http://206.189.178.169:3001/?freshness=All&show=1&q=Malware-Risks+INR+loc%3Ain Malware Risks - Discover Fashion Products | Styleberry

Malware Risks

120 results discovered for Malware Risks. Refine by style, occasion, or category to find more relevant fashion products.

Debug Information

Array
(
    [meilisearch] => Array
        (
            [url] => https://msin.fadunews.in/indexes/zipri/search
            [http_code] => 200
            [response] => {"hits":[],"query":"Malware-Risks","processingTimeMs":1,"limit":3,"offset":0,"estimatedTotalHits":0}
            [curl_error] => 
            [parsed] => Array
                (
                    [hits] => Array
                        (
                        )

                    [query] => Malware-Risks
                    [processingTimeMs] => 1
                    [limit] => 3
                    [offset] => 0
                    [estimatedTotalHits] => 0
                )

        )

    [image_search] => Array
        (
            [url] => http://206.189.178.169:3001/?freshness=All&show=1&q=Malware-Risks+INR+loc%3Ain
            [http_code] => 200
            [response] => {"name":"malware-risks inr loc:in","totalEstimatedMatches":222,"nextOffset":120,"currentOffset":0,"value":{"E7A8143009CEAD9109900397B06A67280DE621AD":{"name":"Risk monitoring helps Air India prevent revenue loss of over INR 3 cr ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.MVTnVaL4OfXLs6DPXKukxwHaEu?pid=Api","datePublished":"2023-10-14T16:36:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://etimg.etb2bimg.com/thumb/msid-104429059,imgsize-15734,width-1200,height=765,overlay-etinfra/news/aviation/risk-monitoring-helps-air-india-prevent-revenue-loss-of-over-inr-3-cr.jpg","hostPageUrl":"https://infra.economictimes.indiatimes.com/news/aviation/risk-monitoring-helps-air-india-prevent-revenue-loss-of-over-inr-3-cr/104429059","contentSize":"37249 B","width":1200,"height":765,"cDNContentUrl":"https://th.bing.com/th/id/R.3154e755a2f839f5cbb3a0cf5caba4c7?rik=fopBA5Ds2hmQCQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"DA126ED08276A60B7930099019DAEC9003418A7E","accentColor":"A82623"},"652A4C1DCAB4E7388F190170A94E23192C62400E":{"name":"Could be a huge mistake: KKR risk flagged after splurging INR 18 crore ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.anwwskm5-2AP7xU2UiquzQHaEK?pid=Api","datePublished":"2025-12-16T12:56:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.hindustantimes.com/ht-img/img/2025/12/16/550x309/PTI03-31-2024-000376B-0_1712129179172_1765887837176.jpg","hostPageUrl":"https://www.hindustantimes.com/cricket/could-be-huge-mistake-kkr-risk-flagged-splurging-inr-18-crore-matheesha-pathirana-despite-worst-ipl-season-with-csk-101765884180052.html","contentSize":"65338 B","width":549,"height":309,"cDNContentUrl":"https://th.bing.com/th/id/R.6a7c30b249b9fb600fef1536522aaecd?rik=VqLE0axLfoP4kQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E00426C29132E49A071091F8837E4BACD1C4A256","accentColor":"B98B12"},"B1B6510697B5CE97870C1BB8C76EDB74A9601DAD":{"name":"BUY Polkastarter (POLS)in INR on PocketBits!","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.H2i4BOXlnozZwi1Cgu8lDwHaEK?pid=Api","datePublished":"2022-01-15T08:37:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://pocketbits.in/blog/content/images/2021/12/pols.jpg","hostPageUrl":"https://pocketbits.in/blog/buy-polkastarter-pols-in-inr-on-pocketbits-11/","contentSize":"94407 B","width":1600,"height":900,"cDNContentUrl":"https://th.bing.com/th/id/R.1f68b804e5e59e8cd9c22d4282ef250f?rik=G2sVYHlb7Hl4wA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"DAD1069A47BDE67C8BB1C07879EC5B7960156B1B","accentColor":"BF0C38"},"5F9D9FB9DD8C747342CCFE05591104F96426A410":{"name":"INR Full Form: What is full form of INR?","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.-HbYAKjSJ-4PC_ZocKUqaAHaEU?pid=Api","datePublished":"2022-11-05T12:08:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://st.adda247.com/https://wpassets.adda247.com/wp-content/uploads/multisite/2022/11/05144815/What-is-INR.png","hostPageUrl":"https://www.bankersadda.com/inr-full-form/","contentSize":"35329 B","width":720,"height":420,"cDNContentUrl":"https://th.bing.com/th/id/R.f876d800a8d227ee0f0bf66870a52a68?rik=9dn5m93IRzckzA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"014A62469F40119550EFCC243747C8DD9BF9D9F5","accentColor":"B71414"},"5C45162565D8BB28CF6C7A715DA63EB08C889142":{"name":"Philips Remote Inr Order Form - Fill Online, Printable, Fillable, Blank ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.DUbYLxixf5e5xzupgj38ngAAAA?pid=Api","datePublished":"2016-03-30T07:52:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.pdffiller.com/preview/5/739/5739835.png","hostPageUrl":"https://www.pdffiller.com/5739835-fillable-philips-prescription-form-inr","contentSize":"7936 B","width":298,"height":386,"cDNContentUrl":"https://th.bing.com/th/id/R.0d46d82f18b17f97b9c73ba9823dfc9e?rik=xVRhUlaNu4L8xg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"241988C80BE36AD517A7C6FC82BB8D56526154C5","accentColor":"50697B"},"36DF5C3262D3A62B582F7DC41009C7439FAD3808":{"name":"Currency Converter - Convert USD to INR, INR to EUR | Currency ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.2-e_M7bMmeTMsZhMTAtECAAAAA?pid=Api","datePublished":"2017-11-02T02:10:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://img.etimg.com/thumb/msid-121874714,width-160,imglength-81542,resizemode-4/rupee-braces-for-more-losses-on-oil-risks-rbi-likely-to-provide-support.jpg","hostPageUrl":"https://economictimes.indiatimes.com/markets/forex/currency-converter","contentSize":"2858 B","width":160,"height":84,"cDNContentUrl":"https://th.bing.com/th/id/R.dbe7bf33b6cc99e4ccb1984c4c0b4408?rik=Y%2f3FIyY9arKF8g&pid=ImgRaw&r=0","isTransparent":false,"imageId":"8083DAF9347C90014CD7F285B26A3D2623C5FD63","accentColor":"674E38"},"CEEBD75497D89EE2FE0F9306E2D003156A4C4F21":{"name":"Is home inr monitoring a safe option for children requiring long-term ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.WCa_IrBWNalFvTWLtXoHjgAAAA?pid=Api","datePublished":"2015-05-27T12:26:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.pediatriconcall.com/master/images/sign-up.png","hostPageUrl":"https://www.pediatriconcall.com/pediatric-journal/view/fulltext-articles/943/C/0/0/833/0","contentSize":"480 B","width":24,"height":24,"cDNContentUrl":"https://th.bing.com/th/id/R.5826bf22b05635a945bd358bb57a078e?rik=7L59RXmN6S7v8A&pid=ImgRaw&r=0","isTransparent":true,"imageId":"12F4C4A651300D2E6039F0EF2EE98D79457DBEEC","accentColor":"0AACC1"},"E148C31E57A68359979B406E75667B19921B767F":{"name":"MC-ISA: A Multi-Channel Code Visualization Method for Malware Detection","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.Gr3n8QlkYV0BNlXXUv7kzQHaHa?pid=Api","datePublished":"2023-05-17T11:31:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mdpi.com/electronics/electronics-12-02272/article_deploy/html/images/electronics-12-02272-g001.png","hostPageUrl":"https://www.mdpi.com/2079-9292/12/10/2272","contentSize":"1779231 B","width":3548,"height":3552,"cDNContentUrl":"https://th.bing.com/th/id/R.1abde7f10964615d013655d752fee4cd?rik=HoQ84XVqOJV5uQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"F767B12991B76657E604B97995386A75E13C841E","accentColor":"1765B4"},"4406A69803D3A3ECDDBA49A5DDEEBEEC659E4AD0":{"name":"Building Resilience in Manufacturing: The Critical Need for OT ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.J5GH5VkD-ZMo9UlWTXOJOgHaEK?pid=Api","datePublished":"2024-12-10T16:04:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://rockwellautomation.scene7.com/is/image/rockwellautomation/malware-cyber-threats-SHS-2279624513.2400.jpg","hostPageUrl":"https://www.rockwellautomation.com/en-in/company/news/magazines/cybersecurity-resilience-dragos.html","contentSize":"127174 B","width":2400,"height":1350,"cDNContentUrl":"https://th.bing.com/th/id/R.279187e55903f99328f549564d73893a?rik=RGBqiTA9Os7dqw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"0DA4E956CEEBEEDD5A94ABDDCE3A3D30896A6044","accentColor":"390109"},"934B5B2AA38A3B0FD056B37D3420F87AE6CA2900":{"name":"FBI Alert: BADBOX 2.0 Botnet Targets Smart Devices","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.q1J2TLmG3ZzOHKfPrOCwLQHaEz?pid=Api","datePublished":"2025-06-26T13:24:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://blogs.npav.net/media/magefan_blog/badbox-2-iot-malware-warning_3_.png","hostPageUrl":"https://blogs.npav.net/blogs/post/fbi-alert-badbox-20-botnet-targets-smart-devices","contentSize":"1405949 B","width":1080,"height":700,"cDNContentUrl":"https://th.bing.com/th/id/R.ab52764cb986dd9cce1ca7cface0b02d?rik=ObS1ojqos%2fANZQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"0092AC6EA78F0243D73B650DF0B3A83AA2B5B439","accentColor":"C00302"},"262B2BBCCA79836C437F6B1D190E222CBAF47466":{"name":"Your