.com/es/linux-continues-growing-market-share-reaches-4-of-desktops/","contentSize":"31846 B","width":1280,"height":720,"cDNContentUrl":"https://th.bing.com/th/id/R.0a52d2b0cc7eb6c1aa2c22d139b86a24?rik=l0iSwaT8jAQMDw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"B4055664E93A3A89C1380F0C048CFCA4C1924897","accentColor":"946137"},"712D2E0174096D3F9E9AAA7FE025E3A18CFDBB35":{"name":"An Indian firm paid ₹8 crore to rectify ransomware | Tech News (HT Tech)","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.uo2_NplD4VjumrlfQXR9qgHaEK?pid=Api","datePublished":"2020-05-19T10:58:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://images.hindustantimes.com/tech/img/2020/05/19/1600x900/Ransomware_1589883081294_1589883081635.jpg","hostPageUrl":"https://tech.hindustantimes.com/tech/news/an-indian-firm-paid-rs-8-cr-to-rectify-ransomware-71589882759280.html","contentSize":"41337 B","width":1600,"height":898,"cDNContentUrl":"https://th.bing.com/th/id/R.ba8dbf369943e158ee9ab95f41747daa?rik=F9LiEEeQ1vPpqQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"53BBDFC81A3E520EF7AAA9E9F3D6904710E2D217","accentColor":"041243"},"C138449C56846C4F6A6E4BC1D742F4BD155B6239":{"name":"Certificate Course in System Administration using Unix/Linux ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.sLvoP5ExN6HDqVZB-HGRCAHaEM?pid=Api","datePublished":"2021-02-15T18:26:00.0000000Z","isFamilyFriendly":true,"contentUrl":"http://nielit.gov.in/sites/default/files/Aurangabad/Careers-in-Linux-Administration.png","hostPageUrl":"https://www.nielit.gov.in/content/certificate-course-system-administration-using-unixlinux","contentSize":"4872 B","width":486,"height":275,"cDNContentUrl":"https://th.bing.com/th/id/R.b0bbe83f913137a1c3a95641f8719108?rik=HINEyWVIxvSm5g&riu=http%3a%2f%2fnielit.gov.in%2fsites%2fdefault%2ffiles%2fAurangabad%2fCareers-in-Linux-Administration.png&ehk=cQcvy1J%2fJi903%2bsHIvFKvmAgVhFaGMdS0VJ%2bYXu9PU4%3d&risl=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"9326B551DB4F247D1CB4E6A6F4C64865C944831C","accentColor":"CC9A00"},"323A7139B674140FDEDBF39C65433110C6AC0CCC":{"name":"Linux. Собеседование — Teletype","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.pzsi5PwG6Brpa0Y6LSeVmwHaGc?pid=Api","datePublished":"2023-02-21T04:02:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.tecmint.com/wp-content/uploads/2022/12/Linux-File-Permissions.jpg","hostPageUrl":"https://teletype.in/@it255ru/JkRgD5lor2D","contentSize":"56076 B","width":900,"height":783,"cDNContentUrl":"https://th.bing.com/th/id/R.a73b22e4fc06e81ae96b463a2d27959b?rik=I6MXk2tHQfDtvQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"CCC0CA6C01133456C93FBDEDF041476B9317A323","accentColor":"B9AA12"},"E18108AD2675DA03E4AD922CD65ABB2A512291CC":{"name":"Congressman Eric Swalwell Raises Alarm Over Crypto's Role in Ransomware ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.VQGbD__2mjK_pjZTcc85iAHaFj?pid=Api","datePublished":"2021-07-04T10:12:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://u.today/sites/default/files/styles/1200x900/public/2021-07/8438.jpg","hostPageUrl":"https://cryptopanic.com/news/12258099/Congressman-Eric-Swalwell-Raises-Alarm-Over-Cryptos-Role-in-Ransomware-Attacks","contentSize":"100782 B","width":1200,"height":900,"cDNContentUrl":"https://th.bing.com/th/id/R.55019b0ffff69a32bfa6365371cf3988?rik=HhiA2mJXrTBO2g&pid=ImgRaw&r=0","isTransparent":false,"imageId":"CC192215A2BBA56DC229DA4E30AD5762DA80181E","accentColor":"37485E"},"9FF89B74D68FD1BCC15A027F89E2C75828BE83EE":{"name":"Cheat sheets - ARKIT","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.1UwJhkpp5fjyZqG3xBhLawAAAA?pid=Api","datePublished":"2015-10-31T12:00:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://arkit.co.in/wp-content/uploads/2015/10/Pocket-Guide-Linux-Commands-63x300.jpg","hostPageUrl":"https://arkit.co.in/cheat-sheets/","contentSize":"7367 B","width":63,"height":300,"cDNContentUrl":"https://th.bing.com/th/id/R.d54c09864a69e5f8f266a1b7c4184b6b?rik=%2bY%2b5R234HcscpQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"EE38EB82857C2E98F720A51CCB1DF86D47B98FF9","accentColor":"666666"},"510D99F388509A884836D7034DE612371C3D40A1":{"name":"Will Microsoft face the brunt of ransomware attack that hit Indian users?","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.E63Kh_BD1tUfJyugD5CrrAHaCW?pid=Api","datePublished":"2017-07-05T14:41:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://akm-img-a-in.tosshub.com/sites/dailyo/story/header/201707/hack1-banner_070517065958.jpg","hostPageUrl":"https://www.dailyo.in/technology/microsoft-ransomware-windows-xp-windows-10-petya-wannacry-18193","contentSize":"57977 B","width":1024,"height":325,"cDNContentUrl":"https://th.bing.com/th/id/R.13adca87f043d6d51f272ba00f90abac?rik=FdCZP4gFqYiEYw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"1A04D3C173216ED4307D638488A905883F99D015","accentColor":"070A15"},"9369D45D4F3C7FDFD01F8718D14D01E71208DF39":{"name":"India among top countries affected by ransomware in APJ region: Akamai","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.J4tYxQ7PL0FmtTQfo4869AHaD3?pid=Api","datePublished":"2022-09-19T14:10:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://assets.techcircle.in/uploads/article-image/2022/09/images/30711-cyber-security-3410923-960-720.jpg","hostPageUrl":"https://www.techcircle.in/2022/09/19/conti-and-other-ransomware-attacks-surge-in-apj-shows-study","contentSize":"74522 B","width":640,"height":334,"cDNContentUrl":"https://th.bing.com/th/id/R.278b58c50ecf2f4166b5341fa38f3af4?rik=OZZN1fTD9%2f0N8Q&pid=ImgRaw&r=0","isTransparent":false,"imageId":"93FD80217E10D41D8178F10DFDF7C3F4D54D9639","accentColor":"529338"},"20CFC5B2F257F1532A0273C2D9F917320E87FE1E":{"name":"India & UK Conducts Counter Ransomware Exercise for 26 Nations","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.av19t8PpBj--EA6ewOcdbQHaEK?pid=Api","datePublished":"2022-09-08T12:10:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://st.adda247.com/https://wpassets.adda247.com/wp-content/uploads/multisite/sites/5/2022/09/08092813/Ransomware-Image-1280x720-1.jpg","hostPageUrl":"https://currentaffairs.adda247.com/india-uk-conducts-counter-ransomware-exercise-for-26-nations/","contentSize":"64055 B","width":1280,"height":720,"cDNContentUrl":"https://th.bing.com/th/id/R.6afd7db7c3e9063fbe100e9ec0e71d6d?rik=AvxcKy91HzWiIA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E1EF78E023719F9D2C3720A2351F752F2B5CFC02","accentColor":"B82013"},"E013C7CEA4CD35E9FA24DF020577BB21BBACBA23":{"name":"How to Select the Best Linux Dedicated Server","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIF.nUKDKG3PFJz8YOkBRd0Afg?pid=Api","datePublished":"2026-01-27T10:44:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://blog.cloudtechtiq.com/wp-content/uploads/2026/01/How-to-Select-the-Best-Linux-Dedicated-Server.jpg","hostPageUrl":"https://blog.cloudtechtiq.com/how-to-select-the-best-linux-dedicated-server/","contentSize":"149310 B","width":1115,"height":646,"cDNContentUrl":"https://th.bing.com/th/id/R.18fae4ba06e4167dd0348c51736b0367?rik=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"32ABCABB12BB775020FD42AF9E53DC4AEC7C310E","accentColor":"1E3270","isFresh":true},"E0B3C74E43FA9DE2C3F543324CF2DF79825E48CE":{"name":"Valorant: U-25 Blitz Cup Gives a Platform to Aspiring Esports Players ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.7q0crzujJWQD-bmXZm8JrgHaEK?pid=Api","datePublished":"2023-12-18T16:03:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://sm.ign.com/t/ign_in/blogroll/v/valorant-r/valorant-review_az9u.1280.jpg","hostPageUrl":"https://in.ign.com/valorant/199551/news/valorant-u-25-blitz-cup-gives-a-platform-to-aspiring-esports-players-with-a-inr-50000-prize-pool","contentSize":"139838 B","width":1280,"height":720,"cDNContentUrl":"https://th.bing.com/th/id/R.eead1caf3ba3256403f9b997666f09ae?rik=Djt85DSv2S48Xw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"EC84E52897FD2FC423345F3C2ED9AF34E47C3B0E","accentColor":"B8131D"},"F0FC7A989F78A925819A724CADFFFBE81B7BFCCA":{"name":"Quick Heal 1st Indian firm to get US patent for anti-ransomware tech","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.wsCegd410eBo_RqQyHjnqQHaEK?pid=Api","datePublished":"2019-07-05T05:50:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://img-cdn.publive.online/fit-in/1280x960/filters:format(webp)/odishatv/media/post_attachments/uploadimage/library/16_9/16_9_0/Quick-Heal_1619623427.jpg","hostPageUrl":"https://odishatv.in/science/quick-heal-1st-indian-firm-to-get-us-patent-for-anti-ransomware-tech-383900","contentSize":"28274 B","width":1280,"height":719,"cDNContentUrl":"https://th.bing.com/th/id/R.c2c09e81de35d1e068fd1a90c878e7a9?rik=D8%2bnifmHmlIYqQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"ACCFB7B18EBFFFDAC427A918529A87F989A7CF0F","accentColor":"C85903"},"3BAEB139934D4749D8B53D6C9857D6DC5526464E":{"name":"Manual \"nomodeset\" Kernel Boot Line Option for Linux Booting | Dell India","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.1hyNazeHUyH9TMSOwGtE8wHaCo?pid=Api","datePublished":"2020-12-14T07:25:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://supportkb.dell.com/img/ka02R000000i0LDQAY/ka02R000000i0LDQAY_en_US_7.jpeg","hostPageUrl":"https://www.dell.com/support/kbdoc/en-in/000123893/manual-nomodeset-kernel-boot-line-option-for-linux-booting","contentSize":"48831 B","width":700,"height":249,"cDNContentUrl":"https://th.bing.com/th/id/R.d61c8d6b37875321fd4cc48ec06b44f3?rik=s%2bobkznUdJSNWw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E4646255CD6D7589C6D35B8D9474D439931BEAB3","accentColor":"BC0F15"},"E8B5309D21A3E698CDFA7DB91AC3E678E49A7DE3":{"name":"Buy 10Gb PCI-E NIC Network Card, Dual SFP+ Port, with Intel 82599EN ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.8fChLeODjY0AyJpNFC38OwHaFV?pid=Api","datePublished":"2022-06-06T18:18:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/61H00Us83DL.jpg","hostPageUrl":"https://www.desertcart.in/products/33382921-10-gtek-for-intel-e-10-g-42-btda-82599-es-chip-10-gb-e-ethernet-converged-network-adapter-x-520-da-2-x-520-sr-2-pci-e-x-8-dual-sfp-port","contentSize":"101957 B","width":1334,"height":960,"cDNContentUrl":"https://th.bing.com/th/id/R.f1f0a12de3838d8d00c89a4d142dfc3b?rik=jlsD2RI6boncrw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"3ED7A94E876E3CA19BD7AFDC896E3A12D9035B8E","accentColor":"888343"},"9721525E970628AC256E18DC7701E85D4BE73B92":{"name":"For the next generation of CIOs | ITNEXT","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.yvT9vEthK-7JSsSXd-FyYAHaE8?pid=Api","datePublished":"2012-04-23T10:13:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.itnext.in/sites/default/files/styles/wall-images/public/Ransomware%20pic_CIOL.jpg?itok=7nPT-1Lt","hostPageUrl":"https://www.itnext.in/","contentSize":"25296 B","width":520,"height":347,"cDNContentUrl":"https://th.bing.com/th/id/R.caf4fdbc4b612beec94ac49777e17260?rik=eRIl5XlggspS5g&pid=ImgRaw&r=0","isTransparent":false,"imageId":"29B37EB4D58E1077CD81E652CA826079E5251279","accentColor":"344868"},"50F37D4C6F2D1F72B05339C4726AC3770A4F4023":{"name":"VPS Hosting India Linux Virtuozzo vps Cloud hosting at data center in ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.CGjXICf35zPtA41GbhNckgAAAA?pid=Api","datePublished":"2018-07-23T17:00:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://impulseweb.in/images/ubuntu.gif","hostPageUrl":"https://impulseweb.in/vps/","contentSize":"1828 B","width":100,"height":26,"cDNContentUrl":"https://th.bing.com/th/id/R.0868d72027f7e733ed038d466e135c92?rik=BT%2fXxPbS8ScLNQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"3204F4A0773CA6274C93350B27F1D2F6C4D73F05","accentColor":"CC7A00"},"4A24ADCC55B37601EC3529016833C097AF7E7786":{"name":"Diploma Student: Introduction to Linux operating system","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.-P8Bd6Ziborg8Kr-4BzarwHaHz?pid=Api","datePublished":"2021-03-13T08:04:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://1.bp.blogspot.com/-Ly-laXMmi-M/X_sSznFSjvI/AAAAAAAAAxE/i9GJgCKuBc0TPIcKACVVyZou2Ekb91XbwCLcBGAsYHQ/s669/component.JPG","hostPageUrl":"https://www.diplomaincs.in/2021/01/introduction-to-linux-operating-system.html","contentSize":"58196 B","width":635,"height":669,"cDNContentUrl":"https://th.bing.com/th/id/R.f8ff0177a6626e8ae0f0aafee01cdaaf?rik=pELazFU7ZxDOUw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"6877E7FA790C3386109253CE10673B55CCDA42A4","accentColor":"9E6E2D"},"F0F634BE45CC34328D8D4F866F74A2EAAC106243":{"name":"British newspaper The Guardian hit by a ransomware attack - BusinessToday","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.QPXXJ181kLg-zqDv1yg6JAHaEK?pid=Api","datePublished":"2022-12-22T05:42:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://akm-img-a-in.tosshub.com/businesstoday/images/story/202212/merlin_132304460_860897a0-558e-44db-a990-f652fc785411-superjumbo-sixteen_nine.jpg","hostPageUrl":"https://www.businesstoday.in/technology/story/british-newspaper-the-guardian-hit-by-a-ransomware-attack-357342-2022-12-22","contentSize":"127035 B","width":1200,"height":675,"cDNContentUrl":"https://th.bing.com/th/id/R.40f5d7275f3590b83ecea0efd7283a24?rik=D29D61TMQyPY2A&pid=ImgRaw&r=0","isTransparent":false,"imageId":"342601CAAE2A47F668F4D8D82343CC54EB436F0F","accentColor":"733B31"},"D7DD88E19B06031C4D6539C4726AC3770A4F4023":{"name":"VPS Hosting India Linux Virtuozzo vps Cloud hosting at data center in ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.N76NRj4lkCV4il3DwH35DgAAAA?pid=Api","datePublished":"2018-07-23T17:00:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://impulseweb.in/images/bl-sep.gif","hostPageUrl":"https://impulseweb.in/vps/","contentSize":"696 B","width":16,"height":47,"cDNContentUrl":"https://th.bing.com/th/id/R.37be8d463e259025788a5dc3c07df90e?rik=fd2IHrlgMMHUVg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"3204F4A0773CA6274C9356D4C13060B91E88DD7D","accentColor":"01659E"},"2D56FAD8F3D7047C35E865E51A56D1FA25C52791":{"name":"Worried about ransomware attacks? Eliminate more threats with ONTAP ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.mJED0bbpX2Ng31-QGg4bJwHaDt?pid=Api","datePublished":"2022-06-07T16:44:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.netapp.com/media/REVISED-worried-about-ransomware-attacks-SOCIAL-520x260_tcm19-72291.jpg","hostPageUrl":"https://www.netapp.com/blog/new-ONTAP-innovations-June2022/","contentSize":"26791 B","width":520,"height":260,"cDNContentUrl":"https://th.bing.com/th/id/R.989103d1b6e95f6360df5f901a0e1b27?rik=0mWvjT99QMdTjg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"19725C52AF1D65A15E568E53C7407D3F8DAF65D2","accentColor":"726459"},"90831474E56561C78B1E851E36BF18BC40B8ADC5":{"name":"Linux Learners Guide – Book Written by Ankam Ravi Kumar - ARKIT","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.P0in8nWAeK-Jfg6yUYPHDwHaDp?pid=Api","datePublished":"2016-01-05T03:02:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://arkit.co.in/wp-content/uploads/2016/01/Linux-Book.png","hostPageUrl":"https://arkit.co.in/linux-learners-guide-book-written-by-ankam-ravi-kumar/","contentSize":"65949 B","width":1233,"height":607,"cDNContentUrl":"https://th.bing.com/th/id/R.3f48a7f2758078af897e0eb25183c70f?rik=CThBR15WFny44Q&pid=ImgRaw&r=0","isTransparent":false,"imageId":"5CDA8B04CB81FB63E158E1B87C16565E47413809","accentColor":"C95102"},"244D6C916A92311B52291BD9F3F5435039A92800":{"name":"USD/INR: Rupee Continues to Trade Above 86.50, at Record Low Ahead of U ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.iobsioLaNiFlR3SMbCeW-QHaDv?pid=Api","datePublished":"2025-09-11T21:50:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://w3assets.angelone.in/wp-content/uploads/2025/01/USD-INR-768x388.jpg","hostPageUrl":"https://www.angelone.in/news/economy/usd-inr-rupee-continues-to-trade-at-record-lows-ahead-of-us-inflation-data","contentSize":"57317 B","width":768,"height":388,"cDNContentUrl":"https://th.bing.com/th/id/R.8a86ec8a82da36216547748c6c2796f9?rik=QtTGGaYpE7Elkg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"00829A9305345F3F9DB19225B11329A619C6D442","accentColor":"B0611B"},"EA05D059E5D7D0281DBC7C4AFD98DC5ABB160798":{"name":"Ourtutorials - W3.CSS","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.sjY3qKaxOiRW0xP2bKwhTAHaCL?pid=Api","datePublished":"2021-12-13T09:43:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://ourtutorials.in/w3.css/img/w3_panel_w3_color_w3_round_size.JPG","hostPageUrl":"https://ourtutorials.in/w3.css/w3_panels.php","contentSize":"56603 B","width":1327,"height":391,"cDNContentUrl":"https://th.bing.com/th/id/R.b23637a8a6b13a2456d313f66cac214c?rik=rlANlV59DYLRyw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"897061BBA5CD89DFA4C7CBD1820D7D5E950D50AE","accentColor":"B9124B"}},"relatedSearches":[{"text":"Linux","displayText":"Linux","webSearchUrl":"https://www.bing.com/images/search?q=Linux&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5834.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Linux","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Linux&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Ransomware Us Linux System","displayText":"Ransomware Us Linux System","webSearchUrl":"https://www.bing.com/images/search?q=Ransomware+Us+Linux+System&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5836.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Ransomware+Us+Linux+System","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Ransomware+Us+Linux+System&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Lynx Attack Ransomware","displayText":"Lynx Attack Ransomware","webSearchUrl":"https://www.bing.com/images/search?q=Lynx+Attack+Ransomware&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5838.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Lynx+Attack+Ransomware","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Lynx+Attack+Ransomware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Ransomware as a Service","displayText":"Ransomware as a Service","webSearchUrl":"https://www.bing.com/images/search?q=Ransomware+as+a+Service&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5840.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Ransomware+as+a+Service","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Ransomware+as+a+Service&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Networking Ransomware","displayText":"Networking Ransomware","webSearchUrl":"https://www.bing.com/images/search?q=Networking+Ransomware&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5842.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Networking+Ransomware","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Networking+Ransomware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Ransomware Encrypted Files","displayText":"Ransomware Encrypted Files","webSearchUrl":"https://www.bing.com/images/search?q=Ransomware+Encrypted+Files&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5844.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Ransomware+Encrypted+Files","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Ransomware+Encrypted+Files&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Ransomware GUI","displayText":"Ransomware GUI","webSearchUrl":"https://www.bing.com/images/search?q=Ransomware+GUI&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5846.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Ransomware+GUI","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Ransomware+GUI&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Ransomware Cyber Attack","displayText":"Ransomware Cyber Attack","webSearchUrl":"https://www.bing.com/images/search?q=Ransomware+Cyber+Attack&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5848.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Ransomware+Cyber+Attack","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Ransomware+Cyber+Attack&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"anti-Linux","displayText":"anti-Linux","webSearchUrl":"https://www.bing.com/images/search?q=anti-Linux&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5850.1","searchLink":"https://www.bing.com/api/v7/images/search?q=anti-Linux","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=anti-Linux&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Ransomware Landing Page","displayText":"Ransomware Landing Page","webSearchUrl":"https://www.bing.com/images/search?q=Ransomware+Landing+Page&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5852.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Ransomware+Landing+Page","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Ransomware+Landing+Page&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Linux Malware","displayText":"Linux Malware","webSearchUrl":"https://www.bing.com/images/search?q=Linux+Malware&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5854.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Linux+Malware","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Linux+Malware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Lynx Ransomware Group","displayText":"Lynx Ransomware Group","webSearchUrl":"https://www.bing.com/images/search?q=Lynx+Ransomware+Group&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5856.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Lynx+Ransomware+Group","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Lynx+Ransomware+Group&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Ai Powered Ransomware","displayText":"Ai Powered Ransomware","webSearchUrl":"https://www.bing.com/images/search?q=Ai+Powered+Ransomware&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5858.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Ai+Powered+Ransomware","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Ai+Powered+Ransomware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Fog Ransomware","displayText":"Fog Ransomware","webSearchUrl":"https://www.bing.com/images/search?q=Fog+Ransomware&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5860.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Fog+Ransomware","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Fog+Ransomware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Linux Ransomware Note Screen Shot","displayText":"Linux Ransomware Note Screen Shot","webSearchUrl":"https://www.bing.com/images/search?q=Linux+Ransomware+Note+Screen+Shot&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5862.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Linux+Ransomware+Note+Screen+Shot","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Linux+Ransomware+Note+Screen+Shot&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Kali Linux Attack","displayText":"Kali Linux Attack","webSearchUrl":"https://www.bing.com/images/search?q=Kali+Linux+Attack&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5864.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Kali+Linux+Attack","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Kali+Linux+Attack&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Van Helsing Ransomware","displayText":"Van Helsing Ransomware","webSearchUrl":"https://www.bing.com/images/search?q=Van+Helsing+Ransomware&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5866.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Van+Helsing+Ransomware","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Van+Helsing+Ransomware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Ransomware Download","displayText":"Ransomware Download","webSearchUrl":"https://www.bing.com/images/search?q=Ransomware+Download&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5868.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Ransomware+Download","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Ransomware+Download&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Ransomware Workstations","displayText":"Ransomware Workstations","webSearchUrl":"https://www.bing.com/images/search?q=Ransomware+Workstations&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5870.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Ransomware+Workstations","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Ransomware+Workstations&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Ransomware Virus HSE","displayText":"Ransomware Virus HSE","webSearchUrl":"https://www.bing.com/images/search?q=Ransomware+Virus+HSE&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5872.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Ransomware+Virus+HSE","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Ransomware+Virus+HSE&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Qilin Ransomware On Red Hat Linux","displayText":"Qilin Ransomware On Red Hat Linux","webSearchUrl":"https://www.bing.com/images/search?q=Qilin+Ransomware+On+Red+Hat+Linux&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5874.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Qilin+Ransomware+On+Red+Hat+Linux","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Qilin+Ransomware+On+Red+Hat+Linux&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Doxware Ransomware","displayText":"Doxware Ransomware","webSearchUrl":"https://www.bing.com/images/search?q=Doxware+Ransomware&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5876.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Doxware+Ransomware","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Doxware+Ransomware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Suicide Linux","displayText":"Suicide Linux","webSearchUrl":"https://www.bing.com/images/search?q=Suicide+Linux&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5878.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Suicide+Linux","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Suicide+Linux&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Lynx Ransomware Diagram","displayText":"Lynx Ransomware Diagram","webSearchUrl":"https://www.bing.com/images/search?q=Lynx+Ransomware+Diagram&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5880.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Lynx+Ransomware+Diagram","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Lynx+Ransomware+Diagram&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Sony Ransomware","displayText":"Sony Ransomware","webSearchUrl":"https://www.bing.com/images/search?q=Sony+Ransomware&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5882.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Sony+Ransomware","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Sony+Ransomware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Ransomware Meaning","displayText":"Ransomware Meaning","webSearchUrl":"https://www.bing.com/images/search?q=Ransomware+Meaning&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5884.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Ransomware+Meaning","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Ransomware+Meaning&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Manjaro Linux Wallpaper","displayText":"Manjaro Linux Wallpaper","webSearchUrl":"https://www.bing.com/images/search?q=Manjaro+Linux+Wallpaper&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5886.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Manjaro+Linux+Wallpaper","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Manjaro+Linux+Wallpaper&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Diageo Ransomware","displayText":"Diageo Ransomware","webSearchUrl":"https://www.bing.com/images/search?q=Diageo+Ransomware&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5888.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Diageo+Ransomware","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Diageo+Ransomware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Medusa Ransomware Warning","displayText":"Medusa Ransomware Warning","webSearchUrl":"https://www.bing.com/images/search?q=Medusa+Ransomware+Warning&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5890.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Medusa+Ransomware+Warning","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Medusa+Ransomware+Warning&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Goosehead Ransomware","displayText":"Goosehead Ransomware","webSearchUrl":"https://www.bing.com/images/search?q=Goosehead+Ransomware&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5892.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Goosehead+Ransomware","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Goosehead+Ransomware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Ransomware Eamil","displayText":"Ransomware Eamil","webSearchUrl":"https://www.bing.com/images/search?q=Ransomware+Eamil&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5894.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Ransomware+Eamil","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Ransomware+Eamil&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Ransomware On Hospital System","displayText":"Ransomware On Hospital System","webSearchUrl":"https://www.bing.com/images/search?q=Ransomware+On+Hospital+System&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5896.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Ransomware+On+Hospital+System","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Ransomware+On+Hospital+System&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Qilin Ransomware Run On Linux","displayText":"Qilin Ransomware Run On Linux","webSearchUrl":"https://www.bing.com/images/search?q=Qilin+Ransomware+Run+On+Linux&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5898.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Qilin+Ransomware+Run+On+Linux","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Qilin+Ransomware+Run+On+Linux&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Lynx Ransomware Socradar","displayText":"Lynx Ransomware Socradar","webSearchUrl":"https://www.bing.com/images/search?q=Lynx+Ransomware+Socradar&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5900.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Lynx+Ransomware+Socradar","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Lynx+Ransomware+Socradar&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Linux Ăn Trộm","displayText":"Linux Ăn Trộm","webSearchUrl":"https://www.bing.com/images/search?q=Linux+%C4%82n+Tr%E1%BB%99m&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5902.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Linux+%C4%82n+Tr%E1%BB%99m","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Linux+%c4%82n+Tr%e1%bb%99m&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malware vs Ransomware","displayText":"Malware vs Ransomware","webSearchUrl":"https://www.bing.com/images/search?q=Malware+vs+Ransomware&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5904.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+vs+Ransomware","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Malware+vs+Ransomware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Ransomware Builder GitHub","displayText":"Ransomware Builder GitHub","webSearchUrl":"https://www.bing.com/images/search?q=Ransomware+Builder+GitHub&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5906.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Ransomware+Builder+GitHub","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Ransomware+Builder+GitHub&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Phishing Malware Ransomware","displayText":"Phishing Malware Ransomware","webSearchUrl":"https://www.bing.com/images/search?q=Phishing+Malware+Ransomware&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5908.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Phishing+Malware+Ransomware","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Phishing+Malware+Ransomware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Linux Server","displayText":"Linux Server","webSearchUrl":"https://www.bing.com/images/search?q=Linux+Server&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5910.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Linux+Server","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Linux+Server&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Lock Bit Ransomware Screen Shot","displayText":"Lock Bit Ransomware Screen Shot","webSearchUrl":"https://www.bing.com/images/search?q=Lock+Bit+Ransomware+Screen+Shot&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5912.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Lock+Bit+Ransomware+Screen+Shot","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Lock+Bit+Ransomware+Screen+Shot&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Ransomware Tweets","displayText":"Ransomware Tweets","webSearchUrl":"https://www.bing.com/images/search?q=Ransomware+Tweets&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5914.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Ransomware+Tweets","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Ransomware+Tweets&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Ransomware Attack and Education Image","displayText":"Ransomware Attack and Education Image","webSearchUrl":"https://www.bing.com/images/search?q=Ransomware+Attack+and+Education+Image&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5916.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Ransomware+Attack+and+Education+Image","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Ransomware+Attack+and+Education+Image&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Physical vs Hipervisor Ransomware","displayText":"Physical vs Hipervisor Ransomware","webSearchUrl":"https://www.bing.com/images/search?q=Physical+vs+Hipervisor+Ransomware&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5918.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Physical+vs+Hipervisor+Ransomware","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Physical+vs+Hipervisor+Ransomware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Ransomware Development Kits","displayText":"Ransomware Development Kits","webSearchUrl":"https://www.bing.com/images/search?q=Ransomware+Development+Kits&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5920.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Ransomware+Development+Kits","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Ransomware+Development+Kits&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Ransomware On Virtualization Platforms","displayText":"Ransomware On Virtualization Platforms","webSearchUrl":"https://www.bing.com/images/search?q=Ransomware+On+Virtualization+Platforms&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5922.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Ransomware+On+Virtualization+Platforms","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Ransomware+On+Virtualization+Platforms&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Brute Attack Kali Linux","displayText":"Brute Attack Kali Linux","webSearchUrl":"https://www.bing.com/images/search?q=Brute+Attack+Kali+Linux&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5924.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Brute+Attack+Kali+Linux","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Brute+Attack+Kali+Linux&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Ransomware Wallpaper 4K","displayText":"Ransomware Wallpaper 4K","webSearchUrl":"https://www.bing.com/images/search?q=Ransomware+Wallpaper+4K&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5926.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Ransomware+Wallpaper+4K","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Ransomware+Wallpaper+4K&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Ubuntu Ransomware","displayText":"Ubuntu Ransomware","webSearchUrl":"https://www.bing.com/images/search?q=Ubuntu+Ransomware&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5928.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Ubuntu+Ransomware","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Ubuntu+Ransomware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Monti Ransomware Publication","displayText":"Monti Ransomware Publication","webSearchUrl":"https://www.bing.com/images/search?q=Monti+Ransomware+Publication&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5930.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Monti+Ransomware+Publication","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Monti+Ransomware+Publication&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Ramsomware GUI","displayText":"Ramsomware GUI","webSearchUrl":"https://www.bing.com/images/search?q=Ramsomware+GUI&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5932.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Ramsomware+GUI","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Ramsomware+GUI&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}}],"createdate":1769840754164}
            [curl_error] => 
            [product_name_used] => Ransomware-Us-Linux
            [parsed] => Array
                (
                    [name] => ransomware-us-linux inr loc:in
                    [totalEstimatedMatches] => 404
                    [nextOffset] => 120
                    [currentOffset] => 0
                    [value] => Array
                        (
                            [C459A457D72D70A03ED0501E7FD8964AF9D3B450] => Array
                                (
                                    [name] => 1 US Dollar to Indian Rupee Today and in 1947 | USD to INR History ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.lXdb_O6fUnFzcP21wOqdUgHaE8?pid=Api
                                    [datePublished] => 2023-09-29T11:51:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://images.forbesindia.com/blog/wp-content/uploads/media/images/2024/Jan/img_226625_usdollartoindianrupee.jpg
                                    [hostPageUrl] => https://www.forbesindia.com/article/explainers/1-usd-to-inr-history/88635/1
                                    [contentSize] => 128370 B
                                    [width] => 900
                                    [height] => 600
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.95775bfcee9f52717370fdb5c0ea9d52?rik=TJVKdX3SBwrjDQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 054B3D9FA4698DF7E1050DE30A07D27D754A954C
                                    [accentColor] => BC670F
                                )