mental health internet search may lead to malware - Blog","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.x2cIIyknAxu9fR0iQmrNmQHaIy?pid=Api","datePublished":"2023-09-11T17:46:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://helios-i.mashable.com/imagery/articles/07B8FpolvHmF8cAnkOzzSre/images-1.fill.size_632x750.v1692311998.png","hostPageUrl":"https://appsmanager.in/blog/your-mental-health-internet-search-may-lead-to-malware","contentSize":"117302 B","width":632,"height":750,"cDNContentUrl":"https://th.bing.com/th/id/R.c76708232927031bbd7d1d22426acd99?rik=YrKyy6yXOMY09w&pid=ImgRaw&r=0","isTransparent":false,"imageId":"66474FABC222E091D1B6F734C63897ACCBB2B262","accentColor":"1F96AC"},"DDCADDF02E6B1C236518692378EE2BEEFC459312":{"name":"Recent Cases of Watering Hole Attacks, Part 1","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.C-HYizB8PxnYWWiiYpJpWgHaHS?pid=Api","datePublished":"2024-12-19T02:55:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://blogs.jpcert.or.jp/en/.assets/watering_hole_attack_2023_1-fig5.png","hostPageUrl":"https://sechub.in/view/2989271","contentSize":"125606 B","width":1189,"height":1171,"cDNContentUrl":"https://th.bing.com/th/id/R.0be1d88b307c3f19d85968a26292695a?rik=3azdD%2bK2wTJWgQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"213954CFEEB2EE873296815632C1B6E20FDDACDD","accentColor":"820E0F"},"C2F40FA815BF17A5EB27C9DC274051627469C89E":{"name":"Similarity-Based Malware Classification Using Graph Neural Networks","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.1a6qrTBJytHiRKLsZ4wpigHaDI?pid=Api","datePublished":"2022-10-26T09:08:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mdpi.com/applsci/applsci-12-10837/article_deploy/html/images/applsci-12-10837-g001.png","hostPageUrl":"https://www.mdpi.com/2076-3417/12/21/10837","contentSize":"1009729 B","width":3306,"height":1395,"cDNContentUrl":"https://th.bing.com/th/id/R.d5aeaaad3049cad1e244a2ec678c298a?rik=LE%2fwilH7cVq%2bcg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E98C964726150472CD9C72BE5A71FB518AF04F2C","accentColor":"C47107"},"4744E21E60F6237F7BE2F89733EFC2B6DF52695F":{"name":"Fintech: An Evergreen Sector Getting More Greener (2/2) | nasscom | The ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.usCa8ml8NmerdIgFRkQZeQHaDt?pid=Api","datePublished":"2021-07-07T06:36:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://community.nasscom.in/sites/default/files/inline-images/Fintech%202-2.png","hostPageUrl":"https://community.nasscom.in/communities/productstartups/fintech-evergreen-sector-getting-more-greener-22","contentSize":"50495 B","width":953,"height":478,"cDNContentUrl":"https://th.bing.com/th/id/R.bac09af2697c3667ab74880546441979?rik=dEQu4QZvMve3Lg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"F59625FD6B2CFE33798F2EB7F7326F06E12E4474","accentColor":"0888B1"},"807199F9C7BFACF6AA6A59EB2A053D1F828A25B7":{"name":"Malware Forensics Guide – Static and Dynamic Approach – Yeah Hub","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP._a9PcwTqYroM7Yw0u2HDDQHaDi?pid=Api","datePublished":"2017-02-03T18:16:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.yeahhub.com/wp-content/uploads/2017/01/malware.png","hostPageUrl":"https://www.yeahhub.com/malware-forensics-guide-static-dynamic-approach/","contentSize":"451756 B","width":1600,"height":764,"cDNContentUrl":"https://th.bing.com/th/id/R.fdaf4f7304ea62ba0ced8c34bb61c30d?rik=CBeZn3z7ym%2bqpg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"7B52A828F1D350A2BE95A6AA6FCAFB7C9F991708","accentColor":"CB7600"},"1B66A7BBD02353C44522377BC8AA30FA9ED6F94D":{"name":"Is The 16 Billion Password Leak A New Data Breach? Here's The Truth ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.teMB5yrHt8FtMzu3gYsefwHaEK?pid=Api","datePublished":"2025-06-20T23:13:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://images.timesnownews.com/thumb/msid-152119608,thumbsize-872832,width-1280,height-720,resizemode-75/152119608.jpg","hostPageUrl":"https://www.timesnownews.com/world/is-the-16-billion-password-leak-a-new-data-breach-heres-the-truth-article-152119414","contentSize":"857204 B","width":1280,"height":720,"cDNContentUrl":"https://th.bing.com/th/id/R.b5e301e72ac7b7c16d333bb7818b1e7f?rik=sWZ6uw0yNUxUIg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"D49F6DE9AF03AA8CB77322544C35320DBB7A66B1","accentColor":"C60508"},"311570A1266C25792EBD9D3C6AC18FA84F4F008E":{"name":"Malware: Your banking information is at risk! New malware Coyote ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.ncK78KzdzXGI1RsnVRNLeAHaEQ?pid=Api","datePublished":"2025-07-30T15:00:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1JzX0C.img?w=920&h=528&m=4&q=60","hostPageUrl":"https://www.msn.com/en-in/money/news/malware-your-banking-information-is-at-risk-new-malware-coyote-activated-under-the-guise-of-windows-feature/ar-AA1JApZ6","contentSize":"131072 B","width":920,"height":528,"cDNContentUrl":"https://th.bing.com/th/id/R.9dc2bbf0acddcd7188d51b2755134b78?rik=E1EHGmLGUpfi2w&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E800F4F48AF81CA6C3D9DBE29752C6621A075113","accentColor":"1D8FAE"},"11D8BAFB3EA43562173EB37D3420F87AE6CA2900":{"name":"FBI Alert: BADBOX 2.0 Botnet Targets Smart Devices","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.k12OOF6HjqzvPks60RF9JwHaE8?pid=Api","datePublished":"2025-06-26T13:24:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://blogs.npav.net/media/wysiwyg/badbox-2-iot-malware-warning_1_.png","hostPageUrl":"https://blogs.npav.net/blogs/post/fbi-alert-badbox-20-botnet-targets-smart-devices","contentSize":"312291 B","width":499,"height":333,"cDNContentUrl":"https://th.bing.com/th/id/R.935d8e385e878eacef3e4b3ad1117d27?rik=EY2rv%2bNKUyZx4w&pid=ImgRaw&r=0","isTransparent":false,"imageId":"0092AC6EA78F0243D73BE37126534AE3BFAB8D11","accentColor":"BD200E"},"9FA4F41F5D7898BE378A3250F12EA4C109453D2C":{"name":"Cómo responder a una infección de malware en la empresa","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.L8zzkCOGls6ewNcnH4Gd7QAAAA?pid=Api","datePublished":"2015-11-24T20:11:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://web-assets.esetstatic.com/wls/2015/11/guia_infeccion_malware_empresa.jpg","hostPageUrl":"https://www.welivesecurity.com/la-es/2015/11/24/como-responder-infeccion-de-malware-empresa/","contentSize":"29009 B","width":400,"height":394,"cDNContentUrl":"https://th.bing.com/th/id/R.2fccf390238696ce9ec0d7271f819ded?rik=%2bUpP8dWHietzqA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"C2D354901C4AE21F0523A873EB8987D5F14F4AF9","accentColor":"2A96A1"},"03BE2DA6ACF4C4BBD08E9AAA27C31A3F0DDD954F":{"name":"What is Cybercrime | Risks & Anti-Malware Solutions","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.p313af7qIiAF5D6q2xJwhwHaEL?pid=Api","datePublished":"2017-10-22T03:56:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.kaspersky.co.in/content/en-in/images/repository/isc/2017-images/malware-img-17.jpg","hostPageUrl":"https://www.kaspersky.co.in/resource-center/threats/cybercrime","contentSize":"111087 B","width":710,"height":400,"cDNContentUrl":"https://th.bing.com/th/id/R.a77d7769feea222005e43eaadb127087?rik=MOvSaspPTLsN6A&pid=ImgRaw&r=0","isTransparent":false,"imageId":"F459DDD0F3A13C72AAA9E80DBB4C4FCA6AD2EB30","accentColor":"2E959D"},"C403417E6537A7B7A92BB65D571C67D65693619A":{"name":"Email inbox and spam virus represent internet security risks and ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.WrKJd4Hsxx6igPsMNvtpigHaDt?pid=Api","datePublished":"2024-03-10T23:39:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://img.freepik.com/premium-photo/email-inbox-spam-virus-represent-internet-security-risks-compromised-information-concept-internet-security-email-safety-data-breaches-malware-threats-cyber-security_918839-36555.jpg","hostPageUrl":"https://www.freepik.com/premium-ai-image/email-inbox-spam-virus-represent-internet-security-risks-compromised-information-concept-internet-security-email-safety-data-breaches-malware-threats-cyber-security_154511522.htm","contentSize":"48650 B","width":626,"height":313,"cDNContentUrl":"https://th.bing.com/th/id/R.5ab2897781ecc71ea280fb0c36fb698a?rik=TDAU51Zzenuasg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"A91639656D76C175D56BB29A7B7A7356E714304C","accentColor":"B39A18"},"88B330097FC490112C5F3E62B3E641CDD567B747":{"name":"Trellix Global Defenders: Analysis and Protections for Destructive Wipers","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.SGt4O_cLKlLS-47s7UnxKwHaEA?pid=Api","datePublished":"2022-11-17T22:38:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.trellix.com/en-us/img/newsroom/stories/analysis-protections-destructive-wipers-9.jpg","hostPageUrl":"https://www.trellix.com/blogs/research/trellix-global-defenders-analysis-protections-for-destructive-wipers/","contentSize":"68863 