                            [A851A64C28C42FAD6AF0FE8F7515C837A43DF7F0] => Array
                                (
                                    [name] => Lockbit Linux ESXi Ransomware: Evasion Techniques and File Encryption ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.XHMgkwB_tKtZI_Xgr4rCvAHaE8?pid=Api
                                    [datePublished] => 2025-08-19T14:09:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://blogs.npav.net/media/magefan_blog/Lockbit_Linux_ESXi_ransomware_evasion_techniques_1_.png
                                    [hostPageUrl] => https://blogs.npav.net/blogs/post/lockbit-linux-esxi-ransomware-evasion-techniques-and-file-encryption-process
                                    [contentSize] => 300375 B
                                    [width] => 499
                                    [height] => 333
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.5c732093007fb4ab5923f5e0af8ac2bc?rik=ihVqxIJM8tqmDw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 0F7FD34A738C5157F8EF0FA6DAF24C82C46A158A
                                    [accentColor] => 018B48
                                )

                            [AF671544E1A4869BF417871DABF427E14470BB84] => Array
                                (
                                    [name] => 75% increase in ransomware attacks targeting Linux systems in 2022 ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.cozOkZQ_Krt16Ug4-TWs2AHaEu?pid=Api
                                    [datePublished] => 2022-09-05T00:16:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://etimg.etb2bimg.com/thumb/msid-93984399,imgsize-27576,width-1200,height=765,overlay-etciosea/news/security/75-increase-in-ransomware-attacks-targeting-linux-systems-in-2022-report.jpg
                                    [hostPageUrl] => https://ciosea.economictimes.indiatimes.com/news/security/75-increase-in-ransomware-attacks-targeting-linux-systems-in-2022-report/93984399
                                    [contentSize] => 56628 B
                                    [width] => 1200
                                    [height] => 765
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.728cce91943f2abb75e94838f935acd8?rik=%2bnZRRB5KaLlPcQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 48BB07441E724FBAD178714FB9684A1E445176FA
                                    [accentColor] => 7E7144
                                )

                            [7251CC0B43FA5BA3BA57FE8F7515C837A43DF7F0] => Array
                                (
                                    [name] => Lockbit Linux ESXi Ransomware: Evasion Techniques and File Encryption ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.aNw04qeMmjpn3OwyVkOrvgHaE8?pid=Api
                                    [datePublished] => 2025-08-19T14:09:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://blogs.npav.net/media/wysiwyg/Lockbit_Linux_ESXi_ransomware_evasion_techniques.png
                                    [hostPageUrl] => https://blogs.npav.net/blogs/post/lockbit-linux-esxi-ransomware-evasion-techniques-and-file-encryption-process
                                    [contentSize] => 288919 B
                                    [width] => 499
                                    [height] => 333
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.68dc34e2a78c9a3a67dcec325643abbe?rik=JxXMsDSvtTqrdQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 0F7FD34A738C5157F8EF75AB3AB5AF34B0CC1527
                                    [accentColor] => C20932
                                )

                            [EFFC538CF2AF5DCBF49B4E3749E2B3B4A9242BD2] => Array
                                (
                                    [name] => Cyber Swachhta Kendra: Linux-Lilu/Lilocked Ransomware
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.3-ofBbr7Lwh_fwGklC1fngHaEr?pid=Api
                                    [datePublished] => 2019-10-04T13:35:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.csk.gov.in/image/other/lilu1.jpg
                                    [hostPageUrl] => https://www.csk.gov.in/alerts/lilu.html
                                    [contentSize] => 91968 B
                                    [width] => 770
                                    [height] => 487
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.dfea1f05bafb2f087f7f01a4942d5f9e?rik=%2fs81yC%2f61bxPuQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 2DB2429A4B3B2E9473E4B94FBCD5FA2FC835CFFE
                                    [accentColor] => C99C02
                                )

                            [A9B7A9FAD12A3D1F2C805552655045B673EB1161] => Array
                                (
                                    [name] => How to know if your system has been infected by Ransomware, and what to ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.p8W7YQ7baKWpSsKkBU5MmAHaEK?pid=Api
                                    [datePublished] => 2017-06-11T21:33:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.zybra.in/wp-content/uploads/2017/05/WhatsApp-Image-2017-05-15-at-12.29.14-PM.jpeg
                                    [hostPageUrl] => https://www.zybra.in/blog/know-system-infected-ransomware/
                                    [contentSize] => 85928 B
                                    [width] => 1080
                                    [height] => 607
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.a7c5bb610edb68a5a94ac2a4054e4c98?rik=mnuarx2i0%2fHCCA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 1611BE376B540556255508C2F1D3A21DAF9A7B9A
                                    [accentColor] => 7B3123
                                )

                            [CFC9B2F8E516A1CC359ABC467294E51762A7E4FF] => Array
                                (
                                    [name] => Ransomware Data Recovery: Data Encrypted By Ransomware [2026]
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.XZkY7ma0qzTvbpJPgL1z1QHaEc?pid=Api
                                    [datePublished] => 2017-04-28T12:09:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.stellarinfo.co.in/blog/wp-content/uploads/2018/05/How-to-Recover-Data-Encrypted-by-Ransomware.jpg
                                    [hostPageUrl] => https://www.stellarinfo.co.in/blog/ransomware-virus-removal/
                                    [contentSize] => 41180 B
                                    [width] => 1000
                                    [height] => 600
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.5d9918ee66b4ab34ef6e924f80bd73d5?rik=%2fJwrj15hGsxTqQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => FF4E7A26715E492764CBA953CC1A615E8F2B9CFC
                                    [accentColor] => CAA001
                                )

                            [F8FAD61A9C8973F4268642B95F44B0C4873F4497] => Array
                                (
                                    [name] => Explainer: What is the WannaCry ransomware cyber attack and how to ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.6R2MJaO_4NT6Xjc7PS3CAAHaFY?pid=Api
                                    [datePublished] => 2017-05-15T06:23:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://s01.sgp1.digitaloceanspaces.com/inline/837653-eflfjprmuu-1494826592.jpg
                                    [hostPageUrl] => https://scroll.in/latest/837653/what-is-ransomware-and-how-to-protect-your-precious-files-from-it
                                    [contentSize] => 94883 B
                                    [width] => 800
                                    [height] => 581
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.e91d8c25a3bfe0d4fa5e373b3d2dc200?rik=j69tocmYN09iaA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 7944F3784C0B44F59B2468624F3798C9A16DAF8F
                                    [accentColor] => B6A915
                                )

                            [8710A9648C209AED60A94E3749E2B3B4A9242BD2] => Array
                                (
                                    [name] => Cyber Swachhta Kendra: Linux-Lilu/Lilocked Ransomware
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.9Y87t--WinyVZd_VI44p9gHaDa?pid=Api
                                    [datePublished] => 2019-10-04T13:35:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.csk.gov.in/image/other/lilu2.jpg
                                    [hostPageUrl] => https://www.csk.gov.in/alerts/lilu.html
                                    [contentSize] => 108632 B
                                    [width] => 939
                                    [height] => 433
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.f58f3bb7ef968a7c9565dfd5238e29f6?rik=eAGaRsgCqd4Gmg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 2DB2429A4B3B2E9473E49A06DEA902C8469A0178
                                    [accentColor] => C89C03
                                )

                            [A50C61AE26FC24F54AC84A47A764FF6D035DE94D] => Array
                                (
                                    [name] => Steering Clear of the “WannaCry” or “Wanna Decryptor” Ransomware Attack
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.C5lmWZuIGXUqEI-v3jBCAAAAAA?pid=Api
                                    [datePublished] => 2017-05-13T15:47:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.splunk.com/content/dam/splunk-blogs/images/2016/12/Ransomware_Kill_Chain.png
                                    [hostPageUrl] => https://www.splunk.com/blog/2017/05/13/steering-clear-of-the-wannacry-or-wanna-decryptor-ransomware-attack.html
                                    [contentSize] => 33733 B
                                    [width] => 474
                                    [height] => 198
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.0b9966599b8819752a108fafde304200?rik=WsAW6mLPQl%2bkjA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => D49ED530D6FF467A74A48CA45F42CF62EA16C05A
                                    [accentColor] => AA2123
                                )

                            [981372BC7E59458513951313D67CD4583E7859A4] => Array
                                (
                                    [name] => What is Ransomware?
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.f--SzwLAg316-5WoWYJYjQHaEL?pid=Api
                                    [datePublished] => 2018-06-24T10:02:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://content.kaspersky-labs.com/fm/press-releases/f8/f8a374b2a1c586b1fd4750859a19c74f/processed/ransomware-q75.jpg
                                    [hostPageUrl] => https://www.kaspersky.co.in/resource-center/threats/ransomware
                                    [contentSize] => 24137 B
                                    [width] => 710
                                    [height] => 400
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.7fef92cf02c0837d7afb95a85982588d?rik=iTEny%2beVVFgxWQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 4A9587E3854DC76D31315931585495E7CB273189
                                    [accentColor] => B63115
                                )

                            [1255C961F4F03F7E55404E3749E2B3B4A9242BD2] => Array
                                (
                                    [name] => Cyber Swachhta Kendra: Linux-Lilu/Lilocked Ransomware
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.XPodA_nuqqT3baLv0JTdBQHaDp?pid=Api
                                    [datePublished] => 2019-10-04T13:35:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.csk.gov.in/image/other/lilu3.jpg
                                    [hostPageUrl] => https://www.csk.gov.in/alerts/lilu.html
                                    [contentSize] => 57193 B
                                    [width] => 1012
                                    [height] => 498
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.5cfa1d03f9eeaaa4f76da2efd094dd05?rik=IVWcFk8P8%2bdVBA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 2DB2429A4B3B2E9473E40455E7F30F4F169C5521
                                    [accentColor] => C99C02
                                )

                            [2CE41672DC78F424A6538FEC7785AA5AD032582D] => Array
                                (
                                    [name] => Cyber Swachhta Kendra: BlackCat Ransomware
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.bUMXi8oWJWRJ5N3fgVcBDAHaGw?pid=Api
                                    [datePublished] => 2022-09-15T22:35:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.csk.gov.in/image/other/BlackCat_1.jpg
                                    [hostPageUrl] => https://www.csk.gov.in/alerts/BlackCat_ransomware.html
                                    [contentSize] => 30564 B
                                    [width] => 649
                                    [height] => 592
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.6d43178bca16256449e4dddf8157010c?rik=wk5hJ82HT0JqNQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => D285230DA5AA5877CEF8356A424F87CD27614EC2
                                    [accentColor] => C0470B
                                )

                            [B5890FC70D4BD58498406CCCFCBB6789838D6FE8] => Array
                                (
                                    [name] => Ransomware and Viruses: Top differences you should know | nasscom | The ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.JsNlmwtkzalhlan6cqs5HgHaEo?pid=Api
                                    [datePublished] => 2020-10-09T09:57:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.znetlive.com/blog/wp-content/uploads/2020/09/ransomware-featured-compressed.jpg
                                    [hostPageUrl] => https://community.nasscom.in/communities/it-services/data-privacy-day/ransomware-and-viruses-top-differences-you-should-know.html
                                    [contentSize] => 76490 B
                                    [width] => 1000
                                    [height] => 625
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.26c3659b0b64cda96195a9fa72ab391e?rik=W5jwfNC0XUiJBA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 8EF6D8389876BBCFCCC60489485DB4D07CF0985B
                                    [accentColor] => 0A326A
                                )

                            [FAF695E60120C15D288E748BDCB642692639C6D6] => Array
                                (
                                    [name] => Worst Ransomware Attacks
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.cwDvLjc096KpBNIBAlGJUgHaEL?pid=Api
                                    [datePublished] => 2018-08-05T17:18:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.kaspersky.co.in/content/en-in/images/repository/isc/2017-images/Ransomware-attacks-2017.jpg
                                    [hostPageUrl] => https://www.kaspersky.co.in/resource-center/threats/ransomware-threats-an-in-depth-guide
                                    [contentSize] => 128049 B
                                    [width] => 710
                                    [height] => 400
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.7300ef2e3734f7a2a904d20102518952?rik=r29ZbhACHNWC6A&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 6D6C936296246BCDB847E882D51C02106E596FAF
                                    [accentColor] => 4D005E
                                )

                            [6EADF34DC1DC075F27CE66E907D6DF5664AF1FD3] => Array
                                (
                                    [name] => What is ransomware as a service? | Kaspersky
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.kDJn7Kc7h37caMVxBKAYJwHaE7?pid=Api
                                    [datePublished] => 2023-11-01T12:19:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://content.kaspersky-labs.com/fm/press-releases/ce/ce70b9289f191b50c92c10eb7da51696/processed/shutterstock1612695883-q75.jpg
                                    [hostPageUrl] => https://www.kaspersky.co.in/resource-center/definitions/what-is-ransomware-as-a-service
                                    [contentSize] => 25010 B
                                    [width] => 670
                                    [height] => 446
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.903267eca73b877edc68c57104a01827?rik=5to%2f1BzNcPVy7A&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 3DF1FA4665FD6D709E66EC72F570CD1CD43FDAE6
                                    [accentColor] => 26748B
                                )

                            [8A0477F40BF194E293B1A7663D557C360DA91053] => Array
                                (
                                    [name] => What Is Ransomware? - Cisco
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.aiiukI3kX7FF-G1fURxyggHaD4?pid=Api
                                    [datePublished] => 2010-03-31T19:11:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.cisco.com/content/dam/cisco-cdc/site/us/en/images/security/what-is-ransomware-1200x630.png
                                    [hostPageUrl] => https://www.cisco.com/site/in/en/learn/topics/security/what-is-ransomware.html
                                    [contentSize] => 40757 B
                                    [width] => 1200
                                    [height] => 630
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.6a28ae908de45fb145f86d5f511c7282?rik=qEB3T7AfSS45Gw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 35019AD063C755D3667A1B392E491FB04F7740A8
                                    [accentColor] => 00A2CC
                                )

                            [24853F9F038A507F2A9E1F2C8D9AAF038C6EAB82] => Array
                                (
                                    [name] => Cyber Swachhta Kendra: RansomHub Ransomware
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.4V_VcdjYq7l4iVGeWtU8EwHaEA?pid=Api
                                    [datePublished] => 2024-11-04T16:50:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.csk.gov.in/image/other/RansomHub_2.jpg
                                    [hostPageUrl] => https://www.csk.gov.in/alerts/RansomHub_Ransomware.html
                                    [contentSize] => 73294 B
                                    [width] => 1076
                                    [height] => 582
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.e15fd571d8d8abb97889519e5ad53c13?rik=Qljz%2bTCoBfei6Q&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 28BAE6C830FAA9D8C2F1E9A2F705A830F9F35842
                                    [accentColor] => 666666
                                )

                            [09CAE5ACD2A60FFE2C2F14FB91DB872CC4234183] => Array
                                (
                                    [name] => Methods to Recover Encrypted Excel Files - Stellar Data Recovery
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.-B7Wz3NMtTL0827zaMvLXgHaEc?pid=Api
                                    [datePublished] => 2019-09-15T01:45:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.stellarinfo.co.in/blog/wp-content/uploads/2016/12/How-to-Recover-Excel-Files-Encrypted-by-Cerber-Ransomware-Virus-1.jpg
                                    [hostPageUrl] => https://www.stellarinfo.co.in/blog/recover-encrypted-excel-files/
                                    [contentSize] => 92623 B
                                    [width] => 1000
                                    [height] => 600
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.f81ed6cf734cb532f4f36ef368cbcb5e?rik=kKxeyi1q8O%2fC8g&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 3814324CC278BD19BF41F2C2EFF06A2DCA5EAC90
                                    [accentColor] => 304075
                                )

                            [F63095A235ABA4905D3C1A109BC792C0DC239D3C] => Array
                                (
                                    [name] => ransomware: US infiltrates big ransomware gang: 'We hacked the hackers ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.JnGCGGWBrrz57t-T1UryNgHaD4?pid=Api
                                    [datePublished] => 2023-01-27T02:35:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://img.etimg.com/thumb/msid-97362803,width-1200,height-630,imgsize-97268,overlay-economictimes/articleshow.jpg
                                    [hostPageUrl] => https://economictimes.indiatimes.com/news/international/world-news/us-infiltrates-big-ransomware-gang-we-hacked-the-hackers/articleshow/97362777.cms
                                    [contentSize] => 41002 B
                                    [width] => 1200
                                    [height] => 630
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.267182186581aebcf9eedf93d54af236?rik=bwNZKlO6SgnVww&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => C3D932CD0C297CB901A1C3D5094ABA532A59036F
                                    [accentColor] => 2951A2
                                )

                            [29C15A9C1A458A2CF1B6FC8EDB7813DD66F7D100] => Array
                                (
                                    [name] => Full protection against Petya, WannaCry ransomware | ESET
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.ARW7N5ZtDAEOwxcwkk2zKgHaHa?pid=Api
                                    [datePublished] => 2019-04-25T17:36:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.eset.com/fileadmin/ESET/US/Pages/features/ransomware-circle-lg.png
                                    [hostPageUrl] => https://www.eset.com/in/ransomware-attacks/
                                    [contentSize] => 485724 B
                                    [width] => 500
                                    [height] => 500
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.0115bb37966d0c010ec31730924db32a?rik=khylyaFUqMIfaw&pid=ImgRaw&r=0
                                    [isTransparent] => 1
                                    [imageId] => 001D7F66DD3187BDE8CF6B1FC2A854A1C9A51C92
                                    [accentColor] => 0540C6
                                )

                            [E83F531622FB86E8C07AD04EBAE3C069EB759676] => Array
                                (
                                    [name] => Wat u wel en niet moet doen om uzelf te beschermen tegen ransomware ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.E2gXRq82bDxc8pGhxaY9BAHaCm?pid=Api
                                    [datePublished] => 2025-09-08T02:11:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.seqrite.com/blog/wp-content/uploads/2017/06/Dos-and-Donts-post-770x270.jpg
                                    [hostPageUrl] => https://www.seqrite.com/nl/blog/dos-and-donts-to-stay-safe-from-ransomware-infographic/
                                    [contentSize] => 39827 B
                                    [width] => 770
                                    [height] => 270
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.13681746af366c3c5cf291a1c5a63d04?rik=jvM1YSK%2faI4Mpw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 676957BE960C3EABE40DA70C8E68BF226135F38E
                                    [accentColor] => C69905
                                )

                            [017E06A6DF409E123CC5F48D741325D8BDF35AFF] => Array
                                (
                                    [name] => Ransomware Encrypts Nearly 100,000 Files in Under 45 Minutes | Splunk
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.9nQQsVXpfu9MqxdnDNaQIgHaEc?pid=Api
                                    [datePublished] => 2022-03-23T00:00:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.splunk.com/content/dam/splunk-blogs/images/en_us/2022/03/surge-ransomware-research-hero.png
                                    [hostPageUrl] => https://www.splunk.com/en_us/blog/security/ransomware-encrypts-nearly-100-000-files-in-under-45-minutes.html
                                    [contentSize] => 55507 B
                                    [width] => 1000
                                    [height] => 600
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.f67410b155e97eef4cab17670cd69022?rik=EOdgav0E6SHDXA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => FFA53FDB8D523147D84F5CC321E904FD6A60E710
                                    [accentColor] => 24A7A6
                                )

                            [251D5E08F8BC8CC4C534ADE82D4B8D07F61C1AA0] => Array
                                (
                                    [name] => Top 60 Linux commands every user should know + cheat sheet
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.TqjI5j4hE74W0I4MSqfyawHaDf?pid=Api
                                    [datePublished] => 2019-05-28T13:25:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.hostinger.com/tutorials/wp-content/uploads/sites/2/2024/08/systemctl-command-lists-all-services-1024x482.png
                                    [hostPageUrl] => https://www.hostinger.in/tutorials/linux-commands
                                    [contentSize] => 248917 B
                                    [width] => 1024
                                    [height] => 482
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.4ea8c8e63e2113be16d08e0c4aa7f26b?rik=UtHlgI%2fLyExcQw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 0AA1C16F70D8B4D28EDA435C4CC8CB8F80E5D152
                                    [accentColor] => A53B26
                                )

                            [CCE63FAD5C14F5E8870DD4DAA82C5AAE6883F97E] => Array
                                (
                                    [name] => Ransomware kosztuje polskie firmy średnio 1,5 mln zł - TELKO.in
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.vBsoMJjvD9iZMdn7SJRikQHaEK?pid=Api
                                    [datePublished] => 2021-05-10T05:34:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.telko.in/download,7006,Ransomware_.jpg
                                    [hostPageUrl] => https://www.telko.in/ransomware-kosztuje-polskie-firmy-srednio-15-mln-zl
                                    [contentSize] => 223490 B
                                    [width] => 1000
                                    [height] => 562
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.bc1b283098ef0fd89931d9fb48946291?rik=zG7z2sVBX4540A&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => E79F3886EAA5C28AAD4DD0788E5F41C5DAF36ECC
                                    [accentColor] => C14708
                                )

                            [057ADD75B2F3E2EAED3790F1BB4AE568DEB1CA7E] => Array
                                (
                                    [name] => Cyber Swachhta Kendra: “Black Basta” Ransomware
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.JXqACRl79bdpfeuIQVZcmgHaEv?pid=Api
                                    [datePublished] => 2022-06-09T14:39:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.csk.gov.in/image/other/Black_basta-paymentSite.jpg
                                    [hostPageUrl] => https://www.csk.gov.in/alerts/BlackBasta_ransomware.html
                                    [contentSize] => 37951 B
                                    [width] => 747
                                    [height] => 478
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.257a8009197bf5b7697deb8841565c9a?rik=UKfdVys%2fLq7ecw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => E7AC1BED865EA4BB1F0973DEAE2E3F2B57DDA750
                                    [accentColor] => 071016
                                )

                            [C197865223D630AE97E6E695217F78ACC9494284] => Array
                                (
                                    [name] => 300 Indian Banks Hit by Ransomware Attack
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.yzmCYYkciE7x4TDQMR8XOwHaEK?pid=Api
                                    [datePublished] => 2024-08-01T08:50:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.studyiq.com/articles/wp-content/uploads/2024/08/01141351/Indian-Banks-hit-by-Ransomware-Attack-blog.png
                                    [hostPageUrl] => https://www.studyiq.com/articles/indian-banks-hit-by-ransomware-attack/
                                    [contentSize] => 505160 B
                                    [width] => 1280
                                    [height] => 720
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.cb398261891c884ef1e130d0311f173b?rik=HHloJTJtA%2bp5bg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 4824949CCA87F712596E6E79EA036D322568791C
                                    [accentColor] => 0CBF79
                                )

                            [FE4842B23C2C8BDAC114F5804517ACD5A0E9DCFD] => Array
                                (
                                    [name] => Linux: How to find the SAS/SATA/SSD hard drive serial number and ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP._5pRVH-W5WJC0Rciu4kiZwHaC6?pid=Api
                                    [datePublished] => 2023-10-24T04:07:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://supportkb.dell.com/img/ka06P0000011MjXQAU/ka06P0000011MjXQAU_en_US_5.png
                                    [hostPageUrl] => https://www.dell.com/support/kbdoc/en-in/000212962/how-to-find-the-sas-sata-ssd-hard-drive-serial-number-and-physical-slot-mapping-on-the-power-edge-in-the-linux-operating-system-or-from-the-sos-report
                                    [contentSize] => 131474 B
                                    [width] => 1874
                                    [height] => 739
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.ff9a51547f96e56242d11722bb892267?rik=74QkK8PCuK0cQQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => DFCD9E0A5DCA7154085F411CADB8C2C32B2484EF
                                    [accentColor] => 15C101
                                )

                            [3595D04D760554C2EFFE42B5B7EF13FDE4FC9E22] => Array
                                (
                                    [name] => 2023 Ransomware Attack on Indian Defence Unit: A DoPT Report Insight
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.WdtvKJNrkaHEQ_vvbJpVZgHaGe?pid=Api
                                    [datePublished] => 2024-11-12T00:00:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://vajiramandravi.com/current-affairs/wp-content/uploads/2025/05/2023_ransomware_attack_on_indian_defence_unit_a_dopt_report_insight.webp
                                    [hostPageUrl] => https://vajiramandravi.com/current-affairs/2023-ransomware-attack-on-indian-defence-unit-a-dopt-report-insight/
                                    [contentSize] => 12210 B
                                    [width] => 546
                                    [height] => 478
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.59db6f28936b91a1c443fbef6c9a5566?rik=U1kN1GdQRSz%2b7w&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 22E9CF4EDF31FE7B5B24EFFE2C455067D40D5953
                                    [accentColor] => 400000
                                )