B","width":1322,"height":716,"cDNContentUrl":"https://th.bing.com/th/id/R.486b783bf70b2a52d2fb8eeced49f12b?rik=iDsDkPdMCRHC9Q&pid=ImgRaw&r=0","isTransparent":false,"imageId":"747B765DDC146E3B26E3F5C211094CF790033B88","accentColor":"1A4B64"},"69F5D91E8E44DC01562B44F4400F317359B8CBD1":{"name":"Gaming mouse maker infected users with malware for weeks, then quietly ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.ZNq8k95Ltvubc8cj6S8PfwHaEL?pid=Api","datePublished":"2025-07-24T11:15:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://images.hindustantimes.com/tech/img/2025/07/24/1600x900/michael-geiger-JJPqavJBy_k-unsplash_1753355408301_1753355494298.jpg","hostPageUrl":"https://tech.hindustantimes.com/tech/news/gaming-mouse-maker-infected-users-with-malware-for-weeks-then-quietly-replaced-files-without-warning-71753355320353.html","contentSize":"162329 B","width":1596,"height":900,"cDNContentUrl":"https://th.bing.com/th/id/R.64dabc93de4bb6fb9b73c723e92f0f7f?rik=ll%2bd4ehEzRBlsg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"1DBC8B953713F0044F44B26510CD44E8E19D5F96","accentColor":"CC0100"},"71CA1EBAFA3BAA1638501313D67CD4583E7859A4":{"name":"What is Ransomware?","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.2PcIQRquEOcxqgARTExdYQHaEL?pid=Api","datePublished":"2018-06-24T10:02:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.kaspersky.co.in/content/en-in/images/repository/isc/2021/ransomware.jpg","hostPageUrl":"https://www.kaspersky.co.in/resource-center/threats/ransomware","contentSize":"43237 B","width":710,"height":400,"cDNContentUrl":"https://th.bing.com/th/id/R.d8f708411aae10e731aa00114c4c5d61?rik=F6zhq6%2bzqmGDBQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"4A9587E3854DC76D3131058361AAB3AFABE1AC17","accentColor":"B93012"},"279FB7A7284455EC19653D3658151D97AC8FDD39":{"name":"Understanding Malware Terminology for Beginners","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.9fecClmt2CwK5drp7emfdQHaEK?pid=Api","datePublished":"2024-07-28T01:31:00.0000000Z","isFamilyFriendly":true,"contentUrl":"http://securityaffairs.co/wordpress/wp-content/uploads/2014/06/malware-computer-virus.jpg","hostPageUrl":"https://sechub.in/view/92746","contentSize":"21343 B","width":640,"height":360,"cDNContentUrl":"https://th.bing.com/th/id/R.f5f79c0a59add82c0ae5dae9ede99f75?rik=cvl7eoJEVc6RVg&riu=http%3a%2f%2fsecurityaffairs.co%2fwordpress%2fwp-content%2fuploads%2f2014%2f06%2fmalware-computer-virus.jpg&ehk=CLbQLrvL5fC7WUgJqLisCRmnoapncXeKmfTv94zOTuA%3d&risl=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"93DDF8CA79D1518563D35691CE5544827A7BF972","accentColor":"160404"},"1BB7215E7A3E6E129D44ED28EE9EBFAFADF77542":{"name":"How would i trigger an update for MS 365 Defender -Devices with Malware ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.HlB7_x23x-qNVSyJUVWZ3AAAAA?pid=Api","datePublished":"2025-04-14T19:30:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://learn-attachment.microsoft.com/api/attachments/151893-deviceswith-malware.png?platform=QnA","hostPageUrl":"https://learn.microsoft.com/en-in/answers/questions/637951/how-would-i-trigger-an-update-for-ms-365-defender","contentSize":"12247 B","width":433,"height":297,"cDNContentUrl":"https://th.bing.com/th/id/R.1e507bff1db7c7ea8d552c89515599dc?rik=sXsS5afj5iHZRA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"24577FDAFAFBE9EE82DE44D921E6E3A7E5127BB1","accentColor":"0000CC"},"946D56343402B478F3E7FE78913F6F793D152D3A":{"name":"Exploring the Risks of AI-Powered Malware and Defensive AI","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.c7v-mPoV8xjtIGSKu62HZAAAAA?pid=Api","datePublished":"2025-01-02T11:43:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://cdn.img.gen.in/assets/business/5806/feeds/8697/5806_638713796565177679119205.jpg?rendered=true&width=400&height=300&meta=true","hostPageUrl":"https://www.comtechsystems.in/blog/exploring-the-risks-of-8697","contentSize":"28574 B","width":466,"height":350,"cDNContentUrl":"https://th.bing.com/th/id/R.73bbfe98fa15f318ed20648abbad8764?rik=SdZlQ0MgS4c%2ffg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"A3D251D397F6F31987EF7E3F874B20434365D649","accentColor":"04100E"},"25F28DFC531A75E9582AF8EB21C4D9F146E0EB65":{"name":"Google Makes Developer Verification Mandatory For Android Apps","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.VqWTRasRNWFJVCUt1QPHtwHaEc?pid=Api","datePublished":"2025-08-27T06:47:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.boomlive.in/h-upload/2025/08/27/1047503-google-fi.webp","hostPageUrl":"https://www.boomlive.in/web-stories/news/google-to-require-developer-verification-for-android-apps-to-curb-malware-risks-2566","contentSize":"33346 B","width":1280,"height":768,"cDNContentUrl":"https://th.bing.com/th/id/R.56a59345ab1135614954252dd503c7b7?rik=Ui%2fYzzWhV56Fog&pid=ImgRaw&r=0","isTransparent":false,"imageId":"56BE0E641F9D4C12BE8FA2859E57A135CFD82F52","accentColor":"C99502"},"B3CFFD19179F84BFC8BDCED060D885368AF5BDE6":{"name":"The Rise of UPI Frauds - How to Prevent Frauds & Stay Safe","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.kFSKdhAUT6NggW2ZNkUnmQHaFU?pid=Api","datePublished":"2024-02-08T12:49:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.paisabazaar.com/wp-content/uploads/2024/02/The-Rise-of-UPI-Fraud-1.jpg","hostPageUrl":"https://www.paisabazaar.com/banking/upi-frauds-prevention/","contentSize":"182794 B","width":793,"height":570,"cDNContentUrl":"https://th.bing.com/th/id/R.90548a7610144fa360816d9936452799?rik=O%2fzfkXH5SPuM2w&pid=ImgRaw&r=0","isTransparent":false,"imageId":"6EDB5FA863588D060DECDB8CFB48F97191DFFC3B","accentColor":"BC590F"},"D9376E34F6F79408D5259D8C358BF1F910BF7C0D":{"name":"Understanding Agobot: The Pioneering Modular Malware - Tech Hyme","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.6lU4EhO8QB1plEQuTYT5YwHaDq?pid=Api","datePublished":"2023-08-13T03:23:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://techhyme.com/wp-content/uploads/2023/08/Agobot-Malware-Techhyme-1024x506.jpg","hostPageUrl":"https://techhyme.com/understanding-agobot-the-pioneering-modular-malware/","contentSize":"17646 B","width":1024,"height":506,"cDNContentUrl":"https://th.bing.com/th/id/R.ea55381213bc401d6994442e4d84f963?rik=nXPmQ29%2fSYBdUg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"D0C7FB019F1FB853C8D9525D80497F6F43E6739D","accentColor":"C3084E"},"5C0039107061BB6D1830EF8F2E93808CC1945A76":{"name":"Robust Intelligent Malware Detection Using Deep Learning | S-Logix","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.I0MDQLY9f8sYujHmEOMpJwHaDN?pid=Api","datePublished":"2022-06-16T23:58:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://slogix.in/images/machine-learning/robust-intelligent-malware-detection-using-deep-learning.jpg","hostPageUrl":"https://slogix.in/machine-learning/robust-intelligent-malware-detection-using-deep-learning/","contentSize":"40012 B","width":830,"height":360,"cDNContentUrl":"https://th.bing.com/th/id/R.23430340b63d7fcb18ba31e610e32927?rik=xQCTAQcWu9aBAw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"67A5491CC80839E2F8FE0381D6BB1607019300C5","accentColor":"004B95"},"AEDE4612BF85FF90A7C964D02C6CDC5A1DB2AF38":{"name":"FBI warns against malware risks in free file converters: What you need ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.c2XxCN2jcbui3GKOQ4LPpwHaEK?pid=Api","datePublished":"2025-03-10T06:49:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1AAIaq.img?w=768&h=432&m=6&x=262&y=228&s=127&d=127","hostPageUrl":"https://www.msn.com/en-in/money/news/fbi-warns-against-malware-risks-in-free-file-converters-what-you-need-to-know/ar-AA1AApxk","contentSize":"65536 B","width":768,"height":432,"cDNContentUrl":"https://th.bing.com/th/id/R.7365f108dda371bba2dc628e4382cfa7?rik=6u1kIftY%2fwl6nA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"83FA2BD1A5CDC6C20D469C7A09FF58FB2164EDEA","accentColor":"044763"},"C7F78C748FD9B94651AD1C72C3D5F28E6108FD89":{"name":"Windows 11 Upgrade on mind? Beware, don't click on fake installer ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.5eG5rlS9Z1ujbvyrdODUbgHaEK?pid=Api","datePublished":"2022-02-11T07:40:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://images.hindustantimes.com/tech/img/2022/02/11/960x540/Untitled_design_-_2022-02-11T124934.597_1644564944243_1644564969887.jpg","hostPageUrl":"https://tech.hindustantimes.com/tech/news/windows-11-upgrade-on-mind-beware-don-t-click-on-fake-installer-avoid-big-malware-risk-71644564888416.html","contentSize":"53310 