                            [D30B176B0130BD25259E92BAD72660E0FDAC3FDF] => Array
                                (
                                    [name] => Ransomware, IoT attacks rise in 2020: Study | itnext.in
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.UwBWZfOjCuGroIx0Rg9hbgHaE8?pid=Api
                                    [datePublished] => 2020-11-05T15:21:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.itnext.in/sites/default/files/Ransomware_2.jpg
                                    [hostPageUrl] => https://www.itnext.in/article/2020/11/05/ransomware-iot-attacks-rise-2020-study
                                    [contentSize] => 99280 B
                                    [width] => 750
                                    [height] => 500
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.53005665f3a30ae1aba08c74460f616e?rik=PbBxthAD21JS6Q&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => FDF3CADF0E06627DAB29E95252DB0310B671B03D
                                    [accentColor] => AD3E1E
                                )

                            [B514A3B04DC114B56EC49ACB807A9BEE54F33EF7] => Array
                                (
                                    [name] => India Is The Second Most Hit Country For Ransomware After U.S., Claims ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.yIU4z8peaXaUzfiXFUiyVQHaEK?pid=Api
                                    [datePublished] => 2020-10-07T11:26:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://sm.mashable.com/mashable_in/seo/2/21739/21739_k28n.jpg
                                    [hostPageUrl] => https://in.mashable.com/tech/17481/india-is-the-second-most-hit-country-for-ransomware-after-us-claims-report
                                    [contentSize] => 232752 B
                                    [width] => 1281
                                    [height] => 721
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.c88538cfca5e697694cdf8971548b255?rik=W0E6C9QcQVvmTA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 7FE33F45EEB9A708BCA94CE65B411CD40B3A415B
                                    [accentColor] => CC6B00
                                )

                            [3B0FBF4E84353BFAFE69D2634F24CFC18E01E1D9] => Array
                                (
                                    [name] => Remember The Sony Pictures Hack & WannaCry Ransomware? US Blames It On ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.XYuNyXTcZ9tmjETuV1aKwAHaE7?pid=Api
                                    [datePublished] => 2018-09-07T13:35:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://im.indiatimes.in/content/2018/Sep/north_korean_hack_1536313625.jpg?w=725&h=483&cc=1&webp=1&q=75
                                    [hostPageUrl] => https://www.indiatimes.com/technology/news/remember-the-sony-pictures-hack-wannacry-ransomware-us-blames-it-on-this-north-korean-spy-352621.html
                                    [contentSize] => 19634 B
                                    [width] => 725
                                    [height] => 483
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.5d8b8dc974dc67db668c44ee57568ac0?rik=s%2fD75EhTs6%2fvlg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 9D1E10E81CFC42F4362D96EFAFB35348E4FBF0B3
                                    [accentColor] => AC321F
                                )

                            [ADBBADBA1C9FA1ADEBFCAF6BEFE7D0D44368C6BE] => Array
                                (
                                    [name] => Ransomware Jokes And Memes
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.SsJLFEw4vUHBphVvhlkgOQHaD4?pid=Api
                                    [datePublished] => 2020-04-28T17:57:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://img.mensxp.com/media/content/2017/May/ransomware-social-1495276473.jpg
                                    [hostPageUrl] => https://www.mensxp.com/special-features/today/37028-these-jokes-and-memes-on-the-lsquo-wannacry-rsquo-ransomware-has-us-rolling-on-the-floor.html
                                    [contentSize] => 51252 B
                                    [width] => 800
                                    [height] => 420
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.4ac24b144c38bd41c1a6156f86592039?rik=2rvaq8H5Gtq%2bzw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => EB6C86344D0D7EFEB6FACFBEDA1AF9C1ABDABBDA
                                    [accentColor] => C0530B
                                )

                            [A806476574FCCB5A83568D941CE7A1655EFF1345] => Array
                                (
                                    [name] => Ransomware - US-Regierung warnt vor Lösegeld-Zahlung
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.iFvdfIxzRaWzESv_ViktGAHaEK?pid=Api
                                    [datePublished] => 2020-10-08T18:22:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://web-assets.esetstatic.com/tn/-x700/wls/2020/10/wls_ransomware-treasury-warning-paying-up-fines_fhd.jpg
                                    [hostPageUrl] => https://www.welivesecurity.com/deutsch/2020/10/08/ransomware-us-regierung-warnt-vor-loesegeld-zahlung/
                                    [contentSize] => 118262 B
                                    [width] => 1244
                                    [height] => 700
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.885bdd7c8c7345a5b3112bff56292d18?rik=imB0VkfPvKU4ZQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 5431FFE5561A7EC149D86538A5BCCF475674608A
                                    [accentColor] => 12787E
                                )

                            [2009F255628F66DE7B5BD2634F24CFC18E01E1D9] => Array
                                (
                                    [name] => Remember The Sony Pictures Hack & WannaCry Ransomware? US Blames It On ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.QA6QUmPCok0TcM341HzgPgHaFj?pid=Api
                                    [datePublished] => 2018-09-07T13:35:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://im.indiatimes.in/facebook/2018/Sep/north_korean_hack_1536313597.jpg?w=1200&h=900&cc=1&webp=1&q=75
                                    [hostPageUrl] => https://www.indiatimes.com/technology/news/remember-the-sony-pictures-hack-wannacry-ransomware-us-blames-it-on-this-north-korean-spy-352621.html
                                    [contentSize] => 40560 B
                                    [width] => 1200
                                    [height] => 900
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.400e905263c2a24d1370cdf8d47ce03e?rik=ApAvVSb4Zu23tQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 9D1E10E81CFC42F4362DB5B7ED66F826552F9002
                                    [accentColor] => 096936
                                )

                            [1400228AE5AC01F2D81B7E1DC955671CD317E2A6] => Array
                                (
                                    [name] => Ransomware Groundhog Day: Elevating Your Program in a High-Threat ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.5QG5bXA0tMpjL4YzFBelfwHaE8?pid=Api
                                    [datePublished] => 2021-07-08T00:00:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.splunk.com/content/dam/splunk-blogs/images/en_us/2021/07/securitylaptop.jpg
                                    [hostPageUrl] => https://www.splunk.com/en_us/blog/security/ransomware-groundhog-day-elevating-your-program-in-a-high-threat-environment.html
                                    [contentSize] => 385939 B
                                    [width] => 1920
                                    [height] => 1281
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.e501b96d7034b4ca632f86331417a57f?rik=QQAiqF7KEC%2bNsQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 6A2E713DC176559CD1E7B18D2F10CA5EA8220041
                                    [accentColor] => C60805
                                )

                            [AA3C40F4CC8E37A08932AA5C0F301BB8238B8B07] => Array
                                (
                                    [name] => Ransomware Detection & Response Virtual Showcase – EMEA | Trellix
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.s3fT3mwAD-1Z07ni6GToUgHaHa?pid=Api
                                    [datePublished] => 2023-10-13T23:07:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.trellix.com/en-us/img/headshots/graham-cluley-bw.jpg
                                    [hostPageUrl] => https://www.trellix.com/about/events/2023/ransomware-showcase/emea/
                                    [contentSize] => 50217 B
                                    [width] => 650
                                    [height] => 650
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.b377d3de6c000fed59d3b9e2e864e852?rik=qsMET8zocwqYIw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 70B8B8328BB103F0C5AA23980A73E8CC4F04C3AA
                                    [accentColor] => 282828
                                )

                            [34B71933E1EF1C534B55C7E6F73CB006A2C7CB01] => Array
                                (
                                    [name] => DHS Secretary Alejandro Mayorkas Gives Remarks at the International ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.MjFeRxZ78AzTtE6Hn9eKnQHaE7?pid=Api
                                    [datePublished] => 2023-11-14T04:38:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.dhs.gov/medialibrary-assets/assets-temp/231101-h-ks211-0031.jpg
                                    [hostPageUrl] => https://www.cbp.gov/medialibrary/assets/images/49716
                                    [contentSize] => 1143875 B
                                    [width] => 3500
                                    [height] => 2333
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.32315e47167bf00cd3b44e879fd78a9d?rik=Q3uRMx7%2bwTW0VQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 10BC7C2A600BC37F6E7C55B435C1FE1E33917B43
                                    [accentColor] => 91773A
                                )

                            [B1D5A26CEDFCAAD54469AA5C0F301BB8238B8B07] => Array
                                (
                                    [name] => Ransomware Detection & Response Virtual Showcase – EMEA | Trellix
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.62e8GF_E3ZMOqa2m3KEGDQHaHa?pid=Api
                                    [datePublished] => 2023-10-13T23:07:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.trellix.com/en-us/img/headshots/fabian-rech-headshot.jpg
                                    [hostPageUrl] => https://www.trellix.com/about/events/2023/ransomware-showcase/emea/
                                    [contentSize] => 85765 B
                                    [width] => 800
                                    [height] => 800
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.eb67bc185fc4dd930ea9ada6dca1060d?rik=G10qxt7Pql1Elg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 70B8B8328BB103F0C5AA96445DAACFDEC62A5D1B
                                    [accentColor] => 005D82
                                )

                            [9F4DE249BB6995FB984DECEC2658FE1473C1D86C] => Array
                                (
                                    [name] => Ransomware Detection & Response Virtual Showcase – APJ | Trellix
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.sB6Rjd6J3E6FiSUHzfmUxQHaHa?pid=Api
                                    [datePublished] => 2023-10-13T23:07:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.trellix.com/en-us/img/headshots/vicki-batka-headshot.jpg
                                    [hostPageUrl] => https://www.trellix.com/about/events/2023/ransomware-showcase/apj/
                                    [contentSize] => 71259 B
                                    [width] => 800
                                    [height] => 800
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.b01e918dde89dc4e85892507cdf994c5?rik=%2bdQulLuWWb%2bJ1A&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => C68D1C3741EF8562CECED489BF5996BB942ED4F9
                                    [accentColor] => 1C46AF
                                )

                            [947D1B52569A1DB85F9581C15ACDB28F27BFB93F] => Array
                                (
                                    [name] => Rupee likely to go to 81 82 to the US dollar, or even higher. Here’s ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.8yK2Iflm2TH8U9nkiCAPEQHaEK?pid=Api
                                    [datePublished] => 2022-09-22T15:16:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://akm-img-a-in.tosshub.com/businesstoday/images/story/202209/currency_-sixteen_nine.jpg
                                    [hostPageUrl] => https://www.businesstoday.in/latest/economy/story/rupee-likely-to-go-to-81-82-to-the-us-dollar-or-even-higher-heres-why-and-why-you-should-not-care-347977-2022-09-22
                                    [contentSize] => 157636 B
                                    [width] => 1200
                                    [height] => 675
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.f322b621f966d931fc53d9e488200f11?rik=SdexJWWp0Yv1WQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => F39BFB72F82BDCA51C1859F58BD1A96525B1D749
                                    [accentColor] => 3A7A6A
                                )

                            [CF244B5AA25E72CD026B825E0457AC58B0B4041C] => Array
                                (
                                    [name] => Cyber Swachhta Kendra: WastedLocker Ransomware
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.z1GC6kxUlgwnwdWbVOCHdwAAAA?pid=Api
                                    [datePublished] => 2020-07-17T07:14:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.csk.gov.in/image/logo/info-sec.jpg
                                    [hostPageUrl] => https://www.csk.gov.in/alerts/WastedLockerRansomware.html
                                    [contentSize] => 14853 B
                                    [width] => 266
                                    [height] => 64
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.cf5182ea4c54960c27c1d59b54e08777?rik=%2fEK0pSrlJ9wgtg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => C1404B0B85CA7540E528B620DC27E52AA5B442FC
                                    [accentColor] => 056A91
                                )

                            [0B81244579DC6AE0475625BC450D4744BAA4A813] => Array
                                (
                                    [name] => Rimini Street kündigt Rimini Protect™ Advanced Hypervisor Security für ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.zpqxNYFAbmOd3FiGp9l5VgHaHa?pid=Api
                                    [datePublished] => 2025-01-23T01:27:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://mms.businesswire.com/media/20250122857751/de/2359579/4/Vali_Cyber_Announcement.jpg
                                    [hostPageUrl] => https://boerse-social.com/2025/01/22/rimini_street_kandigt_rimini_protecta_advanced_hypervisor_security_far_vmware_nutanix_und_alle_anderen_linux-basierten_hypervisoren_an_die_von_vali_cybera_unterstatzt_wird_um_vor_ransomware_und_anderen_schwachstellen_zu_schatzen
                                    [contentSize] => 179380 B
                                    [width] => 480
                                    [height] => 480
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.ce9ab13581406e639ddc5886a7d97956?rik=sBhCVJfNpg50ZQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 318A4AAB4474D054CB5265740EA6CD97544218B0
                                    [accentColor] => C8AF03
                                )

                            [60725A48CEC1301E291725C9B0CBDA99E787A412] => Array
                                (
                                    [name] => Image
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.TzBfLqT-PdVv3TKNLPIIPQHaDd?pid=Api
                                    [datePublished] => 2021-01-31T17:37:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.linuxlifesciences.com/Image/banner2.jpg
                                    [hostPageUrl] => https://linuxlifesciences.com/
                                    [contentSize] => 852935 B
                                    [width] => 1500
                                    [height] => 700
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.4f305f2ea4fe3dd56fdd328d2cf2083d?rik=BielhOwcA%2bGScQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 214A787E99ADBC0B9C527192E1031CEC84A52706
                                    [accentColor] => 30669B
                                )

                            [57B687266579E07C707EE664A691E3E39AB23B4C] => Array
                                (
                                    [name] => Building wave of ransomware attacks strike US hospitals
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.b7_r-coS9_mF8XN1ckbIpwHaE8?pid=Api
                                    [datePublished] => 2022-07-21T12:25:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://media.dtnext.in/imported/import/Articles/2020/Oct/202010291059153717_Building-wave-of-ransomware-attacks-strike-US-hospitals_SECVPF.gif
                                    [hostPageUrl] => https://www.dtnext.in/world/2020/10/29/building-wave-of-ransomware-attacks-strike-us-hospitals
                                    [contentSize] => 80017 B
                                    [width] => 620
                                    [height] => 414
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.6fbfebf9ca12f7f985f173757246c8a7?rik=dWt4YlaXDscH5w&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => C4B32BA93E3E196A466EE707C70E975662786B75
                                    [accentColor] => 182B6C
                                )

                            [AE59430787171D8A6182D414271FABEC7BDF494B] => Array
                                (
                                    [name] => OpsPatuk: DragonForce starts ransomware attacks
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.xK0LG4Q32qQc-WW75WNvYAHaLw?pid=Api
                                    [datePublished] => 2022-06-27T01:28:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://gumlet.assettype.com/freepressjournal/2022-06/41b03a6a-7e7d-4eb4-91d8-e1220689a192/Screenshot_2022_06_24_19_44_19_95_948cd9899890cbd5c2798760b2b95377.jpg
                                    [hostPageUrl] => https://www.freepressjournal.in/mumbai/opspatuk-dragonforce-starts-ransomware-attacks
                                    [contentSize] => 173025 B
                                    [width] => 1080
                                    [height] => 1715
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.c4ad0b1b8437daa41cf965bbe5636f60?rik=6pU0cHhx0agWKA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => B494FDB7CEBAF172414D2816A8D17178703495EA
                                    [accentColor] => B3181E
                                )

                            [32EDD0B2D3A6B9E498C9BA1E80B0107BD78E4F43] => Array
                                (
                                    [name] => रैंसमवेयर सुरक्षा सेवाएं और समाधान . द्वारा phoenixNAP
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.fXhptFN8xS3_6T98C9sHgwAAAA?pid=Api
                                    [datePublished] => 2022-02-20T03:21:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://phoenixnap.com/wp-content/uploads/2021/08/phoenixNAP-Linux-Ransomware-Blog.jpg
                                    [hostPageUrl] => https://phoenixnap.in/%E0%A4%B0%E0%A5%88%E0%A4%82%E0%A4%B8%E0%A4%AE%E0%A4%B5%E0%A5%87%E0%A4%AF%E0%A4%B0-%E0%A4%B8%E0%A5%81%E0%A4%B0%E0%A4%95%E0%A5%8D%E0%A4%B7%E0%A4%BE
                                    [contentSize] => 15626 B
                                    [width] => 400
                                    [height] => 267
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.7d7869b4537cc52dffe93f7c0bdb0783?rik=I94NKz1qm06JnA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 34F4E87DB7010B08E1AB9C894E9B6A3D2B0DDE23
                                    [accentColor] => 0796C4
                                )

                            [34900794EA15843D9FF3600BCD77B4DBFA5A4AA2] => Array
                                (
                                    [name] => Hoe klaar bent u voor de evolutie van ransomware? | Seqrite
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.mNT1718cBWqNPqsNxesRtAHaFj?pid=Api
                                    [datePublished] => 2025-09-09T17:23:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.seqrite.com/blog/wp-content/uploads/2018/04/virtual-reality-1802469_640.jpg
                                    [hostPageUrl] => https://www.seqrite.com/nl/blog/how-ready-are-you-for-the-evolution-of-ransomware/
                                    [contentSize] => 116131 B
                                    [width] => 640
                                    [height] => 480
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.98d4f5ef5f1c056a8d3eab0dc5eb11b4?rik=QwlwSa5RSNP5Pw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 2AA4A5AFBD4B77DCB0063FF9D34851AE49700943
                                    [accentColor] => 12A3B9
                                )

                            [53C4158F530B801158410842C44096434844C527] => Array
                                (
                                    [name] => US Claims That North Korea Has Attacked 3,00,000 Computers In 150 ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.8QWK7h8iXppqbmMSNwvU7gHaD4?pid=Api
                                    [datePublished] => 2017-12-19T12:40:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://im.indiatimes.in/media/content/2017/Dec/wannacry_attack_1513681442_725x725.jpg
                                    [hostPageUrl] => https://www.indiatimes.com/news/world/us-claims-that-north-korea-has-attacked-3-00-000-computers-in-150-countries-with-wannacry-virus-335954.html
                                    [contentSize] => 42585 B
                                    [width] => 725
                                    [height] => 380
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.f1058aee1f225e9a6a6e6312370bd4ee?rik=NUxR%2bDWwCBGFFA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 725C44843469044C248014851108B035F8514C35
                                    [accentColor] => AE321D
                                )

                            [AC36A3CCA1E5188BE8AC58396E3FA3B65FE1A0A3] => Array
                                (
                                    [name] => Rupee vs US dollar: Domestic currency rises 12 paise in early trade to ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.bzxqLGU1C2A3iE7JPRbygwHaEK?pid=Api
                                    [datePublished] => 2023-02-03T05:02:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://akm-img-a-in.tosshub.com/businesstoday/images/story/202302/rupee_3-sixteen_nine.jpg
                                    [hostPageUrl] => https://www.businesstoday.in/commodities/story/rupee-vs-us-dollar-domestic-currency-rises-12-paise-in-early-trade-to-8208-after-closing-at-a-low-of-8220-368773-2023-02-03
                                    [contentSize] => 95897 B
                                    [width] => 1200
                                    [height] => 675
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.6f3c6a2c65350b6037884ec93d16f283?rik=ymM6zBpegbiOyg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 3A0A1EF56B3AF3E69385CA8EB8815E1ACC3A63CA
                                    [accentColor] => 6B3A28
                                )