B","width":960,"height":540,"cDNContentUrl":"https://th.bing.com/th/id/R.e5e1b9ae54bd675ba36efcab74e0d46e?rik=fH%2fIR%2fidm2QV2g&pid=ImgRaw&r=0","isTransparent":false,"imageId":"98DF8016E82F5D3C27C1DA15649B9DF847C87F7C","accentColor":"0642C1"},"69A9997739AC2C3F3EB486B47AE5F798D389AFAC":{"name":"RBI Increases Risk Weights: A Simple Explainer!","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.VlR_HSKfc3Phl9aDdjslQgHaEK?pid=Api","datePublished":"2023-11-25T01:21:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.samco.in/images/samshot_images/rbis-new-risk-weights-rules-simplified_ep54.jpg","hostPageUrl":"https://www.samco.in/samshots/november-ipo-frenzy-over-inr-7300-crores-raised","contentSize":"53602 B","width":714,"height":402,"cDNContentUrl":"https://th.bing.com/th/id/R.56547f1d229f7373e197d683763b2542?rik=lpqZd5PKwvPjSw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"CAFA983D897F5EA74B684BE3F3C2CA9377999A96","accentColor":"C73004"},"5C1310343CD86EF31AC29F55474ED96D6818A7E6":{"name":"Ransomware, AI risks, and malware: Acronis report highlights growing ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.SGzCW3Xkib-E6T2cLXkhNwHaEu?pid=Api","datePublished":"2025-02-13T18:18:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://etimg.etb2bimg.com/thumb/msid-118217483,imgsize-60000,width-1200,height=765,overlay-etmanufacturing/news/hi-tech/ransomware-ai-risks-and-malware-acronis-report-highlights-growing-cyberthreats-in-h2-2024.jpg","hostPageUrl":"https://manufacturing.economictimes.indiatimes.com/news/hi-tech/ransomware-ai-risks-and-malware-acronis-report-highlights-growing-cyberthreats-in-h2-2024/118217483","contentSize":"109978 B","width":1200,"height":765,"cDNContentUrl":"https://th.bing.com/th/id/R.486cc25b75e489bf84e93d9c2d792137?rik=xTEBQ8ON5j%2bhLA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"6E7A8186D69DE47455F92CA13FE68DC3430131C5","accentColor":"C38C08"},"091B87C35203224D61B07410ACF7865F4BA9931E":{"name":"Exploring the Perioperative Use of DOACs, off the Beaten Track","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.HvjGdGy4wZ1iWGcQ-PD0swHaEj?pid=Api","datePublished":"2024-05-24T09:50:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mdpi.com/jcm/jcm-13-03076/article_deploy/html/images/jcm-13-03076-g002.png","hostPageUrl":"https://www.mdpi.com/2077-0383/13/11/3076","contentSize":"1385070 B","width":3793,"height":2335,"cDNContentUrl":"https://th.bing.com/th/id/R.1ef8c6746cb8c19d62586710f8f0f4b3?rik=kLF4PCUwItQWCw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E1399AB4F5687FCA01470B16D42230253C78B190","accentColor":"37516B"},"D5FD9BF7A6C60AFF9216B7351945EBE706A35F98":{"name":"Restart Your Phone Weekly To Avoid Serious Security Risks Such As Scams ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.ZIuEoWZvrMCRGF99Un0t2gHaEK?pid=Api","datePublished":"2024-06-03T16:15:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://images.timesnownews.com/thumb/msid-110674132,width-1280,height-720,resizemode-75/110674132.jpg","hostPageUrl":"https://www.timesnownews.com/technology-science/restart-your-phone-weekly-to-avoid-serious-security-risks-nsa-advises-article-110674132","contentSize":"65125 B","width":1280,"height":720,"cDNContentUrl":"https://th.bing.com/th/id/R.648b84a1666facc091185f7d527d2dda?rik=Xd%2b5f2psoP8pYQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"89F53A607EBE5491537B6129FFA06C6A7FB9DF5D","accentColor":"260C36"},"ACECD82CC102D27F0633DAFAC36F47DBFBE5B834":{"name":"What is Risk Management? Definition of Risk Management, Risk Management ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.JGcx34T-lytYWYCFcANZbgAAAA?pid=Api","datePublished":"2012-07-05T05:39:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://img.etimg.com/thumb/msid-110863385,width-160,height-120/markets/forex/learn-with-etmarkets-how-inflation-impacts-inr-what-currency-traders-should-do.jpg","hostPageUrl":"https://economictimes.indiatimes.com/definition/risk-management","contentSize":"3975 B","width":160,"height":120,"cDNContentUrl":"https://th.bing.com/th/id/R.246731df84fe972b585980857003596e?rik=ys6NwhwgLfdgMw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"438B5EBFBD74F63CAFAD3360F72D201CC28DCECA","accentColor":"376E82"},"1898643C27739F5C404EC94E6D2AA7961C1B95B4":{"name":"Minecraft players at risk: New malware campaign targets player login ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.j546P3uaNBeZ_E7c9cMAUwHaEK?pid=Api","datePublished":"2025-06-20T10:34:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://static.digit.in/Minecraft-.png","hostPageUrl":"https://www.digit.in/news/gaming/minecraft-players-at-risk-new-malware-campaign-targets-player-login-and-crypto-wallets.html","contentSize":"90165 B","width":1280,"height":720,"cDNContentUrl":"https://th.bing.com/th/id/R.8f9e3a3f7b9a341799fc4edcf5c30053?rik=gYlGw3I3%2bcUE5A&pid=ImgRaw&r=0","isTransparent":false,"imageId":"4B59B1C1697AA2D6E49CE404C5F93772C3468981","accentColor":"BC8B0F"},"AFDED8C83AA211137525E7565CE3077B2F07DFB0":{"name":"OpenClaw Complete Guide: Setup, Security Risks, 341 Mal... - Tamiltech","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.SWplHrIrD8MZtzVQSDzhzgHaEg?pid=Api","datePublished":"2026-02-05T09:00:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://cdn.tamiltech.in/media/2026/02/what-is-openclaw-4kiyfezY.webp","hostPageUrl":"https://tamiltech.in/public/article/openclaw-complete-guide-setup-security-risks-clawhub-malware-2026","contentSize":"49948 B","width":1516,"height":924,"cDNContentUrl":"https://th.bing.com/th/id/R.496a651eb22b0fc319b73550483ce1ce?rik=%2bu2NjKMqETFXUg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"0BFD70F2B7703EC5657E525731112AA38C8DEDFA","accentColor":"AD241E"},"5C871217D6CC18927D3D7410ACF7865F4BA9931E":{"name":"Exploring the Perioperative Use of DOACs, off the Beaten Track","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.dqYQ5SMMabuU1BY8Jo8fvAHaEW?pid=Api","datePublished":"2024-05-24T09:50:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mdpi.com/jcm/jcm-13-03076/article_deploy/html/images/jcm-13-03076-g005.png","hostPageUrl":"https://www.mdpi.com/2077-0383/13/11/3076","contentSize":"963835 B","width":3290,"height":1936,"cDNContentUrl":"https://th.bing.com/th/id/R.76a610e5230c69bb94d4163c268f1fbc?rik=xXghcW3MgSnX0w&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E1399AB4F5687FCA0147D3D72981CC6D712178C5","accentColor":"136AB8"},"C9C27212AE1CBD0148D47410ACF7865F4BA9931E":{"name":"Exploring the Perioperative Use of DOACs, off the Beaten Track","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.NUf0SNSmVjwdZrHKr-iA0wHaFz?pid=Api","datePublished":"2024-05-24T09:50:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mdpi.com/jcm/jcm-13-03076/article_deploy/html/images/jcm-13-03076-g004.png","hostPageUrl":"https://www.mdpi.com/2077-0383/13/11/3076","contentSize":"933619 B","width":2917,"height":2287,"cDNContentUrl":"https://th.bing.com/th/id/R.3547f448d4a6563c1d66b1caafe880d3?rik=nCwnIerB2xCETQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E1399AB4F5687FCA01474D8410DBC1EA21272C9C","accentColor":"0277BB"},"5F65FE5982227DE5A8F131C21CEDEAB51F806DF6":{"name":"डॉलर रेट इन इंडिया और पूर्वानुमान","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.bUvwVAsrEsRuFZ2DvcIh7gHaDt?pid=Api","datePublished":"2019-12-30T12:04:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://dollarrupee.in/images/rupee_s.jpg","hostPageUrl":"https://dollarrupee.in/usd-hindi","contentSize":"186290 B","width":1024,"height":512,"cDNContentUrl":"https://th.bing.com/th/id/R.6d4bf0540b2b12c46e159d83bdc221ee?rik=9VbvlSgi116KHw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"6FD608F15BAEDEC12C131F8A5ED7222895EF56F5","accentColor":"3E568D"},"3FAA75A54C5BA64885E20791DBCF876672537653":{"name":"7 Necessary Precautions To Take While Travel During COVID","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.rZhC61mI4u-tQtfuhe6xnwHaHa?pid=Api","datePublished":"2022-03-04T06:19:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://wordpresscmsprodstor.blob.core.windows.net/wp-cms/2022/03/IG-18.webp","hostPageUrl":"https://www.bajajfinservhealth.in/articles/travel-during-covid-keep-in-mind-these-7-safety-precautions-when-traveling","contentSize":"177966 B","width":1921,"height":1921,"cDNContentUrl":"https://th.bing.com/th/id/R.ad9842eb5988e2efad42d7ee85eeb19f?rik=86pXWsS1aoRYLg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"356735276678FCBD19702E58846AB5C45A57AAF3","accentColor":"B47717"},"853B933C192BD51A3755196994EFCEA03DCF0FD3":{"name":"What Is Nerandomilast (Jascayd)?","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.3NjaJLTl4uh075B7t-ep0wHaHa?pid=Api","datePublished":"2025-10-21T18:29:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://images.everydayhealth.com/images/seo-graphic-content-initiative/eh-how-myelofibrosis-affects-the-body-seo-graphics-gs.png","hostPageUrl":"https://www.everydayhealth.com/lung-respiratory/nerandomilast-jascayd/","contentSize":"134667 