                            [88CDEFFED2CEE0CABAEDF69EFCFEBF66B3372D7D] => Array
                                (
                                    [name] => List of top companies affected by Petya aka ExPetr ransomware - IBTimes ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.fVZu4WBT-xpmDKDEvS6sAwHaDy?pid=Api
                                    [datePublished] => 2017-06-28T11:22:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://data1.ibtimes.co.in/en/full/652996/petya-expetr-goldeneye-ransomware-companies-affected.jpg
                                    [hostPageUrl] => https://www.ibtimes.co.in/petya-aka-expetr-ransomware-list-top-companies-affected-by-latest-cyberattack-732596
                                    [contentSize] => 45921 B
                                    [width] => 896
                                    [height] => 459
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.7d566ee16053fb1a660ca0c4bd2eac03?rik=iNz%2b7y3sDqyr3g&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => D7D2733B66FBEFCFE96FDEABAC0EEC2DEFFEDC88
                                    [accentColor] => 99C407
                                )

                            [2C0572B7A5476B819AE1825E0457AC58B0B4041C] => Array
                                (
                                    [name] => Cyber Swachhta Kendra: WastedLocker Ransomware
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.9-wBL0OmWLlL6K1qTvo4qwAAAA?pid=Api
                                    [datePublished] => 2020-07-17T07:14:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.csk.gov.in/image/logo/security-.jpg
                                    [hostPageUrl] => https://www.csk.gov.in/alerts/WastedLockerRansomware.html
                                    [contentSize] => 9176 B
                                    [width] => 266
                                    [height] => 64
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.f7ec012f43a658b94be8ad6a4efa38ab?rik=wlAne1p0thipHg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => C1404B0B85CA7540E5281EA918B6745A7B2750C2
                                    [accentColor] => 09679F
                                )

                            [1A0B83FEC84ED3F8F92B069056DCCF73028839C2] => Array
                                (
                                    [name] => US says it 'hacked the hackers' to bring down ransomware gang, helping ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.Q0qTMKKJmj713clXJd4b7QHaEK?pid=Api
                                    [datePublished] => 2023-01-27T02:11:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://akm-img-a-in.tosshub.com/indiatoday/images/story/202301/us_dept-sixteen_nine.png?VersionId=6dGfjOMJ3yAFPoApeBDgQKNBExdVC_U1
                                    [hostPageUrl] => https://www.indiatoday.in/world/story/us-says-it-hacked-the-hackers-to-bring-down-ransomware-gang-helping-300-victims-2326948-2023-01-27
                                    [contentSize] => 250844 B
                                    [width] => 1200
                                    [height] => 675
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.434a9330a2899a3ef5ddc95725de1bed?rik=obA474zkPY%2bfsg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 2C93882037FCCD650960B29F8F3DE48CEF38B0A1
                                    [accentColor] => 58524A
                                )

                            [2118A119A432F40A08D5DAB7E38C34D704E90BBF] => Array
                                (
                                    [name] => Why Rupee is falling against Dollar currently-2018
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.PMbtBLwqxATHrN0po2_HlgHaEK?pid=Api
                                    [datePublished] => 2018-07-08T19:43:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://img.jagranjosh.com/imported/images/E/Articles/why-rupee-falling-reasons.jpg
                                    [hostPageUrl] => https://www.jagranjosh.com/general-knowledge/why-rupee-is-falling-against-dollar-1530858596-1
                                    [contentSize] => 102541 B
                                    [width] => 1200
                                    [height] => 675
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.3cc6ed04bc2ac404c7acdd29a36fc796?rik=EoEakUojT6CAXQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => FBB09E407D43C83E7BAD5D80A04F234A911A8112
                                    [accentColor] => C72904
                                )

                            [5D34840C3B4CCCE582A6D5742FFE4A0E7644AD00] => Array
                                (
                                    [name] => LINUX: Easy Linux For Beginners, Your Step-By-Step Guide To Learning ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.aYJBqGawdfcDcw-qZbimNAHaJF?pid=Api
                                    [datePublished] => 2016-04-05T23:16:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/81x4US1TqYL._SL1500_.jpg
                                    [hostPageUrl] => https://www.amazon.in/LINUX-Beginners-Step-Step-Operating-ebook/dp/B01CF1FORK
                                    [contentSize] => 136190 B
                                    [width] => 1223
                                    [height] => 1500
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.698241a866b075f703730faa65b8a634?rik=1UNIwLPEzF4oag&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 00DA4467E0A4EFF2475D6A285ECCC4B3C04843D5
                                    [accentColor] => C60A05
                                )

                            [D4D40B6040B32C041B2958DCDECA0F36B0C83C81] => Array
                                (
                                    [name] => Buy AKKO ACR PRO Alice Plus 68-Key Hot Swappable Split Wired Mechanical ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.yZ2neMDI_yl9P3f7XcWlpQHaEk?pid=Api
                                    [datePublished] => 2022-11-18T21:24:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://i5.walmartimages.com/asr/599f9bff-0c09-4c61-91e0-44a8c4546c2c.ee066d99c1ead70ba85b7ce7710ae077.jpeg
                                    [hostPageUrl] => https://www.ubuy.co.in/product/7UKWQJZMO-akko-acr-pro-alice-plus-68-key-hot-swappable-split-wired-mechanical-gaming-keyboard-with-double-shot-pbt-asa-keycaps-for-win-mac-linuxblack-pink
                                    [contentSize] => 55542 B
                                    [width] => 1375
                                    [height] => 848
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.c99da778c0c8ff297d3f77fb5dc5a5a5?rik=TU2wBgQ7wkCxkg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 18C38C0B63F0ACEDCD8592B140C23B0406B04D4D
                                    [accentColor] => 7E554D
                                )

                            [0DE3452DDDC3F0EED145AF6BEFE7D0D44368C6BE] => Array
                                (
                                    [name] => Ransomware Jokes And Memes
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.w_5TH2g_hnX94aNZrqeo4AHaE6?pid=Api
                                    [datePublished] => 2017-05-20T10:38:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://img.mensxp.com/media/content/2017/May/image-2-youtube-1495275645.jpg
                                    [hostPageUrl] => https://www.mensxp.com/special-features/today/37028-these-jokes-and-memes-on-the-lsquo-wannacry-rsquo-ransomware-has-us-rolling-on-the-floor.html
                                    [contentSize] => 49065 B
                                    [width] => 1000
                                    [height] => 664
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.c3fe531f683f8675fde1a359aea7a8e0?rik=0D5U0t08D%2b4dVA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => EB6C86344D0D7EFEB6FA541DEE0F3CDDD2543ED0
                                    [accentColor] => 005753
                                )

                            [A44A9B07493597BFA5491D8E84800412E6EA4CEA] => Array
                                (
                                    [name] => Linux Reseller Hosting India
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.agO90Vf90TIxeTfmUcr-hQHaD3?pid=Api
                                    [datePublished] => 2018-05-02T07:27:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.thinknexgen.com/images/pages/lnx_resell_fb.jpg
                                    [hostPageUrl] => https://www.thinknexgen.com/services/web-hosting/linux-reseller
                                    [contentSize] => 192478 B
                                    [width] => 1200
                                    [height] => 627
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.6a03bdd157fdd132317937e651cafe85?rik=SqS5cJRTeftalA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => AEC4AE6E21400848E8D1945AFB79539470B9A44A
                                    [accentColor] => 051C5C
                                )

                            [D0123ACE71A9F208B6710627F2774CACAEC44DB6] => Array
                                (
                                    [name] => Tech trends 2022: Web 3.0, cryptocurrency bitcoin, Ransomware, Big Tech ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.2fJ9r3MPNm-dq3DnW8Z59wHaEK?pid=Api
                                    [datePublished] => 2021-12-01T08:48:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://images.hindustantimes.com/tech/img/2021/12/01/1600x900/US-MIAMI-HOSTS-CRYPTOCURRENCY-AND-NFT-CONFERENCE-4_1638347805918_1638347851761.jpg
                                    [hostPageUrl] => https://tech.hindustantimes.com/tech/news/tech-trends-2022-web-3-0-cryptocurrency-ransomware-big-tech-war-how-life-may-change-71638347385476.html
                                    [contentSize] => 398723 B
                                    [width] => 1600
                                    [height] => 900
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.d9f27daf730f366f9dab70e75bc679f7?rik=DSGj7BeaL4BrFw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 6BD44CEACAC4772F7260176B802F9A17ECA3210D
                                    [accentColor] => 7C3C20
                                )

                            [CB8D533A8A292AF8E88EF5F6E37B4AAC4E7C3F3D] => Array
                                (
                                    [name] => Introduction to Embedded Linux Part 5 | DigiKey
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.T5V7TOmlJ5KgxWbGUgdh4gHaEK?pid=Api
                                    [datePublished] => 2021-11-25T22:12:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://cf-images.us-east-1.prod.boltdns.net/v1/static/1571595843001/6dab6f18-e16b-43a2-a7cb-bca3864cb912/b56e3965-9025-4301-ba46-d8f1744f5211/1280x720/match/image.jpg
                                    [hostPageUrl] => https://www.digikey.in/en/videos/d/digi-key-electronics/introduction-to-embedded-linux-part-5-patch-device-tree-for-i2c-in-yocto
                                    [contentSize] => 335413 B
                                    [width] => 1280
                                    [height] => 720
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.4f957b4ce9a52792a0c566c6520761e2?rik=vNg1o6iSoo%2bO6A&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => D3F3C7E4CAA4B73E6F5FE88E8FA292A8A335D8BC
                                    [accentColor] => C70405
                                )

                            [885CBB16315FDEA76C7025C9B0CBDA99E787A412] => Array
                                (
                                    [name] => logo
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.muPnBkPioHev-IYLbKou-gAAAA?pid=Api
                                    [datePublished] => 2021-01-31T17:37:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.linuxlifesciences.com/Image/logo.png
                                    [hostPageUrl] => https://linuxlifesciences.com/
                                    [contentSize] => 29287 B
                                    [width] => 189
                                    [height] => 82
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.9ae3e70643e2a077aff8860b6caa2efa?rik=iMW7YRP17XrGBw&pid=ImgRaw&r=0
                                    [isTransparent] => 1
                                    [imageId] => 214A787E99ADBC0B9C5207C67AEDF51361BBC588
                                    [accentColor] => BB6010
                                )

                            [9F7DA18FB714D5736F084A220DCCA199C91F08A8] => Array
                                (
                                    [name] => Ransomware Cyber-Attacks Surge Over Two-Fold In India In First Half of ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.POLbIOtbFrTS9FDQwME_NwHaBj?pid=Api
                                    [datePublished] => 2023-08-04T16:49:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWQ_G1EeAe64Z5OITqwjmp7l2B8qf7VcyT_Fp6AMRQaBlTHNVqfWMA0x65fELIM7N-K0Q1fNv1pWATFMEb0m-1u-TerjK3AWps1DcI2g5k37Y3zIYYWTZaM5hkLVEubpxGVaLSK90lT1wpO7pzHG21vL1pofCfWhMBMLFD9qoMpbQZGH2CYQkiS8kO0bw/s16000/Cybercrime.jpg
                                    [hostPageUrl] => https://www.indiandefensenews.in/2023/08/ransomware-cyber-attacks-surge-over-two.html
                                    [contentSize] => 23916 B
                                    [width] => 670
                                    [height] => 140
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.3ce2db20eb5b16b4d2f450d0c0c13f37?rik=%2bdca%2bHtBXTf2gA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 8A80F19C991ACCD022A480F6375D417BF81AD7F9
                                    [accentColor] => 223B6B
                                )

                            [506F5CD254C716E052DB9971B5152A87FC78EB57] => Array
                                (
                                    [name] => Rupee Fall: रुपया टूटने के क्या-क्या नुकसान हैं? पहली बार 90 तक लुढ़का ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.p3Y0gy2CP22R2DPSLjtHDwHaEK?pid=Api
                                    [datePublished] => 2025-12-03T05:18:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://akm-img-a-in.tosshub.com/aajtak/images/story/202512/692fc4669e9d7-rupee-fall-030224766-16x9.jpg?size=948:533
                                    [hostPageUrl] => https://www.aajtak.in/business/news/story/india-rupee-slips-90-against-dollar-first-time-in-history-hits-record-low-know-its-impact-tutc-dskc-2402212-2025-12-03
                                    [contentSize] => 43543 B
                                    [width] => 948
                                    [height] => 533
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.a77634832d823f6d91d833d22e3b470f?rik=BfbFLUV8YQ4lvQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 75BE87CF78A2515B1799BD250E617C452DC5F605
                                    [accentColor] => C69E05
                                )

                            [8B00ED6A9575F692BF7238F9FF7BEFDDDADAF3CF] => Array
                                (
                                    [name] => Linux SysAdmin - HOT Technologies
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.-iryxvqUCiYVapJQwzDs3wAAAA?pid=Api
                                    [datePublished] => 2021-01-15T01:08:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.hariomtatsat.co.in/img/sysadmin.png
                                    [hostPageUrl] => https://www.hariomtatsat.co.in/sysadmin.php
                                    [contentSize] => 7420 B
                                    [width] => 300
                                    [height] => 480
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.fa2af2c6fa940a26156a9250c330ecdf?rik=uADepllXbyn7Jw&pid=ImgRaw&r=0
                                    [isTransparent] => 1
                                    [imageId] => FC3FADADDDFEB7FF9F8327FB296F5759A6DE00B8
                                    [accentColor] => 0EBD0E
                                )

                            [DD1CA6DC9052F9950ACFEE256AE1B21252D22467] => Array
                                (
                                    [name] => Indian Government Warns Windows Users Against Akira Ransomware; Here’s ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.paxhJWojEuMvwZquLk91aQHaEK?pid=Api
                                    [datePublished] => 2023-07-26T05:42:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://sm.mashable.com/t/mashable_in/photo/default/untitled-design-1_bhed.1200.jpg
                                    [hostPageUrl] => https://in.mashable.com/tech/57048/indian-government-warns-windows-users-against-akira-ransomware-heres-how-you-can-stay-safe
                                    [contentSize] => 33035 B
                                    [width] => 1200
                                    [height] => 675
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.a5ac61256a2312e32fc19aae2e4f7569?rik=3cFqzQkln1mg%2fA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 76422D25212B1EA652EEFCA0599F2509CD6AC1DD
                                    [accentColor] => C98902
                                )

                            [EB887792E8BEFED214375CDD091A6044A5D32466] => Array
                                (
                                    [name] => Cyber Swachhta Kendra: Akira Ransomware
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.ZMNyzzzrBJm9SULOLgWSvQHaBd?pid=Api
                                    [datePublished] => 2023-07-25T18:42:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.csk.gov.in/image/logo/csk.gif
                                    [hostPageUrl] => https://www.csk.gov.in/alerts/Akira_ransomware.html
                                    [contentSize] => 8474 B
                                    [width] => 585
                                    [height] => 116
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.64c372cf3ceb0499bd4942ce2e0592bd?rik=voh3KY7r7y1Bcw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 66423D5A4406A190DDC573412DEFEB8E297788BE
                                    [accentColor] => CC7800
                                )

                            [05442FFD0A28BEF3E188A2D7EB5C9FADF182C792] => Array
                                (
                                    [name] => Endpoint Security (ENS) | Trellix
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.dSj98-cz8SIDDWgPFafHtgHaDv?pid=Api
                                    [datePublished] => 2018-05-28T13:11:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.trellix.com/en-us/img/product-screens/trellix-edr/trellix-edr-tour-1.png
                                    [hostPageUrl] => https://www.trellix.com/ja-jp/products/endpoint-security/
                                    [contentSize] => 128764 B
                                    [width] => 1920
                                    [height] => 970
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.7528fdf3e733f122030d680f15a7c7b6?rik=UETy36CC6z8eiA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 297C281FDAF9C5BE7D2A881E3FEB82A0DFF24450
                                    [accentColor] => 1F89AC
                                )

                            [BD2B86D1ADC3AA495D27F63EF5F3ADE38DEDE064] => Array
                                (
                                    [name] => rupee dollar: Why the worst of rupee's fall could be over - The ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.SrAo_6xNK7xHCqLkg_MpHwHaE-?pid=Api
                                    [datePublished] => 2022-07-27T15:49:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://img.etimg.com/photo/msid-93168980/graph.jpg
                                    [hostPageUrl] => https://economictimes.indiatimes.com/news/economy/indicators/why-the-worst-of-rupees-fall-could-be-over/articleshow/93168926.cms
                                    [contentSize] => 15796 B
                                    [width] => 630
                                    [height] => 423
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.4ab028ffac4d2bbc470aa2e483f3291f?rik=27JoHdo8qpTVcg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 460EDED83EDA3F5FE36F72D594AA3CDA1D68B2DB
                                    [accentColor] => A6252F
                                )

                            [B8612F68160C143502D5E053428508405B2DDC6E] => Array
                                (
                                    [name] => Ransomware Spotlight: Play | Trend Micro (IN)
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.5z58KZvqeUwHi_OSDblHPQHaEH?pid=Api
                                    [datePublished] => 2023-07-21T07:13:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://documents.trendmicro.com/images/TEx/articles/RSPlay-Figure7-7fWsMMd.jpg
                                    [hostPageUrl] => https://www.trendmicro.com/vinfo/in/security/news/ransomware-spotlight/ransomware-spotlight-play
                                    [contentSize] => 66218 B
                                    [width] => 900
                                    [height] => 500
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.e73e7c299bea794c078bf3920db9473d?rik=ixbyhmHAQVMgXQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => E6CDD2B504805824350E5D205341C06186F2168B
                                    [accentColor] => B4171D
                                )

                            [C2E88BF61C67048CD0FEE0BB32D83EA65B594ADD] => Array
                                (
                                    [name] => Windows Server 2019安装Linux子系统 - 天雨的博客 - Masterain
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.QTqeBrQxVSV577iykalOkwHaDg?pid=Api
                                    [datePublished] => 2020-03-20T03:12:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://blogpic.irain.in/imgs/2019/10/a63cb8504eeb4671.png
                                    [hostPageUrl] => https://blog.irain.in/archives/Windows_Server_2019_Subsystem.html
                                    [contentSize] => 18324 B
                                    [width] => 776
                                    [height] => 367
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.413a9e06b431552579efb8b291a94e93?rik=LI64b8F2QMgN7w&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => DDA495B56AE38D23BB0EEF0DC84076C16FB88E2C
                                    [accentColor] => B1411A
                                )

                            [6FACA28D844756C1C62F076601F8713E904B8E7A] => Array
                                (
                                    [name] => Kali Linux Guia Completa Para Principiantes Aprende Kali Linux Paso ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.V81M1TBUdo56j2PfckO9VgHaHa?pid=Api
                                    [datePublished] => 2025-08-02T17:11:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/81u+I9XeeML.jpg
                                    [hostPageUrl] => https://www.desertcart.in/products/227547783-kali-linux-guia-completa-para-principiantes-aprende-kali-linux-paso
                                    [contentSize] => 420043 B
                                    [width] => 2400
                                    [height] => 2400
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.57cd4cd53054768e7a8f63df7243bd56?rik=9soq2Eh0ZRxs8g&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => A7E8B409E3178F106670F26C1C657448D82ACAF6
                                    [accentColor] => A5269F
                                )