B","width":1080,"height":1080,"cDNContentUrl":"https://th.bing.com/th/id/R.dcd8da24b4e5e2e874ef907bb7e7a9d3?rik=WLM5w5GyXaFzVQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"3DF0FCD30AECFE4996915573A15DB291C339B358","accentColor":"02684E"},"806467B380DCD6161FED8BAD5FD7308A0D180022":{"name":"What is malware?","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.BIb4B4j0XiyGcdr9kWgYaAAAAA?pid=Api","datePublished":"2025-06-03T17:28:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://cdn.kaspersky.com/se/media/rc/side-banner-coin.gif","hostPageUrl":"https://www.kaspersky.co.in/resource-center/definitions/what-is-malware","contentSize":"111703 B","width":300,"height":600,"proxyContentUrl":"https://tse2.mm.bing.net/th/id/OGC.0486f80788f45e2c8671dafd91681868?pid=Api&rurl=https%3a%2f%2fcdn.kaspersky.com%2fse%2fmedia%2frc%2fside-banner-coin.gif&ehk=%2ftneSr3fAXRJzvuDDEAl88kjYE9%2f1rZraW%2beAmabL%2bY%3d","cDNContentUrl":"https://th.bing.com/th/id/R.0486f80788f45e2c8671dafd91681868?rik=CEZ2OwjNbWHx3g&pid=ImgRaw&r=0","isTransparent":false,"imageId":"220081D0A8037DF5DAB8DEF1616DCD083B764608","accentColor":"118DBA"},"C68941BA5C672C7DBB78065967D10F045599066B":{"name":"Риск-менеджмент. Как управлять собственными деньгами. — Teletype","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.0WYQBj44SWu_K9Vg_cdwhwHaEN?pid=Api","datePublished":"2023-06-03T13:06:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://centerpointsecurities.com/wp-content/uploads/2022/05/Risk-Reward-Ratios.jpg","hostPageUrl":"https://teletype.in/@cryptolord01/riskmanagement","contentSize":"15638 B","width":566,"height":322,"cDNContentUrl":"https://th.bing.com/th/id/R.d16610063e38496bbf2bd560fdc77087?rik=bJgUq8V2wte7hw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"B660995540F01D76956087BBD7C276C5AB14986C","accentColor":"BC0F16"},"E40DC0C19F8BA8E2E70B98691954699442058BD8":{"name":"i-FRMS © Fraud Risk Management System | IDBI Intech Ltd","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.NikJS8vmo1w0OWRELDjs2AHaHW?pid=Api","datePublished":"2022-05-12T01:07:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://idbiintech.com/images/fraud-risk-management-cycle.jpg","hostPageUrl":"https://idbiintech.com/fraud-risk-management-system.asp","contentSize":"39660 B","width":773,"height":767,"cDNContentUrl":"https://th.bing.com/th/id/R.3629094bcbe6a35c343964442c38ecd8?rik=TtAMHPm4ii5%2bsA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"8DB85024499645919689B07E2E8AB8F91C0CD04E","accentColor":"28C704"},"039F68CDD959E59ECDB4C49412BAA11438B3D39E":{"name":"Liberalization of FEMA Regulations for encouraging settlement of cross ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.22il7HXE4UU2YzGlKY-yXQHaE8?pid=Api","datePublished":"2025-03-31T04:30:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.ey.com/content/dam/ey-unified-site/ey-com/en-in/insights/ai/images/ey-generative-ai-risk-and-governance-framework.jpeg","hostPageUrl":"https://www.ey.com/en_in/technical/alerts-hub/2025/03/liberalization-of-fema-regulations-for-encouraging-settlement-of-cross-border-transactions","contentSize":"850919 B","width":3840,"height":2560,"cDNContentUrl":"https://th.bing.com/th/id/R.db68a5ec75c4e145366331a5298fb25d?rik=MPmG3J2VXuncSw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E93D3B83411AAB21494C4BDCE95E959DDC86F930","accentColor":"BC650F"},"3EF892D110F007B7662D93672893B592C0E125F1":{"name":"Zoom,Zoom - Malware : జూమ్‌ ద్వారా స్మార్ట్‌ఫోన్‌లు, కంప్యూటర్లకు ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.FouFgItCHB5dqDGHPHzgygHaEL?pid=Api","datePublished":"2022-05-30T05:16:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://telugu.samayam.com/thumb/91882254/zoom-malware-91882254.jpg?imgsize-255213&width=700&height=394&resizemode=75","hostPageUrl":"https://telugu.samayam.com/tech/news/zoom-has-a-new-malware-threat-that-puts-your-android-windows-iphone-mac-devices-at-risk-know-how-to-safe/articleshow/91882259.cms","contentSize":"75423 B","width":699,"height":394,"cDNContentUrl":"https://th.bing.com/th/id/R.168b85808b421c1e5da831873c7ce0ca?rik=448pHQEPcHtm0g&pid=ImgRaw&r=0","isTransparent":false,"imageId":"1F521E0C295B39827639D2667B700F011D298FE3","accentColor":"054DC6"},"E9B6798C5A4C69AA79E1017702EF6DDE2C5C6477":{"name":"Leading Financial market data & Forecast provider | Ticker","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.opLqaSaZafLfGMPM0B0-AQHaGN?pid=Api","datePublished":"2015-02-25T19:00:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.tickermarket.com/assets/images/stories/Story5.jpg","hostPageUrl":"https://www.tickermarket.com/","contentSize":"104692 B","width":940,"height":788,"cDNContentUrl":"https://th.bing.com/th/id/R.a292ea69269969f2df18c3ccd01d3e01?rik=nmuXyKXElqqXHg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"7746C5C2EDD6FE2077101E97AA96C4A5C8976B9E","accentColor":"306F9B"},"561AF9ECA2D025CE648B0D414B59404D7D813CEA":{"name":"CYBERSECURITY IN INDIA","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.oJndDbtMJFoejVTUyP7ndAHaLC?pid=Api","datePublished":"2021-01-23T21:43:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.iasgyan.in/ig-uploads/images/Screenshot_20201221-081513__01.jpg","hostPageUrl":"https://www.iasgyan.in/blogs/cyber-security-in-india","contentSize":"375296 B","width":992,"height":1478,"cDNContentUrl":"https://th.bing.com/th/id/R.a099dd0dbb4c245a1e8d54d4c8fee774?rik=ZaGfzioNUuxGuA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"AEC318D7D40495B414D0B846EC520D2ACE9FA165","accentColor":"031F5F"},"3339EE206529E977351D7C5BDA7D15F6C929BDD7":{"name":"Stopping aspirin when on warfarin lowers risk of bleeding, finds JAMA study","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.LwTXecQn4miXw3YenAdiwwHaEv?pid=Api","datePublished":"2022-09-21T15:00:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://medicaldialogues.in/h-upload/2022/09/20/185889-aspirin.jpg","hostPageUrl":"https://medicaldialogues.in/medicine/news/stopping-aspirin-when-on-warfarin-lowers-risk-of-bleeding-finds-jama-study-99420","contentSize":"109362 B","width":1500,"height":960,"cDNContentUrl":"https://th.bing.com/th/id/R.2f04d779c427e26897c3761e9c0762c3?rik=M5PuAlaSnndT0Q&pid=ImgRaw&r=0","isTransparent":false,"imageId":"7DDB929C6F51D7ADB5C7D153779E925602EE9333","accentColor":"A1892A"},"C61813373D6617300EAFBEC523613F2C350C98C1":{"name":"Cyber Security Advisory: Data Wiper Malware","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.Me0_LMojgxBVdRuFFugI8gHaDt?pid=Api","datePublished":"2022-05-26T09:34:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://taxguru.in/wp-content/uploads/2022/05/Cyber-Security-Advisory-Data-Wiper-Malware.jpg","hostPageUrl":"https://taxguru.in/corporate-law/cyber-security-advisory-data-wiper-malware.html","contentSize":"14430 B","width":600,"height":300,"cDNContentUrl":"https://th.bing.com/th/id/R.31ed3f2cca23831055751b8516e808f2?rik=bIExc9NmcQPg%2bg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"1C89C053C2F316325CEBFAE0037166D37331816C","accentColor":"BF0C10"},"B0F57C26AA105CC47476B5D2741DBA597EB86F55":{"name":"10 Million Passwords Stolen and Released; Check if Yours is One of Them ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.gUZAfyFsGr1Y7NHP1RXffAHaD4?pid=Api","datePublished":"2015-02-17T10:52:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://data1.ibtimes.co.in/en/full/561017/india-tops-list-golroted-malware-attacks-what-are-risks-how-protect-yourself-your-business.jpg?w=800&h=420","hostPageUrl":"https://www.ibtimes.co.in/10-million-passwords-stolen-released-check-if-yours-one-them-623758","contentSize":"62077 B","width":800,"height":420,"cDNContentUrl":"https://th.bing.com/th/id/R.8146407f216c1abd58ecd1cfd515df7c?rik=C1%2fHYqoBxUxHZw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"55F68BE795ABD1472D5B67474CC501AA62C75F0B","accentColor":"0ABEC1"},"3D8154F3397F8E08515ADBA7EB9D04E3875EE2E9":{"name":"Online Malware Detection | ESET","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.fKeqyduT-OKrSU9dNgSSdAAAAA?pid=Api","datePublished":"2017-01-01T00:15:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://web-assets.eset.com/fileadmin/_processed_/0/5/csm_threat-analysis-grey_b8ef86f61a.png","hostPageUrl":"https://www.eset.com/in/home/online-scanner/","contentSize":"4707 B","width":80,"height":80,"cDNContentUrl":"https://th.bing.com/th/id/R.7ca7aac9db93f8e2ab494f5d36049274?rik=0xhFP5P36IAVpQ&pid=ImgRaw&r=0","isTransparent":true,"imageId":"9E2EE5783E40D9BE7ABDA51580E8F7933F4518D3","accentColor":"434E57"},"9DBCA664745B35DD64208A88475698F584B983E9":{"name":"Stocks: Will 3 ‘I’s halt earnings revival hopes? These stocks are at ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.m3Gulp8PWS0bvE4P-bSIrwHaDw?pid=Api","datePublished":"2018-08-29T06:32:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://img.etimg.com/photo/msid-65589492,quality-100/table-1-inr.jpg","hostPageUrl":"https://economictimes.indiatimes.com/markets/stocks/news/will-3-is-halt-earning-revival-hopes-these-stocks-are-at-risk/articleshow/65589512.cms","contentSize":"88021 B","width":870,"height":442,"cDNContentUrl":"https://th.bing.com/th/id/R.9b71ae969f0f592d1bbc4e0ff9b488af?rik=2ctqRke1U91GAg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"9E389B485F89657488A80246DD53B547466ACBD9","accentColor":"7A6651"},"143C84A7BA86620922FEDAD4F9790C828448BFF5":{"name":"IPL 2021: Brad Hogg feels RCB have taken a huge risk by buying Glenn ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.L642ItCyF8LefcqEUAY5IwHaE7?pid=Api","datePublished":"2021-02-20T04:23:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://statico.sportskeeda.com/editor/2021/02/c25bc-16137904876412-800.jpg","hostPageUrl":"https://www.sportskeeda.com/cricket/news-ipl-2021-brad-hogg-feels-rcb-taken-huge-risk-going-for-glenn-maxwell-huge-price","contentSize":"50344 B","width":800,"height":533,"cDNContentUrl":"https://th.bing.com/th/id/R.2fae3622d0b217c2de7dca8450063923?rik=QcNIeqtoJpAi7w&pid=ImgRaw&r=0","isTransparent":false,"imageId":"5FFB844828C0979F4DADEF22902668AB7A48C341","accentColor":"157249"},"C4BFFDC3601DB54992A41FD7CD585FEF85B458D8":{"name":"What's alternative therapies? Understanding benefits, risks, and ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.MpMqNuly3eGfeeE1gKpABgAAAA?pid=Api","datePublished":"2024-04-13T07:37:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://img.etimg.com/thumb/msid-126678082,imgsize-1250031,width-138,height-104/prime/transportation/inr22-cr-fine-on-inr80k-cr-revenue-airline-what-indigos-record-penalty-really-means.jpg","hostPageUrl":"https://economictimes.indiatimes.com/news/how-to/whats-alternative-therapies-understanding-benefits-risks-and-differences-from-traditional-medication/articleshow/109265940.cms","contentSize":"1828 B","width":138,"height":104,"cDNContentUrl":"https://th.bing.com/th/id/R.32932a36e972dde19f79e13580aa4006?rik=TPvfPAbRW5QpSg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"8D854B58FEF585DC7DF14A29945BD1063CDFFB4C","accentColor":"2B3C6A"},"FDAE5FB7D8F01CEBE36CFA984C1AFAB08972FEFF":{"name":"Anticoagulation in Acute Pulmonary Embolism: Which Drug? How Long ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.iMDKiulbxTdYiVEtDnIl1AHaFh?pid=Api","datePublished":"2023-04-16T12:24:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.universimed.com/__image/a/286905/alias/xl/v/2/c/10/ar/flexible/fn/Fig%201.jpg","hostPageUrl":"https://www.universimed.com/ch/article/kardiologie-gefaessmedizin/anticoagulation-acute-pulmonary-embolism-which-drug-how-long-286902","contentSize":"68533 B","width":854,"height":637,"cDNContentUrl":"https://th.bing.com/th/id/R.88c0ca8ae95bc5375889512d0e7225d4?rik=3%2br1e40Pwb4%2bxg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"FFEF27980BAFA1C489AFC63EBEC10F8D7BF5EADF","accentColor":"BC0F16"},"753A2DD0CB4AE74C613BC06F08892F8E41EED344":{"name":"Breaking down revenue streams of Reliance Industries","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.sqLFWAPo4MQRxclwhTF_SQHaFy?pid=Api","datePublished":"2020-05-01T09:32:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://d3jlwjv6gmyigl.cloudfront.net/images/2020/04/Revenue-streams-of-Reliance-Industries.jpg","hostPageUrl":"https://finshots.in/infographic/revenue-streams-of-reliance-industries/","contentSize":"57127 B","width":680,"height":532,"cDNContentUrl":"https://th.bing.com/th/id/R.b2a2c55803e8e0c411c5c97085317f49?rik=V6PSDbykfsQWsw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"443DEE14E8F29880F60CB316C47EA4BC0DD2A357","accentColor":"173F89"},"A7C6E80623C23E76DD9F9DED4FA2DA6891E3EAC2":{"name":"How To Unlock The Heretic Class in Risk Of Rain 2 | Gurugamer.com","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.-wIK-Ky0vXwZ8ZfLoQbyOAHaEH?pid=Api","datePublished":"2024-09-08T03:32:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://img.gurugamer.com/resize/740x-/photo_galleries/2024/09/08/how-to-unlock-the-heretic-class-in-risk-of-rain-2-4e67.png","hostPageUrl":"https://gurugamer.com/pc-console/how-to-unlock-the-heretic-class-in-risk-of-rain-2-24099","contentSize":"124793 B","width":740,"height":412,"cDNContentUrl":"https://th.bing.com/th/id/R.fb020af8acb4bd7c19f197cba106f238?rik=emyOYDIs42fd%2bQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"2CAE3E1986AD2AF4DED9F9DD67E32C32608E6C7A","accentColor":"8E2023"},"793F9A7ABAE471F9913AD3A1A1CAADF6F0958F21":{"name":"Best Free Trojan Virus Removal Solutions You Should Try in 2026","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.0ua_y9nYhK7zUrSn7q6-AwHaD5?pid=Api","datePublished":"2023-12-11T16:25:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://images.wondershare.com/recoverit/article/best-free-trojan-remover.jpg","hostPageUrl":"https://recoverit.wondershare.com/windows-computer-tips/free-trojan-remover.html","contentSize":"31860 B","width":1328,"height":700,"cDNContentUrl":"https://th.bing.com/th/id/R.d2e6bfcbd9d884aef352b4a7eeaebe03?rik=l%2fOpp6tOF58Zow&pid=ImgRaw&r=0","isTransparent":false,"imageId":"12F8590F6FDAAC1A1A3DA3199F174EABA7A9F397","accentColor":"BB6210"},"ACAE7DD3FFD6B3CBAB6A72BAAD1CDC9E0B95A2B9":{"name":"Amber: Fossil Resin, Deposits, Inclusions & Uses I UPSC","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.i0xqQlRCR3agXaAElMjAUAHaHa?pid=Api","datePublished":"2024-11-16T09:25:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://iasgyan.sgp1.digitaloceanspaces.com/imagedb/GLOBAL_RISKS_REPORT_2025.jpg","hostPageUrl":"https://www.iasgyan.in/daily-current-affairs/amber","contentSize":"277495 B","width":1431,"height":1431,"cDNContentUrl":"https://th.bing.com/th/id/R.8b4c6a4254424776a05da00494c8c050?rik=yurXPf9tO7y6pg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"9B2A59B0E9CDC1DAAB27A6BABC3B6DFF3DD7EACA","accentColor":"008248"},"F9A6595088162FC12F190DC33F1F4B81EBC2097C":{"name":"SwiftSlicer: New destructive wiper malware strikes Ukraine","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.DWY_AuXwEk0tnZs3OndbrQHaEK?pid=Api","datePublished":"2023-01-27T18:06:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://web-assets.esetstatic.com/tn/-x700/wls/2023/01/ukraine-swiftslicer-wiper-malware-ukraine.jpg","hostPageUrl":"https://www.welivesecurity.com/2023/01/27/swiftslicer-new-destructive-wiper-malware-ukraine/","contentSize":"392516 B","width":1244,"height":700,"cDNContentUrl":"https://th.bing.com/th/id/R.0d663f02e5f0124d2d9d9b373a775bad?rik=n2qVBYhh8hzykQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"C7902CBE18B4F1F33CD091F21CF2618805956A9F","accentColor":"10446B"},"9C5EE7C62AD387DE54597410ACF7865F4BA9931E":{"name":"Exploring the Perioperative Use of DOACs, off the Beaten Track","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.rRpT-sv2q4RbloJj_rNaiAHaEH?pid=Api","datePublished":"2024-05-24T09:50:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mdpi.com/jcm/jcm-13-03076/article_deploy/html/images/jcm-13-03076-g003.png","hostPageUrl":"https://www.mdpi.com/2077-0383/13/11/3076","contentSize":"1048158 B","width":3763,"height":2090,"cDNContentUrl":"https://th.bing.com/th/id/R.ad1a53facbf6ab845b968263feb35a88?rik=yeV%2bbKI9eO1FlQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E1399AB4F5687FCA01479545ED783DA26C7EE5C9","accentColor":"A82325"},"98AA70DAF6BE5C38B234B603018702EB747F3DB9":{"name":"SHOP ALL – EPIC CLO OFFICIAL","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.2luKK_eYAIdDm1PqW-ZoQwHaLJ?pid=Api","datePublished":"2024-04-06T20:41:00.0000000Z","isFamilyFriendly":true,"contentUrl":"http://epiccloofficial.com/cdn/shop/files/Copy_of_Product_photo_resolution_77f6dbb2-c9b4-4bfd-934c-4787b38e63aa.png?v=1740332367","hostPageUrl":"https://epiccloofficial.com/collections/view-collection","contentSize":"1529916 B","width":2160,"height":3250,"cDNContentUrl":"https://th.bing.com/th/id/R.da5b8a2bf7980087439b53ea5be66843?rik=iaoHrW%2frxYMrQw&riu=http%3a%2f%2fepiccloofficial.com%2fcdn%2fshop%2ffiles%2fCopy_of_Product_photo_resolution_77f6dbb2-c9b4-4bfd-934c-4787b38e63aa.png%3fv%3d1740332367&ehk=qBi4Vhay1%2fijMRfcaN7xVeECZvcqQN1NWdSIvpqSh14%3d&risl=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"9BD3F747BE207810306B432B83C5EB6FAD07AA89","accentColor":"379437"},"A64C56FACC835D085225C165DC6DC87B433FFB4A":{"name":"How to manage privacy risks and customer impact following a data breach ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.YHEXxPhCCdSN5qdrx3OopAHaE8?pid=Api","datePublished":"2025-05-16T05:11:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://r.fashionunited.com/heMhYTJ91U_sKM2oNMh2hLZdtIl05l0BT-6F5dfCdU8/resize:fit:1200:630:0/gravity:ce/quality:70/aHR0cHM6Ly9mYXNoaW9udW5pdGVkLmNvbS9pbWcvdXBsb2FkLzIwMjUvMDUvMTUvZGlvci1sdW5hLXNob3QtMDUtMTI3NS12My1yZ2ItNjZ6cHdpdGItMjAyNS0wMS0xNi0xNng3NzZ1cS0yMDI1LTA1LTE1LmpwZWc.jpeg","hostPageUrl":"https://fashionunited.in/news/retail/how-to-manage-privacy-risks-and-customer-impact-following-a-data-breach-like-diors/2025051549815","contentSize":"48333 B","width":945,"height":630,"cDNContentUrl":"https://th.bing.com/th/id/R.607117c4f84209d48de6a76bc773a8a4?rik=asRlr8w41YAlUg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"A4BFF334B78CD6CD561C522580D538CCAF65C46A","accentColor":"8C6340"},"A6C145D36AF3B692786EEE7D7C2DCE918B7FB630":{"name":"Classification and Analysis of Malicious Code Detection Techniques ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.NKbKHFzNUn3Xi32N2CveTQHaDT?pid=Api","datePublished":"2023-02-23T15:34:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mdpi.com/applsci/applsci-13-02894/article_deploy/html/images/applsci-13-02894-g001.png","hostPageUrl":"https://www.mdpi.com/2076-3417/13/5/2894","contentSize":"870594 B","width":3733,"height":1666,"cDNContentUrl":"https://th.bing.com/th/id/R.34a6ca1c5ccd527dd78b7d8dd82bde4d?rik=ahxUPaY%2faymH5g&pid=ImgRaw&r=0","isTransparent":false,"imageId":"036BF7B819ECD2C7D7EEE687296B3FA63D541C6A","accentColor":"CB5300"},"AC5B3C444D187F9D3875A8AB1FCFCDEDCE4A9BB3":{"name":"Administration of Warfarin Inhibits the Development of Cerulein-Induced ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.7iVcwzYi6Ckk9jHT0C03cAHaE0?pid=Api","datePublished":"2023-06-06T07:49:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mdpi.com/biomolecules/biomolecules-13-00948/article_deploy/html/images/biomolecules-13-00948-g001.png","hostPageUrl":"https://www.mdpi.com/2218-273X/13/6/948","contentSize":"47258 B","width":3698,"height":2408,"cDNContentUrl":"https://th.bing.com/th/id/R.ee255cc33622e82924f631d3d02d3770?rik=yrXDRNSB99mDVw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"3BB9A4ECDEDCFCF1BA8A5783D9F781D444C3B5CA","accentColor":"A0A000"},"57978BC7B78758DBE502A7949D7951DF5DF6BEF7":{"name":"Understanding Risk & Return","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.8KEtgQ9JQPZVBN_jFNUPZQAAAA?pid=Api","datePublished":"2022-03-14T14:10:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.barodabnpparibasmf.in/assets/images/understanding-risk-return-img1.jpg","hostPageUrl":"https://www.barodabnpparibasmf.in/learn-invest/understanding-risk-return","contentSize":"5800 B","width":450,"height":284,"cDNContentUrl":"https://th.bing.com/th/id/R.f0a12d810f4940f65504dfe314d50f65?rik=dXm4fHt4hb1eIA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"7FEB6FD5FD1597D9497A205EBD85787B7CB87975","accentColor":"C1380A"},"1F6657233B1DC18EDE6C9D13EB3F4B091701F24D":{"name":"Fracture risk higher with warfarin compared to DOACs: JAMA","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.Nmk_M-5wHy7jnW9mnHVvmAAAAA?pid=Api","datePublished":"2019-11-30T06:23:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://speciality.medicaldialogues.in/wp-content/uploads/2017/03/warfarin.jpg","hostPageUrl":"https://speciality.medicaldialogues.in/newer-doacs-versus-warfarin-lowers-risk-of-fracture-in-atrial-fibrillation-patients-jama-direct-oral-anticoagulants/","contentSize":"7586 B","width":366,"height":225,"cDNContentUrl":"https://th.bing.com/th/id/R.36693f33ee701f2ee39d6f669c756f98?rik=8WZ1MrPRHOjtxg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"D42F107190B4F3BE31D9C6EDE81CD1B3327566F1","accentColor":"A7244C"},"1AFDC38E670687963E18365872699CDF96A52F59":{"name":"Android vs iOS Privacy and Security 2026: The Truth Most Users Don’t Know","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.YEGyShY2WRihW1yPz4ZTRwEsCo?pid=Api","datePublished":"2026-02-20T05:26:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://newsd.in/wp-content/uploads/2024/01/Data-Privacy-Day-2024-History-FAQs-Dates-and-Activities.jpg","hostPageUrl":"https://newsd.in/android-vs-ios-privacy-and-security-2026-the-truth-most-users-dont-know/","contentSize":"91125 B","width":1600,"height":900,"cDNContentUrl":"https://th.bing.com/th/id/R.6041b24a16365918a15b5c8fcf865347?rik=od886HZgeGnjgQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"95F25A69FDC99627856381E369786076E83CDFA1","accentColor":"2D959E"},"277215DF65A275E7AE6593B08937679AE225E633":{"name":"Hong Kong Dollar Indian Rupee (HKD INR) Converter - Investing.com India","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.bs-qGg4-_xs31OwprU0AqQAAAA?pid=Api","datePublished":"2017-02-18T11:39:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://i-invdn-com.investing.com/news/moved_small-LYNXNPEL370OT_L.jpg","hostPageUrl":"https://in.investing.com/currencies/hkd-inr-converter","contentSize":"4168 B","width":150,"height":100,"cDNContentUrl":"https://th.bing.com/th/id/R.6ecfaa1a0e3eff1b37d4ec29ad4d00a9?rik=cidR%2fVYqV37qVg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"336E522EA97673980B3956EA7E572A56FD512772","accentColor":"2F669C"},"7FDBFDBCF100AD356951B59CAEFFF3BFBDBCA471":{"name":"GDP expected to grow 6-6.5 per cent in FY24: BoB Eco Research","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.-LGJ1D_IZ4JDk5YlOcCA5AHaEK?pid=Api","datePublished":"2023-05-29T05:48:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://wpassets.adda247.com/wp-content/uploads/multisite/sites/5/2023/05/29111045/sbi.jpeg","hostPageUrl":"https://currentaffairs.adda247.com/gdp-expected-to-grow-6-6-5-per-cent-in-fy24-bob-eco-research/","contentSize":"166462 B","width":1280,"height":720,"cDNContentUrl":"https://th.bing.com/th/id/R.f8b189d43fc867824393962539c080e4?rik=973fyx8A2lOWFQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"174ACBDBFB3FFFEAC95B159653DA001FCBDFBDF7","accentColor":"0F7CBC"},"0981FCCCFBB4E2DC1EBB72D8A28A62BCEEE61BA3":{"name":"Artificial Intelligence Model for Risk Management in Healthcare ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.QQee5VsE57QVlgeXNNfayQHaFz?pid=Api","datePublished":"2022-12-27T07:37:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://pub.mdpi-res.com/sustainability/sustainability-15-00420/article_deploy/html/images/sustainability-15-00420-g001-550.jpg?1672126426","hostPageUrl":"https://www.mdpi.com/2071-1050/15/1/420","contentSize":"95780 B","width":550,"height":431,"cDNContentUrl":"https://th.bing.com/th/id/R.41079ee55b04e7b41596079734d7dac9?rik=kBjPzL9LLs3huw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"3AB16EEECB26A82A8D27BBE1CD2E4BBFCCCF1890","accentColor":"CAB001"},"0970B74250AC233011218AE582E3FC63D20D5CAA":{"name":"Risk of AI - PwC India","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.1wnbKvEQFdda8RD_wFYGnwHaEg?pid=Api","datePublished":"2021-01-08T10:55:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.pwc.in/assets/images/consulting/technology/data-and-analytics/ai/infographics-7.jpg","hostPageUrl":"https://www.pwc.in/consulting/technology/data-and-analytics/ai-an-opportunity-amidst-a-crisis/risk-of-ai.html","contentSize":"53475 B","width":655,"height":399,"cDNContentUrl":"https://th.bing.com/th/id/R.d709db2af11015d75af110ffc056069f?rik=kAd7JAXKMgMREg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"AAC5D02D36CF3E285EA812110332CA05247B0790","accentColor":"C37508"},"25DBF5D02196E9467C38876782785750914FCF69":{"name":"Disaster Risk Management Plan -Temple Complex at Jejuri | CEPT - Portfolio","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.CFHvvQ6dGMZ10hGgKpA3qQHaFP?pid=Api","datePublished":"2022-09-28T05:45:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://portfolio.cept.ac.in/assets/supportive_projects/visuals/2022/CR4051/visual_20220721134603_02_understandingrisks.jpg","hostPageUrl":"https://portfolio.cept.ac.in/student/anagha-l-pcr20038/disaster-risk-management-plan-temple-complex-at-jejuri-spring-2022-cr4051-pcr20038","contentSize":"225659 B","width":1600,"height":1131,"cDNContentUrl":"https://th.bing.com/th/id/R.0851efbd0e9d18c675d211a02a9037a9?rik=Ur1fDRJpnmTHgw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"96FCF41905758728767883C7649E69120D5FBD52","accentColor":"434343"},"66AEFC2F13DD6DB54631F13F1A7B7FD5C82EAF90":{"name":"What is Cryptojacking & How does it work?","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.4AqusWwve71p36FbkbLaLQHaEL?pid=Api","datePublished":"2021-04-03T23:34:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.kaspersky.co.in/content/en-in/images/repository/isc/2021/what_is_cryptojacking_image2_710x400px_300dpi.jpg","hostPageUrl":"https://www.kaspersky.co.in/resource-center/definitions/what-is-cryptojacking","contentSize":"59272 B","width":710,"height":400,"cDNContentUrl":"https://th.bing.com/th/id/R.e00aaeb16c2f7bbd69dfa15b91b2da2d?rik=ZurP8jHd1ltkEw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"09FAE28C5DF7B7A1F31F13645BD6DD31F2CFEA66","accentColor":"3B7590"},"8DA564154397CC83737801D051DD4C6BED54E3A1":{"name":"Use