                            [0B37B7FC7ECD56D10D1149CF816A255D8D4400CD] => Array
                                (
                                    [name] => McLaren Health hit with ransomware attack; many patients in Michigan ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.LvBw1u4tXkWT1pBHDDa3kQHaEK?pid=Api
                                    [datePublished] => 2023-10-06T17:33:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://cloudfront-us-east-1.images.arcpublishing.com/910mediagroup/ZHJDTCNMWNCENCBFIW3Y6GMXUI.jpg?timestamp=19
                                    [hostPageUrl] => https://www.9and10news.com/2023/10/06/mclaren-health-hit-with-ransomware-attack-many-patients-in-michigan-could-be-affected/
                                    [contentSize] => 328992 B
                                    [width] => 1920
                                    [height] => 1080
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.2ef070d6ee2d5e4593d690470c36b791?rik=sHN7z%2bfcZR3QEQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => DC0044D8D552A618FC9411D01D65DCE7CF7B73B0
                                    [accentColor] => 0937C2
                                )

                            [9ED0FC4CB6D0EE13290719348C6D8651AA477706] => Array
                                (
                                    [name] => रैंसमवेयर अटैक के लिए सबसे बड़ा टारगेट बनी भारत की मैन्युफैक्चरिंग ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.iuQ0yKbg5VTYBWUvi6yrswHaEK?pid=Api
                                    [datePublished] => 2024-03-27T11:47:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://static.tnnbt.in/thumb/msid-108822042,thumbsize-57834,width-1280,height-720,resizemode-75/108822042.jpg
                                    [hostPageUrl] => https://www.timesnowhindi.com/tech-gadgets/indian-manufacturing-sector-worst-hit-by-ransomware-attack-says-report-article-108822085
                                    [contentSize] => 103841 B
                                    [width] => 1280
                                    [height] => 720
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.8ae434c8a6e0e554d805652f8bacabb3?rik=6Q3PxGsN7jGScA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 607774AA1568D6C84391709231EE0D6BC4CF0DE9
                                    [accentColor] => 08C369
                                )

                            [F0D3B928869DF59AC92CA30B584A8FC2838012C3] => Array
                                (
                                    [name] => Ourtutorials - Linux Commands
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.YdkNv4kzJ8-LHY44qLq0zwHaBj?pid=Api
                                    [datePublished] => 2022-01-02T09:16:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.ourtutorials.in/linux/img/linux.jpg
                                    [hostPageUrl] => https://www.ourtutorials.in/linux/index.php
                                    [contentSize] => 539346 B
                                    [width] => 1900
                                    [height] => 400
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.61d90dbf893327cf8b1d8e38a8bab4cf?rik=Dz2bgmjZX6mcwg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 3C2108382CF8A485B03AC29CA95FD968829B3D0F
                                    [accentColor] => C49A07
                                )

                            [25D93326E65091C4E76DAA8FFBB03644C6601632] => Array
                                (
                                    [name] => Quick Heal Receives U.S Patent For Anti-Ransomware Solution - MobyGeek.com
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.jMIkh51iuz0Fy2qxF7T_xgHaD4?pid=Api
                                    [datePublished] => 2019-07-18T22:53:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://img.mobygeek.com/crop/1200x628/2019/07/17/quick-heal-technologies-ipo-0829.jpg
                                    [hostPageUrl] => https://mobygeek.com/features/quick-heal-receives-us-patent-for-anti-ransomware-solution-6687
                                    [contentSize] => 124758 B
                                    [width] => 1200
                                    [height] => 628
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.8cc224879d62bb3d05cb6ab117b4ffc6?rik=Up0zYm4FGUx%2b1g&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 2361066C44630BBFF8AAD67E4C19056E62339D52
                                    [accentColor] => 276BA4
                                )

                            [56ABFBE9B61CFD4019E7825E0457AC58B0B4041C] => Array
                                (
                                    [name] => Cyber Swachhta Kendra: WastedLocker Ransomware
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.CURvlDS1MViTCRp5eRDU7gAAAA?pid=Api
                                    [datePublished] => 2020-07-17T07:14:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.csk.gov.in/image/logo/certin.jpg
                                    [hostPageUrl] => https://www.csk.gov.in/alerts/WastedLockerRansomware.html
                                    [contentSize] => 10633 B
                                    [width] => 266
                                    [height] => 64
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.09446f9434b5315893091a797910d4ee?rik=Zbq%2fnmvB3wSRfg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => C1404B0B85CA7540E5287E9104DFC16B9EBFBA65
                                    [accentColor] => 057DBC
                                )

                            [C60EBAF316C9A7B688C1F38DAB3C5BA55A8CD7C9] => Array
                                (
                                    [name] => How To Run Linux On Android? | Cashify Blog
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.fnkWcH2WGDWnBCxAfnhLNwHaDt?pid=Api
                                    [datePublished] => 2023-04-23T21:34:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://s3b.cashify.in/gpro/uploads/2023/04/21135747/How-To-Run-Linux-On-Android_.jpg
                                    [hostPageUrl] => https://www.cashify.in/how-to-install-run-linux-on-android
                                    [contentSize] => 40992 B
                                    [width] => 1200
                                    [height] => 600
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.7e7916707d961835a7042c407e784b37?rik=bOCrP2GcemuIHA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 9C7DC8A55AB5C3BAD83F1C886B7A9C613FABE06C
                                    [accentColor] => CB8400
                                )

                            [43FB3C699B57B54C1B817E35789BCEA17FEF6668] => Array
                                (
                                    [name] => Blisko 40 proc. polskich firm zaatakowanych przez ransomware płaci ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.EmM5OYOaA5it6geaZRLHkgHaEK?pid=Api
                                    [datePublished] => 2024-07-10T05:43:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.telko.in/download,10684,sophos_wykres1.jpg
                                    [hostPageUrl] => https://www.telko.in/blisko-40-proc-polskich-firm-zaatakowanych-przez-ransomware-placi-okup
                                    [contentSize] => 440766 B
                                    [width] => 1920
                                    [height] => 1080
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.12633939839a0398adea079a6512c792?rik=NL%2fDlrl1W8SxGA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 8666FEF71AECB98753E718B1C45B75B996C3BF34
                                    [accentColor] => 0170CA
                                )

                            [8154A2AE0EA7EF95F2A3740F0A1549A86D68C648] => Array
                                (
                                    [name] => Unit 42 Research: Ransomware Impact on Indian Manufacturing
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.41LVQOFypny4QtYhQz2q7QHaEa?pid=Api
                                    [datePublished] => 2024-03-27T07:28:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://img-cdn.thepublive.com/fit-in/1200x675/filters:format(webp)/smstreet/media/media_files/wMZX7KoeKW5Z8WFqPK6v.jpg
                                    [hostPageUrl] => https://smestreet.in/technology/unit-42-research-ransomware-impact-on-indian-manufacturing-4422337
                                    [contentSize] => 28276 B
                                    [width] => 1133
                                    [height] => 675
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.e352d540e172a67cb842d621433daaed?rik=GEUq6uB6%2flkvOg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 846C86D68A9451A0F0473A2F59FE7AE0EA2A4518
                                    [accentColor] => 545748
                                )

                            [57B253D50E62660A87293D6C9857D6DC5526464E] => Array
                                (
                                    [name] => Manual "nomodeset" Kernel Boot Line Option for Linux Booting | Dell India
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.ZtNj0-rSZxr_xoTrf1yLtAHaEw?pid=Api
                                    [datePublished] => 2020-12-14T07:25:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://supportkb.dell.com/img/ka02R000000i0LDQAY/ka02R000000i0LDQAY_en_US_4.jpeg
                                    [hostPageUrl] => https://www.dell.com/support/kbdoc/en-in/000123893/manual-nomodeset-kernel-boot-line-option-for-linux-booting
                                    [contentSize] => 77191 B
                                    [width] => 700
                                    [height] => 450
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.66d363d3ead2671affc684eb7f5c8bb4?rik=dSs1XeAmZqB4kg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => E4646255CD6D7589C6D39278A06626E05D352B75
                                    [accentColor] => 2C001E
                                )

                            [4667F32BE58CCF0CAE0A443CFA2B45A1604C67B2] => Array
                                (
                                    [name] => 300 small Indian Banks hit by ransomware attack, payment systems ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.qRJnG7IISPfhgEO8NsXCYwAAAA?pid=Api
                                    [datePublished] => 2024-07-31T17:44:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://akm-img-a-in.tosshub.com/businesstoday/images/story/202407/66aa767bc440e-ransomware-attack-forces-hundreds-of-small-indian-banks-offline--sources-say-313802375-16x9.jpg?size=948:533
                                    [hostPageUrl] => https://www.businesstoday.in/india/story/300-small-indian-banks-hit-by-ransomware-attack-payment-systems-temporarily-shutdown-report-439640-2024-07-31
                                    [contentSize] => 64988 B
                                    [width] => 474
                                    [height] => 266
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.a912671bb20848f7e18043bc36c5c263?rik=ZHY%2fsl7I%2fMDqoA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 2B76C4061A54B2AFC344A0EAC0FCC85EB23F7664
                                    [accentColor] => 1892B3
                                )

                            [35C9A1EB14C9511069043D7C5C6F2DAE3158C764] => Array
                                (
                                    [name] => Buy LINUX® Configuration and Installation (Slackware S.) Book Online at ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.AhJS8JQP0udKARmN09k4_gAAAA?pid=Api
                                    [datePublished] => 2020-09-18T02:04:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/51uS39PDHML._SX342_SY445_.jpg
                                    [hostPageUrl] => https://www.amazon.in/Configuration-Installation-Slackware-Patrick-Volkerding/dp/0764570056
                                    [contentSize] => 24766 B
                                    [width] => 342
                                    [height] => 437
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.021252f0940fd2e74a01198dd3d938fe?rik=U5wavkGcFQGWQA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 467C8513EAD2F6C5C7D3409601159C41BE1A9C53
                                    [accentColor] => 0B1AC0
                                )

                            [B01D49545225DDE811C4821F4FBE6B7C59E10B99] => Array
                                (
                                    [name] => 'Trade in Rupee will be the biggest way forward': Amit Shah calls it ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.sQcMdVcZWca1O4TmznuyZAHaEK?pid=Api
                                    [datePublished] => 2024-05-09T08:02:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://akm-img-a-in.tosshub.com/businesstoday/images/story/202405/663c82036513e-india-has-started-trade-in-the-rupee-with-neighbouring-countries--including-nepal-and-bhutan-095753647-16x9.jpg
                                    [hostPageUrl] => https://www.businesstoday.in/latest/economy/story/trade-in-rupee-will-be-the-biggest-way-forward-amit-shah-calls-it-top-priority-for-new-government-428895-2024-05-09
                                    [contentSize] => 92464 B
                                    [width] => 1200
                                    [height] => 675
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.b1070c75571959c6b53b84e6ce7bb264?rik=C9GURSVS3Y4RTA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 99B01E95C7B6EBF4F1284C118EDD52254594D10B
                                    [accentColor] => 6E4318
                                )

                            [6DA8D51574A779D575BAA2D7EB5C9FADF182C792] => Array
                                (
                                    [name] => Endpoint Security (ENS) | Trellix
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.68apSK7rrVjKuj7HGW6dhQHaDw?pid=Api
                                    [datePublished] => 2018-05-28T13:11:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.trellix.com/en-us/img/product-screens/trellix-edr/trellix-edr-tour-2.png
                                    [hostPageUrl] => https://www.trellix.com/ja-jp/products/endpoint-security/
                                    [contentSize] => 137750 B
                                    [width] => 1920
                                    [height] => 975
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.ebc6a948aeebad58caba3ec7196e9d85?rik=1opdUUd6l11Xqw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 297C281FDAF9C5BE7D2AAB575D977A47515D8AD6
                                    [accentColor] => B81212
                                )

                            [41084751D78BECA1453528FFF59B5D484985EFBC] => Array
                                (
                                    [name] => Linux Shared Web Hosting Services India
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.sxCgP8YwprUf8CnBVmqoOgHaD3?pid=Api
                                    [datePublished] => 2019-06-05T11:24:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.thinknexgen.com/images/pages/lnx_host_fb.jpg
                                    [hostPageUrl] => https://www.thinknexgen.com/services/web-hosting/linux-shared
                                    [contentSize] => 185627 B
                                    [width] => 1200
                                    [height] => 627
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.b310a03fc630a6b51ff029c1566aa83a?rik=FIB0FX24zhpUUw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => CBFE589484D5B95FFF8253541ACEB87D15748014
                                    [accentColor] => 051A5B
                                )

                            [E6A563517132C88CA22449A9448B6DABFA615526] => Array
                                (
                                    [name] => Ransomware Cyber attack on AIIMS Delhi server
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.6ROctFkJIRK2XSZt2UKdbwHaEc?pid=Api
                                    [datePublished] => 2022-11-24T12:11:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://medicaldialogues.in/h-upload/2022/11/24/191905-why-sudden-increase-in-melioidosis-cases-in-india-1500-900px-8.jpg
                                    [hostPageUrl] => https://medicaldialogues.in/mdtv/top-videos/ransomware-cyber-attack-on-aiims-delhi-server-102870
                                    [contentSize] => 136244 B
                                    [width] => 1500
                                    [height] => 900
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.e9139cb459092112b65d266dd9429d6f?rik=blo2FRcjjMgqQg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 625516AFBAD6B8449A94422AC88C231715365A6E
                                    [accentColor] => 58134B
                                )

                            [C94671192CDEF4DD9C5452B7E87F7D33E8FA9ACD] => Array
                                (
                                    [name] => Top 20 Basic Kali Linux Commands - Yeah Hub
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.RY9dpXvCESRoSG9vej9_3AHaFV?pid=Api
                                    [datePublished] => 2018-08-12T01:16:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.yeahhub.com/wp-content/uploads/2018/04/kali-linux-command5.png
                                    [hostPageUrl] => https://www.yeahhub.com/top-20-basic-kali-linux-commands/
                                    [contentSize] => 221282 B
                                    [width] => 852
                                    [height] => 613
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.458f5da57bc2112468486f6f7a3f7fdc?rik=nGQXkcLtT93JRQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => DCA9AF8E33D7F78E7B2545C9DD4FEDC29117649C
                                    [accentColor] => AC1F20
                                )

                            [5CF7F047AEF55212F4AE1057C1FEB4B33D4EE73C] => Array
                                (
                                    [name] => Linux Life Sciences Pvt. Ltd.
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.VlUlD8zPhlhkcVRogJ6mWwHaBR?pid=Api
                                    [datePublished] => 2024-09-19T08:53:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://linuxlifesciences.com/resource/Image/inr-abt.jpg
                                    [hostPageUrl] => https://linuxlifesciences.com/resource/Our_Facilities.aspx
                                    [contentSize] => 39647 B
                                    [width] => 1080
                                    [height] => 186
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.5655250fcccf865864715468809ea65b?rik=xX8PdOpfJSFP6g&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => C37EE4D33B4BEF1C7501EA4F21255FEA740F7FC5
                                    [accentColor] => AD681E
                                )

                            [81095FC2195EAF1E947EF1CCF78077C24C2E304D] => Array
                                (
                                    [name] => 17 Kali Linux Package Manager - ARKIT
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.gfUJTaKqpLDwzBkEWsOwMwHaFj?pid=Api
                                    [datePublished] => 2016-10-22T14:31:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://arkit.co.in/wp-content/uploads/2016/06/17-Kali-Linux-Package-Manager.png
                                    [hostPageUrl] => https://arkit.co.in/kali-linux-installation/17-kali-linux-package-manager/
                                    [contentSize] => 69934 B
                                    [width] => 800
                                    [height] => 600
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.81f5094da2aaa4b0f0cc19045ac3b033?rik=GJD1LJHl%2buFJ5w&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => D403E2C42C77087FCC1FE749E1FAE5912CF59018
                                    [accentColor] => CB9F00
                                )

                            [1835DC1FEC32C5E7E025FD2A656B1E172B0AF167] => Array
                                (
                                    [name] => Sophos India, Sophos Ransomware Report, Ransomware Report, Cyber ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.lfcrwHq0C8mmhgu0ooAJiAHaEh?pid=Api
                                    [datePublished] => 2022-05-04T08:25:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://gumlet.assettype.com/digitalterminal%2Fimport%2Fuploads%2Fnews%2F1651652595s_The%20ransomware%20situation%20in%20India%20is%20worrying--------Sunil%20Sharma%20Managing%20Director%20Sales%20India%20and%20SAARC%20Sophos.jpg?w=1200&auto=format%2Ccompress&ogImage=true&enlarge=true
                                    [hostPageUrl] => https://digitalterminal.in/news/28876.html
                                    [contentSize] => 106408 B
                                    [width] => 1200
                                    [height] => 734
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.95f72bc07ab40bc9a6860bb4a2800988?rik=gVPN8c4jXH4OUg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 761FA0B271E1B656A2DF520E7E5C23CEF1CD5381
                                    [accentColor] => 0D4462
                                )

                            [9C03C85464E99122A7C2923221BA5318D2C0DC85] => Array
                                (
                                    [name] => How to convert rupees to dollars and dollars to rupees? - Goodreturns
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.h9CajyI_2eqfLJ_QPp02vQHaFM?pid=Api
                                    [datePublished] => 2014-09-15T05:48:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://images.goodreturns.in/img/2020/04/rsdollarnew-1587702986.jpg
                                    [hostPageUrl] => https://www.goodreturns.in/classroom/2014/09/how-convert-rupees-dollars-dollars-rupees-303596.html
                                    [contentSize] => 47888 B
                                    [width] => 660
                                    [height] => 463
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.87d09a8f223fd9ea9f2c9fd03e9d36bd?rik=yTCMRUaeGSJ6LA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 58CD0C2D8135AB1223292C7A22199E46458C30C9
                                    [accentColor] => 664021
                                )

                            [1F2646A66441E08C437958DCDECA0F36B0C83C81] => Array
                                (
                                    [name] => Buy AKKO ACR PRO Alice Plus 68-Key Hot Swappable Split Wired Mechanical ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.trkb1wL8rqDypkPdzo6fLAHaHH?pid=Api
                                    [datePublished] => 2022-11-18T21:24:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://i5.walmartimages.com/asr/94f72f4b-529c-48af-9c07-f65abd3e9e9a.569e30efbbd89ae16110720a8a2784c1.jpeg
                                    [hostPageUrl] => https://www.ubuy.co.in/product/7UKWQJZMO-akko-acr-pro-alice-plus-68-key-hot-swappable-split-wired-mechanical-gaming-keyboard-with-double-shot-pbt-asa-keycaps-for-win-mac-linuxblack-pink
                                    [contentSize] => 93435 B
                                    [width] => 1500
                                    [height] => 1441
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.b6b91bd702fcaea0f2a643ddce8e9f2c?rik=8WJkakYUDsg0lw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 18C38C0B63F0ACEDCD859734C80E14466A6462F1
                                    [accentColor] => 7A7A51
                                )

                            [EA202FAC23DF92F5B4BAA68F50F17FD5FC4C774A] => Array
                                (
                                    [name] => How to setup Docker on Linux
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.Hs8m3rknO8Q1jnGSJtHoHAHaEK?pid=Api
                                    [datePublished] => 2024-11-06T01:12:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://thesmartbug.com/content/images/2024/11/featureImage-4.webp
                                    [hostPageUrl] => https://thesmartbug.com/blog/how-to-setup-docker-on-linux/
                                    [contentSize] => 20672 B
                                    [width] => 1080
                                    [height] => 607
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.1ecf26deb9273bc4358e719226d1e81c?rik=rgLyyjL9KV9Lqw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => A477C4CF5DF71F05F86AAB4B5F29FD32CAF202AE
                                    [accentColor] => C89E03
                                )

                            [CF9B0D8CFC7D159AB8F4634132A0B48EB2D54E39] => Array
                                (
                                    [name] => Ransomware attack shuts down payment systems in nearly 300 Indian banks
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.X-WD3uAmv9KinZaGJIK0mQHaEo?pid=Api
                                    [datePublished] => 2024-07-31T18:31:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://english.varthabharati.in/storage/uploads/india/Cyber_vb_54.jpeg
                                    [hostPageUrl] => https://english.varthabharati.in/india/ransomware-attack-shuts-down-payment-systems-in-nearly-300-indian-banks
                                    [contentSize] => 79345 B
                                    [width] => 960
                                    [height] => 600
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.5fe583dee026bfd2a29d96862482b499?rik=%2fLnQyM%2fXUamLTw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 93E45D2BE84B0A2314364F8BA951D7CFC8D0B9FC
                                    [accentColor] => 0EA3BD
                                )

                            [CFE3C5CB77B56D3D606F49D5ACE5C332AEA2ED4D] => Array
                                (
                                    [name] => Did You Know About India's Rs 10,000 Rupee Note
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.Qyyu_FCL4-xgRIGY_DN5kQHaCT?pid=Api
                                    [datePublished] => 2022-06-08T13:45:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://im.indiatimes.in/content/2022/Jun/did-you-know--about-10000-rupee-note_62a090b2bb179.jpg
                                    [hostPageUrl] => https://www.indiatimes.com/worth/news/did-you-know-india-used-to-have-10000-rupee-note-571697.html
                                    [contentSize] => 166388 B
                                    [width] => 681
                                    [height] => 212
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.432caefc508be3ec60448198fc337991?rik=%2fD5cvHdb1tMG9g&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => D4DE2AEA233C5ECA5D94F606D3D65B77BC5C3EFC
                                    [accentColor] => 7A6151
                                )

                            [E4322578C46798D8A2BC6DD24082AD606EEE1D1A] => Array
                                (
                                    [name] => Rupee Rises 7 Paise To Settle At 83.18 Against US Dollar
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.JFmHJlNiEnhWTHshg7DHWgHaEK?pid=Api
                                    [datePublished] => 2023-10-11T10:38:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://gumlet.assettype.com/freepressjournal/2023-01/309a5744-7633-4e31-8365-dc99ff76ad37/american_one_dollar_bank_note_indian_ten_rupee_notes_close_up_image_macro_172415082.jpg
                                    [hostPageUrl] => https://www.freepressjournal.in/business/rupee-rises-7-paise-to-settle-at-8318-against-us-dollar
                                    [contentSize] => 107586 B
                                    [width] => 800
                                    [height] => 450
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.2459872653621278564c7b2183b0c75a?rik=TiNSh0x2iY0qyw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => A1D1EEE606DA28042DD6CB2A8D89764C8752234E
                                    [accentColor] => 3D8E65
                                )

                            [CEF01B906995A50E58584BC1D742F4BD155B6239] => Array
                                (
                                    [name] => Certificate Course in System Administration using Unix/Linux ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.EUWhRZTrfJPJ-MBR8ABzBQHaDt?pid=Api
                                    [datePublished] => 2021-02-15T18:26:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => http://nielit.gov.in/sites/default/files/Aurangabad/LinuxUNIX-Certification-Training-Bundle.jpg
                                    [hostPageUrl] => https://www.nielit.gov.in/content/certificate-course-system-administration-using-unixlinux
                                    [contentSize] => 71436 B
                                    [width] => 630
                                    [height] => 315
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.1145a14594eb7c93c9f8c051f0007305?rik=7A%2bxCZZZWuCFhQ&riu=http%3a%2f%2fnielit.gov.in%2fsites%2fdefault%2ffiles%2fAurangabad%2fLinuxUNIX-Certification-Training-Bundle.jpg&ehk=fjnmUFPQySubRJXdjKq7jdn4GXSytz%2bSO0CI6ZiRmz4%3d&risl=&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 9326B551DB4F247D1CB48585E05A599609B10FEC
                                    [accentColor] => C9A402
                                )

                            [7984291C4ACFC840C0F0831C98A3A39E4665504B] => Array
                                (
                                    [name] => Linux sigue creciendo en cuota de mercado, alcanza el 4% de los ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.ClLSsMx-tsGqLCLRObhqJAHaEK?pid=Api
                                    [datePublished] => 2024-03-05T19:18:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://cdn.4pmtech.com/wp-content/uploads/2024/03/US-Linux.webp
                                    [hostPageUrl] => https://4pmtech.com/es/linux-continues-growing-market-share-reaches-4-of-desktops/
                                    [contentSize] => 31846 B
                                    [width] => 1280
                                    [height] => 720
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.0a52d2b0cc7eb6c1aa2c22d139b86a24?rik=l0iSwaT8jAQMDw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => B4055664E93A3A89C1380F0C048CFCA4C1924897
                                    [accentColor] => 946137
                                )

                            [712D2E0174096D3F9E9AAA7FE025E3A18CFDBB35] => Array
                                (
                                    [name] => An Indian firm paid ₹8 crore to rectify ransomware | Tech News (HT Tech)
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.uo2_NplD4VjumrlfQXR9qgHaEK?pid=Api
                                    [datePublished] => 2020-05-19T10:58:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://images.hindustantimes.com/tech/img/2020/05/19/1600x900/Ransomware_1589883081294_1589883081635.jpg
                                    [hostPageUrl] => https://tech.hindustantimes.com/tech/news/an-indian-firm-paid-rs-8-cr-to-rectify-ransomware-71589882759280.html
                                    [contentSize] => 41337 B
                                    [width] => 1600
                                    [height] => 898
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.ba8dbf369943e158ee9ab95f41747daa?rik=F9LiEEeQ1vPpqQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 53BBDFC81A3E520EF7AAA9E9F3D6904710E2D217
                                    [accentColor] => 041243
                                )

                            [C138449C56846C4F6A6E4BC1D742F4BD155B6239] => Array
                                (
                                    [name] => Certificate Course in System Administration using Unix/Linux ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.sLvoP5ExN6HDqVZB-HGRCAHaEM?pid=Api
                                    [datePublished] => 2021-02-15T18:26:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => http://nielit.gov.in/sites/default/files/Aurangabad/Careers-in-Linux-Administration.png
                                    [hostPageUrl] => https://www.nielit.gov.in/content/certificate-course-system-administration-using-unixlinux
                                    [contentSize] => 4872 B
                                    [width] => 486
                                    [height] => 275
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.b0bbe83f913137a1c3a95641f8719108?rik=HINEyWVIxvSm5g&riu=http%3a%2f%2fnielit.gov.in%2fsites%2fdefault%2ffiles%2fAurangabad%2fCareers-in-Linux-Administration.png&ehk=cQcvy1J%2fJi903%2bsHIvFKvmAgVhFaGMdS0VJ%2bYXu9PU4%3d&risl=&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 9326B551DB4F247D1CB4E6A6F4C64865C944831C
                                    [accentColor] => CC9A00
                                )

                            [323A7139B674140FDEDBF39C65433110C6AC0CCC] => Array
                                (
                                    [name] => Linux. Собеседование — Teletype
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.pzsi5PwG6Brpa0Y6LSeVmwHaGc?pid=Api
                                    [datePublished] => 2023-02-21T04:02:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.tecmint.com/wp-content/uploads/2022/12/Linux-File-Permissions.jpg
                                    [hostPageUrl] => https://teletype.in/@it255ru/JkRgD5lor2D
                                    [contentSize] => 56076 B
                                    [width] => 900
                                    [height] => 783
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.a73b22e4fc06e81ae96b463a2d27959b?rik=I6MXk2tHQfDtvQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => CCC0CA6C01133456C93FBDEDF041476B9317A323
                                    [accentColor] => B9AA12
                                )

                            [E18108AD2675DA03E4AD922CD65ABB2A512291CC] => Array
                                (
                                    [name] => Congressman Eric Swalwell Raises Alarm Over Crypto's Role in Ransomware ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.VQGbD__2mjK_pjZTcc85iAHaFj?pid=Api
                                    [datePublished] => 2021-07-04T10:12:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://u.today/sites/default/files/styles/1200x900/public/2021-07/8438.jpg
                                    [hostPageUrl] => https://cryptopanic.com/news/12258099/Congressman-Eric-Swalwell-Raises-Alarm-Over-Cryptos-Role-in-Ransomware-Attacks
                                    [contentSize] => 100782 B
                                    [width] => 1200
                                    [height] => 900
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.55019b0ffff69a32bfa6365371cf3988?rik=HhiA2mJXrTBO2g&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => CC192215A2BBA56DC229DA4E30AD5762DA80181E
                                    [accentColor] => 37485E
                                )

                            [9FF89B74D68FD1BCC15A027F89E2C75828BE83EE] => Array
                                (
                                    [name] => Cheat sheets - ARKIT
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.1UwJhkpp5fjyZqG3xBhLawAAAA?pid=Api
                                    [datePublished] => 2015-10-31T12:00:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://arkit.co.in/wp-content/uploads/2015/10/Pocket-Guide-Linux-Commands-63x300.jpg
                                    [hostPageUrl] => https://arkit.co.in/cheat-sheets/
                                    [contentSize] => 7367 B
                                    [width] => 63
                                    [height] => 300
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.d54c09864a69e5f8f266a1b7c4184b6b?rik=%2bY%2b5R234HcscpQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => EE38EB82857C2E98F720A51CCB1DF86D47B98FF9
                                    [accentColor] => 666666
                                )

                            [510D99F388509A884836D7034DE612371C3D40A1] => Array
                                (
                                    [name] => Will Microsoft face the brunt of ransomware attack that hit Indian users?
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.E63Kh_BD1tUfJyugD5CrrAHaCW?pid=Api
                                    [datePublished] => 2017-07-05T14:41:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://akm-img-a-in.tosshub.com/sites/dailyo/story/header/201707/hack1-banner_070517065958.jpg
                                    [hostPageUrl] => https://www.dailyo.in/technology/microsoft-ransomware-windows-xp-windows-10-petya-wannacry-18193
                                    [contentSize] => 57977 B
                                    [width] => 1024
                                    [height] => 325
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.13adca87f043d6d51f272ba00f90abac?rik=FdCZP4gFqYiEYw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 1A04D3C173216ED4307D638488A905883F99D015
                                    [accentColor] => 070A15
                                )

                            [9369D45D4F3C7FDFD01F8718D14D01E71208DF39] => Array
                                (
                                    [name] => India among top countries affected by ransomware in APJ region: Akamai
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.J4tYxQ7PL0FmtTQfo4869AHaD3?pid=Api
                                    [datePublished] => 2022-09-19T14:10:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://assets.techcircle.in/uploads/article-image/2022/09/images/30711-cyber-security-3410923-960-720.jpg
                                    [hostPageUrl] => https://www.techcircle.in/2022/09/19/conti-and-other-ransomware-attacks-surge-in-apj-shows-study
                                    [contentSize] => 74522 B
                                    [width] => 640
                                    [height] => 334
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.278b58c50ecf2f4166b5341fa38f3af4?rik=OZZN1fTD9%2f0N8Q&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 93FD80217E10D41D8178F10DFDF7C3F4D54D9639
                                    [accentColor] => 529338
                                )

                            [20CFC5B2F257F1532A0273C2D9F917320E87FE1E] => Array
                                (
                                    [name] => India & UK Conducts Counter Ransomware Exercise for 26 Nations
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.av19t8PpBj--EA6ewOcdbQHaEK?pid=Api
                                    [datePublished] => 2022-09-08T12:10:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://st.adda247.com/https://wpassets.adda247.com/wp-content/uploads/multisite/sites/5/2022/09/08092813/Ransomware-Image-1280x720-1.jpg
                                    [hostPageUrl] => https://currentaffairs.adda247.com/india-uk-conducts-counter-ransomware-exercise-for-26-nations/
                                    [contentSize] => 64055 B
                                    [width] => 1280
                                    [height] => 720
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.6afd7db7c3e9063fbe100e9ec0e71d6d?rik=AvxcKy91HzWiIA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => E1EF78E023719F9D2C3720A2351F752F2B5CFC02
                                    [accentColor] => B82013
                                )

                            [E013C7CEA4CD35E9FA24DF020577BB21BBACBA23] => Array
                                (
                                    [name] => How to Select the Best Linux Dedicated Server
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIF.nUKDKG3PFJz8YOkBRd0Afg?pid=Api
                                    [datePublished] => 2026-01-27T10:44:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://blog.cloudtechtiq.com/wp-content/uploads/2026/01/How-to-Select-the-Best-Linux-Dedicated-Server.jpg
                                    [hostPageUrl] => https://blog.cloudtechtiq.com/how-to-select-the-best-linux-dedicated-server/
                                    [contentSize] => 149310 B
                                    [width] => 1115
                                    [height] => 646
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.18fae4ba06e4167dd0348c51736b0367?rik=&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 32ABCABB12BB775020FD42AF9E53DC4AEC7C310E
                                    [accentColor] => 1E3270
                                    [isFresh] => 1
                                )

                            [E0B3C74E43FA9DE2C3F543324CF2DF79825E48CE] => Array
                                (
                                    [name] => Valorant: U-25 Blitz Cup Gives a Platform to Aspiring Esports Players ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.7q0crzujJWQD-bmXZm8JrgHaEK?pid=Api
                                    [datePublished] => 2023-12-18T16:03:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://sm.ign.com/t/ign_in/blogroll/v/valorant-r/valorant-review_az9u.1280.jpg
                                    [hostPageUrl] => https://in.ign.com/valorant/199551/news/valorant-u-25-blitz-cup-gives-a-platform-to-aspiring-esports-players-with-a-inr-50000-prize-pool
                                    [contentSize] => 139838 B
                                    [width] => 1280
                                    [height] => 720
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.eead1caf3ba3256403f9b997666f09ae?rik=Djt85DSv2S48Xw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => EC84E52897FD2FC423345F3C2ED9AF34E47C3B0E
                                    [accentColor] => B8131D
                                )

                            [F0FC7A989F78A925819A724CADFFFBE81B7BFCCA] => Array
                                (
                                    [name] => Quick Heal 1st Indian firm to get US patent for anti-ransomware tech
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.wsCegd410eBo_RqQyHjnqQHaEK?pid=Api
                                    [datePublished] => 2019-07-05T05:50:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://img-cdn.publive.online/fit-in/1280x960/filters:format(webp)/odishatv/media/post_attachments/uploadimage/library/16_9/16_9_0/Quick-Heal_1619623427.jpg
                                    [hostPageUrl] => https://odishatv.in/science/quick-heal-1st-indian-firm-to-get-us-patent-for-anti-ransomware-tech-383900
                                    [contentSize] => 28274 B
                                    [width] => 1280
                                    [height] => 719
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.c2c09e81de35d1e068fd1a90c878e7a9?rik=D8%2bnifmHmlIYqQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => ACCFB7B18EBFFFDAC427A918529A87F989A7CF0F
                                    [accentColor] => C85903
                                )

                            [3BAEB139934D4749D8B53D6C9857D6DC5526464E] => Array
                                (
                                    [name] => Manual "nomodeset" Kernel Boot Line Option for Linux Booting | Dell India
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.1hyNazeHUyH9TMSOwGtE8wHaCo?pid=Api
                                    [datePublished] => 2020-12-14T07:25:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://supportkb.dell.com/img/ka02R000000i0LDQAY/ka02R000000i0LDQAY_en_US_7.jpeg
                                    [hostPageUrl] => https://www.dell.com/support/kbdoc/en-in/000123893/manual-nomodeset-kernel-boot-line-option-for-linux-booting
                                    [contentSize] => 48831 B
                                    [width] => 700
                                    [height] => 249
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.d61c8d6b37875321fd4cc48ec06b44f3?rik=s%2bobkznUdJSNWw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => E4646255CD6D7589C6D35B8D9474D439931BEAB3
                                    [accentColor] => BC0F15
                                )

                            [E8B5309D21A3E698CDFA7DB91AC3E678E49A7DE3] => Array
                                (
                                    [name] => Buy 10Gb PCI-E NIC Network Card, Dual SFP+ Port, with Intel 82599EN ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.8fChLeODjY0AyJpNFC38OwHaFV?pid=Api
                                    [datePublished] => 2022-06-06T18:18:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/61H00Us83DL.jpg
                                    [hostPageUrl] => https://www.desertcart.in/products/33382921-10-gtek-for-intel-e-10-g-42-btda-82599-es-chip-10-gb-e-ethernet-converged-network-adapter-x-520-da-2-x-520-sr-2-pci-e-x-8-dual-sfp-port
                                    [contentSize] => 101957 B
                                    [width] => 1334
                                    [height] => 960
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.f1f0a12de3838d8d00c89a4d142dfc3b?rik=jlsD2RI6boncrw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 3ED7A94E876E3CA19BD7AFDC896E3A12D9035B8E
                                    [accentColor] => 888343
                                )

                            [9721525E970628AC256E18DC7701E85D4BE73B92] => Array
                                (
                                    [name] => For the next generation of CIOs | ITNEXT
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.yvT9vEthK-7JSsSXd-FyYAHaE8?pid=Api
                                    [datePublished] => 2012-04-23T10:13:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.itnext.in/sites/default/files/styles/wall-images/public/Ransomware%20pic_CIOL.jpg?itok=7nPT-1Lt
                                    [hostPageUrl] => https://www.itnext.in/
                                    [contentSize] => 25296 B
                                    [width] => 520
                                    [height] => 347
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.caf4fdbc4b612beec94ac49777e17260?rik=eRIl5XlggspS5g&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 29B37EB4D58E1077CD81E652CA826079E5251279
                                    [accentColor] => 344868
                                )

                            [50F37D4C6F2D1F72B05339C4726AC3770A4F4023] => Array
                                (
                                    [name] => VPS Hosting India Linux Virtuozzo vps Cloud hosting at data center in ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.CGjXICf35zPtA41GbhNckgAAAA?pid=Api
                                    [datePublished] => 2018-07-23T17:00:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://impulseweb.in/images/ubuntu.gif
                                    [hostPageUrl] => https://impulseweb.in/vps/
                                    [contentSize] => 1828 B
                                    [width] => 100
                                    [height] => 26
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.0868d72027f7e733ed038d466e135c92?rik=BT%2fXxPbS8ScLNQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 3204F4A0773CA6274C93350B27F1D2F6C4D73F05
                                    [accentColor] => CC7A00
                                )

                            [4A24ADCC55B37601EC3529016833C097AF7E7786] => Array
                                (
                                    [name] => Diploma Student: Introduction to Linux operating system
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.-P8Bd6Ziborg8Kr-4BzarwHaHz?pid=Api
                                    [datePublished] => 2021-03-13T08:04:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://1.bp.blogspot.com/-Ly-laXMmi-M/X_sSznFSjvI/AAAAAAAAAxE/i9GJgCKuBc0TPIcKACVVyZou2Ekb91XbwCLcBGAsYHQ/s669/component.JPG
                                    [hostPageUrl] => https://www.diplomaincs.in/2021/01/introduction-to-linux-operating-system.html
                                    [contentSize] => 58196 B
                                    [width] => 635
                                    [height] => 669
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.f8ff0177a6626e8ae0f0aafee01cdaaf?rik=pELazFU7ZxDOUw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 6877E7FA790C3386109253CE10673B55CCDA42A4
                                    [accentColor] => 9E6E2D
                                )

                            [F0F634BE45CC34328D8D4F866F74A2EAAC106243] => Array
                                (
                                    [name] => British newspaper The Guardian hit by a ransomware attack - BusinessToday
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.QPXXJ181kLg-zqDv1yg6JAHaEK?pid=Api
                                    [datePublished] => 2022-12-22T05:42:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://akm-img-a-in.tosshub.com/businesstoday/images/story/202212/merlin_132304460_860897a0-558e-44db-a990-f652fc785411-superjumbo-sixteen_nine.jpg
                                    [hostPageUrl] => https://www.businesstoday.in/technology/story/british-newspaper-the-guardian-hit-by-a-ransomware-attack-357342-2022-12-22
                                    [contentSize] => 127035 B
                                    [width] => 1200
                                    [height] => 675
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.40f5d7275f3590b83ecea0efd7283a24?rik=D29D61TMQyPY2A&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 342601CAAE2A47F668F4D8D82343CC54EB436F0F
                                    [accentColor] => 733B31
                                )

                            [D7DD88E19B06031C4D6539C4726AC3770A4F4023] => Array
                                (
                                    [name] => VPS Hosting India Linux Virtuozzo vps Cloud hosting at data center in ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.N76NRj4lkCV4il3DwH35DgAAAA?pid=Api
                                    [datePublished] => 2018-07-23T17:00:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://impulseweb.in/images/bl-sep.gif
                                    [hostPageUrl] => https://impulseweb.in/vps/
                                    [contentSize] => 696 B
                                    [width] => 16
                                    [height] => 47
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.37be8d463e259025788a5dc3c07df90e?rik=fd2IHrlgMMHUVg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 3204F4A0773CA6274C9356D4C13060B91E88DD7D
                                    [accentColor] => 01659E
                                )

                            [2D56FAD8F3D7047C35E865E51A56D1FA25C52791] => Array
                                (
                                    [name] => Worried about ransomware attacks? Eliminate more threats with ONTAP ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.mJED0bbpX2Ng31-QGg4bJwHaDt?pid=Api
                                    [datePublished] => 2022-06-07T16:44:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.netapp.com/media/REVISED-worried-about-ransomware-attacks-SOCIAL-520x260_tcm19-72291.jpg
                                    [hostPageUrl] => https://www.netapp.com/blog/new-ONTAP-innovations-June2022/
                                    [contentSize] => 26791 B
                                    [width] => 520
                                    [height] => 260
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.989103d1b6e95f6360df5f901a0e1b27?rik=0mWvjT99QMdTjg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 19725C52AF1D65A15E568E53C7407D3F8DAF65D2
                                    [accentColor] => 726459
                                )

                            [90831474E56561C78B1E851E36BF18BC40B8ADC5] => Array
                                (
                                    [name] => Linux Learners Guide – Book Written by Ankam Ravi Kumar - ARKIT
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.P0in8nWAeK-Jfg6yUYPHDwHaDp?pid=Api
                                    [datePublished] => 2016-01-05T03:02:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://arkit.co.in/wp-content/uploads/2016/01/Linux-Book.png
                                    [hostPageUrl] => https://arkit.co.in/linux-learners-guide-book-written-by-ankam-ravi-kumar/
                                    [contentSize] => 65949 B
                                    [width] => 1233
                                    [height] => 607
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.3f48a7f2758078af897e0eb25183c70f?rik=CThBR15WFny44Q&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 5CDA8B04CB81FB63E158E1B87C16565E47413809
                                    [accentColor] => C95102
                                )

                            [244D6C916A92311B52291BD9F3F5435039A92800] => Array
                                (
                                    [name] => USD/INR: Rupee Continues to Trade Above 86.50, at Record Low Ahead of U ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.iobsioLaNiFlR3SMbCeW-QHaDv?pid=Api
                                    [datePublished] => 2025-09-11T21:50:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://w3assets.angelone.in/wp-content/uploads/2025/01/USD-INR-768x388.jpg
                                    [hostPageUrl] => https://www.angelone.in/news/economy/usd-inr-rupee-continues-to-trade-at-record-lows-ahead-of-us-inflation-data
                                    [contentSize] => 57317 B
                                    [width] => 768
                                    [height] => 388
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.8a86ec8a82da36216547748c6c2796f9?rik=QtTGGaYpE7Elkg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 00829A9305345F3F9DB19225B11329A619C6D442
                                    [accentColor] => B0611B
                                )

                            [EA05D059E5D7D0281DBC7C4AFD98DC5ABB160798] => Array
                                (
                                    [name] => Ourtutorials - W3.CSS
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.sjY3qKaxOiRW0xP2bKwhTAHaCL?pid=Api
                                    [datePublished] => 2021-12-13T09:43:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://ourtutorials.in/w3.css/img/w3_panel_w3_color_w3_round_size.JPG
                                    [hostPageUrl] => https://ourtutorials.in/w3.css/w3_panels.php
                                    [contentSize] => 56603 B
                                    [width] => 1327
                                    [height] => 391
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.b23637a8a6b13a2456d313f66cac214c?rik=rlANlV59DYLRyw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 897061BBA5CD89DFA4C7CBD1820D7D5E950D50AE
                                    [accentColor] => B9124B
                                )

                        )

                    [relatedSearches] => Array
                        (
                            [0] => Array
                                (
                                    [text] => Linux
                                    [displayText] => Linux
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Linux&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5834.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Linux
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=Linux&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [1] => Array
                                (
                                    [text] => Ransomware Us Linux System
                                    [displayText] => Ransomware Us Linux System
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Ransomware+Us+Linux+System&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5836.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Ransomware+Us+Linux+System
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=Ransomware+Us+Linux+System&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [2] => Array
                                (
                                    [text] => Lynx Attack Ransomware
                                    [displayText] => Lynx Attack Ransomware
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Lynx+Attack+Ransomware&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5838.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Lynx+Attack+Ransomware
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=Lynx+Attack+Ransomware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [3] => Array
                                (
                                    [text] => Ransomware as a Service
                                    [displayText] => Ransomware as a Service
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Ransomware+as+a+Service&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5840.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Ransomware+as+a+Service
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Ransomware+as+a+Service&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [4] => Array
                                (
                                    [text] => Networking Ransomware
                                    [displayText] => Networking Ransomware
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Networking+Ransomware&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5842.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Networking+Ransomware
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Networking+Ransomware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [5] => Array
                                (
                                    [text] => Ransomware Encrypted Files
                                    [displayText] => Ransomware Encrypted Files
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Ransomware+Encrypted+Files&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5844.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Ransomware+Encrypted+Files
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=Ransomware+Encrypted+Files&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [6] => Array
                                (
                                    [text] => Ransomware GUI
                                    [displayText] => Ransomware GUI
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Ransomware+GUI&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5846.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Ransomware+GUI
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=Ransomware+GUI&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [7] => Array
                                (
                                    [text] => Ransomware Cyber Attack
                                    [displayText] => Ransomware Cyber Attack
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Ransomware+Cyber+Attack&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5848.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Ransomware+Cyber+Attack
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=Ransomware+Cyber+Attack&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [8] => Array
                                (
                                    [text] => anti-Linux
                                    [displayText] => anti-Linux
                                    [webSearchUrl] => https://www.bing.com/images/search?q=anti-Linux&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5850.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=anti-Linux
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=anti-Linux&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [9] => Array
                                (
                                    [text] => Ransomware Landing Page
                                    [displayText] => Ransomware Landing Page
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Ransomware+Landing+Page&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5852.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Ransomware+Landing+Page
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Ransomware+Landing+Page&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [10] => Array
                                (
                                    [text] => Linux Malware
                                    [displayText] => Linux Malware
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Linux+Malware&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5854.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Linux+Malware
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Linux+Malware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [11] => Array
                                (
                                    [text] => Lynx Ransomware Group
                                    [displayText] => Lynx Ransomware Group
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Lynx+Ransomware+Group&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5856.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Lynx+Ransomware+Group
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Lynx+Ransomware+Group&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [12] => Array
                                (
                                    [text] => Ai Powered Ransomware
                                    [displayText] => Ai Powered Ransomware
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Ai+Powered+Ransomware&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5858.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Ai+Powered+Ransomware
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Ai+Powered+Ransomware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [13] => Array
                                (
                                    [text] => Fog Ransomware
                                    [displayText] => Fog Ransomware
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Fog+Ransomware&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5860.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Fog+Ransomware
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Fog+Ransomware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [14] => Array
                                (
                                    [text] => Linux Ransomware Note Screen Shot
                                    [displayText] => Linux Ransomware Note Screen Shot
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Linux+Ransomware+Note+Screen+Shot&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5862.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Linux+Ransomware+Note+Screen+Shot
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Linux+Ransomware+Note+Screen+Shot&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [15] => Array
                                (
                                    [text] => Kali Linux Attack
                                    [displayText] => Kali Linux Attack
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Kali+Linux+Attack&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5864.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Kali+Linux+Attack
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Kali+Linux+Attack&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [16] => Array
                                (
                                    [text] => Van Helsing Ransomware
                                    [displayText] => Van Helsing Ransomware
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Van+Helsing+Ransomware&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5866.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Van+Helsing+Ransomware
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=Van+Helsing+Ransomware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [17] => Array
                                (
                                    [text] => Ransomware Download
                                    [displayText] => Ransomware Download
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Ransomware+Download&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5868.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Ransomware+Download
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Ransomware+Download&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [18] => Array
                                (
                                    [text] => Ransomware Workstations
                                    [displayText] => Ransomware Workstations
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Ransomware+Workstations&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5870.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Ransomware+Workstations
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Ransomware+Workstations&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [19] => Array
                                (
                                    [text] => Ransomware Virus HSE
                                    [displayText] => Ransomware Virus HSE
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Ransomware+Virus+HSE&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5872.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Ransomware+Virus+HSE
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=Ransomware+Virus+HSE&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [20] => Array
                                (
                                    [text] => Qilin Ransomware On Red Hat Linux
                                    [displayText] => Qilin Ransomware On Red Hat Linux
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Qilin+Ransomware+On+Red+Hat+Linux&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5874.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Qilin+Ransomware+On+Red+Hat+Linux
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Qilin+Ransomware+On+Red+Hat+Linux&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [21] => Array
                                (
                                    [text] => Doxware Ransomware
                                    [displayText] => Doxware Ransomware
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Doxware+Ransomware&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5876.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Doxware+Ransomware
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Doxware+Ransomware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [22] => Array
                                (
                                    [text] => Suicide Linux
                                    [displayText] => Suicide Linux
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Suicide+Linux&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5878.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Suicide+Linux
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=Suicide+Linux&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [23] => Array
                                (
                                    [text] => Lynx Ransomware Diagram
                                    [displayText] => Lynx Ransomware Diagram
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Lynx+Ransomware+Diagram&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5880.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Lynx+Ransomware+Diagram
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Lynx+Ransomware+Diagram&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [24] => Array
                                (
                                    [text] => Sony Ransomware
                                    [displayText] => Sony Ransomware
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Sony+Ransomware&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5882.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Sony+Ransomware
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=Sony+Ransomware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [25] => Array
                                (
                                    [text] => Ransomware Meaning
                                    [displayText] => Ransomware Meaning
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Ransomware+Meaning&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5884.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Ransomware+Meaning
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=Ransomware+Meaning&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [26] => Array
                                (
                                    [text] => Manjaro Linux Wallpaper
                                    [displayText] => Manjaro Linux Wallpaper
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Manjaro+Linux+Wallpaper&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5886.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Manjaro+Linux+Wallpaper
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=Manjaro+Linux+Wallpaper&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [27] => Array
                                (
                                    [text] => Diageo Ransomware
                                    [displayText] => Diageo Ransomware
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Diageo+Ransomware&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5888.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Diageo+Ransomware
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=Diageo+Ransomware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [28] => Array
                                (
                                    [text] => Medusa Ransomware Warning
                                    [displayText] => Medusa Ransomware Warning
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Medusa+Ransomware+Warning&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5890.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Medusa+Ransomware+Warning
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=Medusa+Ransomware+Warning&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [29] => Array
                                (
                                    [text] => Goosehead Ransomware
                                    [displayText] => Goosehead Ransomware
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Goosehead+Ransomware&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5892.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Goosehead+Ransomware
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=Goosehead+Ransomware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [30] => Array
                                (
                                    [text] => Ransomware Eamil
                                    [displayText] => Ransomware Eamil
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Ransomware+Eamil&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5894.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Ransomware+Eamil
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Ransomware+Eamil&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [31] => Array
                                (
                                    [text] => Ransomware On Hospital System
                                    [displayText] => Ransomware On Hospital System
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Ransomware+On+Hospital+System&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5896.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Ransomware+On+Hospital+System
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Ransomware+On+Hospital+System&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [32] => Array
                                (
                                    [text] => Qilin Ransomware Run On Linux
                                    [displayText] => Qilin Ransomware Run On Linux
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Qilin+Ransomware+Run+On+Linux&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5898.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Qilin+Ransomware+Run+On+Linux
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=Qilin+Ransomware+Run+On+Linux&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [33] => Array
                                (
                                    [text] => Lynx Ransomware Socradar
                                    [displayText] => Lynx Ransomware Socradar
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Lynx+Ransomware+Socradar&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5900.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Lynx+Ransomware+Socradar
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Lynx+Ransomware+Socradar&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [34] => Array
                                (
                                    [text] => Linux Ăn Trộm
                                    [displayText] => Linux Ăn Trộm
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Linux+%C4%82n+Tr%E1%BB%99m&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5902.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Linux+%C4%82n+Tr%E1%BB%99m
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=Linux+%c4%82n+Tr%e1%bb%99m&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [35] => Array
                                (
                                    [text] => Malware vs Ransomware
                                    [displayText] => Malware vs Ransomware
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malware+vs+Ransomware&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5904.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+vs+Ransomware
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Malware+vs+Ransomware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [36] => Array
                                (
                                    [text] => Ransomware Builder GitHub
                                    [displayText] => Ransomware Builder GitHub
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Ransomware+Builder+GitHub&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5906.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Ransomware+Builder+GitHub
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Ransomware+Builder+GitHub&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [37] => Array
                                (
                                    [text] => Phishing Malware Ransomware
                                    [displayText] => Phishing Malware Ransomware
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Phishing+Malware+Ransomware&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5908.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Phishing+Malware+Ransomware
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=Phishing+Malware+Ransomware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [38] => Array
                                (
                                    [text] => Linux Server
                                    [displayText] => Linux Server
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Linux+Server&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5910.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Linux+Server
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Linux+Server&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [39] => Array
                                (
                                    [text] => Lock Bit Ransomware Screen Shot
                                    [displayText] => Lock Bit Ransomware Screen Shot
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Lock+Bit+Ransomware+Screen+Shot&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5912.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Lock+Bit+Ransomware+Screen+Shot
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Lock+Bit+Ransomware+Screen+Shot&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [40] => Array
                                (
                                    [text] => Ransomware Tweets
                                    [displayText] => Ransomware Tweets
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Ransomware+Tweets&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5914.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Ransomware+Tweets
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Ransomware+Tweets&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [41] => Array
                                (
                                    [text] => Ransomware Attack and Education Image
                                    [displayText] => Ransomware Attack and Education Image
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Ransomware+Attack+and+Education+Image&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5916.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Ransomware+Attack+and+Education+Image
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Ransomware+Attack+and+Education+Image&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [42] => Array
                                (
                                    [text] => Physical vs Hipervisor Ransomware
                                    [displayText] => Physical vs Hipervisor Ransomware
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Physical+vs+Hipervisor+Ransomware&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5918.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Physical+vs+Hipervisor+Ransomware
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=Physical+vs+Hipervisor+Ransomware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [43] => Array
                                (
                                    [text] => Ransomware Development Kits
                                    [displayText] => Ransomware Development Kits
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Ransomware+Development+Kits&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5920.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Ransomware+Development+Kits
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Ransomware+Development+Kits&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [44] => Array
                                (
                                    [text] => Ransomware On Virtualization Platforms
                                    [displayText] => Ransomware On Virtualization Platforms
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Ransomware+On+Virtualization+Platforms&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5922.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Ransomware+On+Virtualization+Platforms
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Ransomware+On+Virtualization+Platforms&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [45] => Array
                                (
                                    [text] => Brute Attack Kali Linux
                                    [displayText] => Brute Attack Kali Linux
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Brute+Attack+Kali+Linux&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5924.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Brute+Attack+Kali+Linux
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Brute+Attack+Kali+Linux&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [46] => Array
                                (
                                    [text] => Ransomware Wallpaper 4K
                                    [displayText] => Ransomware Wallpaper 4K
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Ransomware+Wallpaper+4K&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5926.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Ransomware+Wallpaper+4K
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=Ransomware+Wallpaper+4K&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [47] => Array
                                (
                                    [text] => Ubuntu Ransomware
                                    [displayText] => Ubuntu Ransomware
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Ubuntu+Ransomware&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5928.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Ubuntu+Ransomware
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=Ubuntu+Ransomware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [48] => Array
                                (
                                    [text] => Monti Ransomware Publication
                                    [displayText] => Monti Ransomware Publication
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Monti+Ransomware+Publication&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5930.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Monti+Ransomware+Publication
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=Monti+Ransomware+Publication&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [49] => Array
                                (
                                    [text] => Ramsomware GUI
                                    [displayText] => Ramsomware GUI
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Ramsomware+GUI&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5932.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Ramsomware+GUI
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Ramsomware+GUI&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                        )

                    [createdate] => 1769840754164
                )

            [json_error] => No error
            [products_count] => 120
            [related_searches_count] => 50
            [first_product_sample] => Array
                (
                    [name] => 1 US Dollar to Indian Rupee Today and in 1947 | USD to INR History ...
                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.lXdb_O6fUnFzcP21wOqdUgHaE8?pid=Api
                    [datePublished] => 2023-09-29T11:51:00.0000000Z
                    [isFamilyFriendly] => 1
                    [contentUrl] => https://images.forbesindia.com/blog/wp-content/uploads/media/images/2024/Jan/img_226625_usdollartoindianrupee.jpg
                    [hostPageUrl] => https://www.forbesindia.com/article/explainers/1-usd-to-inr-history/88635/1
                    [contentSize] => 128370 B
                    [width] => 900
                    [height] => 600
                    [cDNContentUrl] => https://th.bing.com/th/id/R.95775bfcee9f52717370fdb5c0ea9d52?rik=TJVKdX3SBwrjDQ&pid=ImgRaw&r=0
                    [isTransparent] => 
                    [imageId] => 054B3D9FA4698DF7E1050DE30A07D27D754A954C
                    [accentColor] => BC670F
                )

        )

    [skipped_products] => Array
        (
        )

)

Related Searches

Search