of NOACs in diabetes with AF tied to decreased risk of osteoporotic ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.yTYhDz4Dkgc-VWKfLX3_cAHaEc?pid=Api","datePublished":"2022-10-05T18:46:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://medicaldialogues.in/h-upload/2020/04/28/127915-anticoagulants.webp","hostPageUrl":"https://medicaldialogues.in/diabetes-endocrinology/news/use-of-noacs-in-diabetes-with-af-tied-to-decreased-risk-of-osteoporotic-fractures-compared-to-warfarin-100173","contentSize":"21574 B","width":1500,"height":900,"cDNContentUrl":"https://th.bing.com/th/id/R.c936210f3e0392073e55629f2d7dff70?rik=2FpGUTR5zDg3hw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"1A3E45DEB6C4DD150D10873738CC793451465AD8","accentColor":"86441A"},"482A51636050C1D4A79DD95D7649CE66C019D2C8":{"name":"EPIC | Rock Fashion India – EPIC CLO OFFICIAL","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.4sJN9VNNs9_02lwBFezYEgHaI_?pid=Api","datePublished":"2023-07-21T17:03:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://epiccloofficial.com/cdn/shop/files/Untitled_design_1_5f0a10df-8fb9-4db4-a791-7eefcf9bf706_600x.png?v=1741870190","hostPageUrl":"https://epiccloofficial.com/","contentSize":"572530 B","width":600,"height":729,"cDNContentUrl":"https://th.bing.com/th/id/R.e2c24df5534db3dff4da5c0115ecd812?rik=hKIVNgYFHE162Q&pid=ImgRaw&r=0","isTransparent":false,"imageId":"8C2D910C66EC9467D59DD97A4D1C05063615A284","accentColor":"61463B"},"9FD418E99C70C563082249FE138DB05AD750DD03":{"name":"ডেলিভারি ওটিপি ও এনসিওরেন্স সাইবার ক্রাইম... জালিয়াতির নতুন দুটি ফাঁদ ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.KoSdLZX_JJ2feHN_sUDutAHaEJ?pid=Api","datePublished":"2025-02-06T17:41:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://img.helpnetsecurity.com/wp-content/uploads/2023/09/25200942/online-fraud.jpg","hostPageUrl":"https://bengalfusion.in/how-protect-yourself-from-online-fraud","contentSize":"325849 B","width":1456,"height":816,"cDNContentUrl":"https://th.bing.com/th/id/R.2a849d2d95ff249d9f78737fb140eeb4?rik=%2bU2BnskHXDaAIg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"30DD057DA50BD831EF942280365C07C99E814DF9","accentColor":"A43627"},"DA59C41498708884360A597F21E8B3FAB74605BC":{"name":"Net Protector Antivirus – Download Best Antivirus for PC & Mobiles","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP._2iVGwHeX4TIbLJmZMUrXwHaE8?pid=Api","datePublished":"2017-09-01T08:30:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://blogs.npav.net/media/magefan_blog/img_2_.png","hostPageUrl":"https://blogs.npav.net/","contentSize":"233188 B","width":499,"height":333,"cDNContentUrl":"https://th.bing.com/th/id/R.ff68951b01de5f84c86cb26664c52b5f?rik=rZVMQYkHiEhjoA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"CB50647BAF3B8E12F795A06348880789414C95AD","accentColor":"CC9500"},"63FAE2612408E183D50CE22C8E2F23BF8B4BC7DD":{"name":"Ex-Fed Chair Ben Bernanke Warns Bitcoin (BTC) Faces Two Massive Risks ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.Y9hkUMZ6DbsN29Dhg1xqAwHaEV?pid=Api","datePublished":"2022-05-19T18:56:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://dailyhodl.com/wp-content/uploads/2022/05/BTC-Faces-Two-Massive.jpg","hostPageUrl":"https://cryptopanic.com/news/15258072/Ex-Fed-Chair-Ben-Bernanke-Warns-Bitcoin-BTC-Faces-Two-Massive-Risks-That-Investors-Should-Be-Aware-Of","contentSize":"84252 B","width":1365,"height":800,"cDNContentUrl":"https://th.bing.com/th/id/R.63d86450c67a0dbb0ddbd0e1835c6a03?rik=Nq8uFkKAHjhdwA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"DD7CB4B8FB32F2E8C22EC05D381E8042162EAF36","accentColor":"000751"},"7C55CC03758279F83B95FEAC23C9E75BEF106CB2":{"name":"Warf-5 Tablet: Uses, Side-effects, Price, Dosage & More Info - PharmEasy","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.0uqyJUyRvgj3Ob8reIKrfAHaDG?pid=Api","datePublished":"2020-03-20T13:23:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://cdn01.pharmeasy.in/dam/products/D03619/warf-5mg-tablet-30s-1-1641537933.jpg","hostPageUrl":"https://pharmeasy.in/online-medicine-order/warf-5mg-tablet-30-s-229350","contentSize":"43961 B","width":1301,"height":545,"cDNContentUrl":"https://th.bing.com/th/id/R.d2eab2254c91be08f739bf2b7882ab7c?rik=x1XMMFcol4%2bzWQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"2BC601FEB57E9C32CAEF59B38F97285730CC55C7","accentColor":"BA6111"},"8A630D95501770154E0C58F153887882FDDE86EE":{"name":"Search Result for Microsoft-Edge-Browser – TechGig","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.LUtRKf7CgO_jIiM7gA2zhQHaDw?pid=Api","datePublished":"2023-03-24T17:28:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://contentstatic.techgig.com/photo/97373455/Indias-CERT-In-beware-Microsoft-users-about-new-malware-risk.jpg","hostPageUrl":"https://content.techgig.com/searchresult.cms?query=Microsoft-Edge-Browser","contentSize":"55952 B","width":1118,"height":568,"cDNContentUrl":"https://th.bing.com/th/id/R.2d4b5129fec280efe322233b800db385?rik=qDbQWQVxB1HkwA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"EE68EDDF288788351F85C0E45107710559D036A8","accentColor":"124572"},"682D1178FED790D20E9588B8C8216E6DDAC17293":{"name":"First Advance Estimates of India’s GDP: What are They and What do the ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.sbtStbNWOvmmZMpGRW-NDwHaEK?pid=Api","datePublished":"2025-06-11T15:54:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://vajiramandravi.com/current-affairs/wp-content/uploads/2025/04/gdp_advance_estimates.webp","hostPageUrl":"https://vajiramandravi.com/current-affairs/gdp-advance-estimates/","contentSize":"56010 B","width":1600,"height":900,"cDNContentUrl":"https://th.bing.com/th/id/R.b1bb52b5b3563af9a664ca46456f8d0f?rik=htIRh%2b99CS3gWQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"39271CADD6E6128C8B8859E02D097DEF8711D286","accentColor":"C46008"},"99579AD42AB168326D6DD7F6874CD13B3951C1BD":{"name":"Gold Spot Indian Rupee (XAU INR) Converter - Investing.com India","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.K2FXZDbTFuzIHwud_7EB5QAAAA?pid=Api","datePublished":"2022-03-16T07:16:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://d1-invdn-com.investing.com/company_logo/498bb2498fbc73656d8d309c40f3589c.jpg","hostPageUrl":"https://in.investing.com/currencies/xau-inr-converter","contentSize":"63002 B","width":350,"height":350,"cDNContentUrl":"https://th.bing.com/th/id/R.2b61576436d316ecc81f0b9dffb101e5?rik=mXWpTaIbhiPW1g&pid=ImgRaw&r=0","isTransparent":false,"imageId":"DB1C1593B31DC4786F7DD6D623861BA24DA97599","accentColor":"010204"},"50D6FA67F03A5895FA9B8E0F7B4644F444DC0D7C":{"name":"Global Book","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.Mt4qpnx1f3SutGvZKiFU8gAAAA?pid=Api","datePublished":"2020-02-17T13:02:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.goonebook.in/wp-content/uploads/2022/05/THINK-AND-250.jpg","hostPageUrl":"https://www.goonebook.in/","contentSize":"88735 B","width":250,"height":400,"cDNContentUrl":"https://th.bing.com/th/id/R.32de2aa67c757f74aeb46bd92a2154f2?rik=BW2vdg%2bjhVmvuQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"C7D0CD444F4464B7F0E8B9AF5985A30F76AF6D05","accentColor":"C16E0A"},"46F78740C883EA67CB6461B76423C23B18ADCC79":{"name":"HSBC Value Fund | HSBC Asset Management India","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.owDMff76ZvR5bIDRqFtqUwAAAA?pid=Api","datePublished":"2022-11-26T12:16:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.assetmanagement.hsbc.co.in/-/media/images/india/riskometer/riskometer-label-color/scheme-risk-o-meter-very-high-risk.png","hostPageUrl":"https://www.assetmanagement.hsbc.co.in/en/mutual-funds/investment-expertise/equity-funds/hsbc-value-fund","contentSize":"18604 B","width":389,"height":249,"cDNContentUrl":"https://th.bing.com/th/id/R.a300cc7dfefa66f4796c80d1a85b6a53?rik=ZH94BIw4rna8Rg&pid=ImgRaw&r=0","isTransparent":true,"imageId":"97CCDA81B32C32467B1646BC76AE388C04787F64","accentColor":"65CC00"},"D413F2FA328A92ADD105B5608442D9844770E723":{"name":"SC warns stray dogs pose accident risks, orders streets kept clear; MD ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.fDXj0ZaUM12G0Q2N6XM-qAHaFj?pid=Api","datePublished":"2026-01-08T00:02:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://images.bhaskarassets.com/thumb/730x0/web2images/1884/2026/01/07/gujarat-evening-wrap_1767787395.gif","hostPageUrl":"https://www.bhaskarenglish.in/local/gujarat/video/sc-warns-stray-dogs-pose-accident-risks-orders-streets-kept-clear-md-drug-lab-running-inside-surat-mall-busted-more-136884093.html","contentSize":"3231392 B","width":730,"height":548,"proxyContentUrl":"https://tse2.mm.bing.net/th/id/OGC.7c35e3d19694335d86d10d8de9733ea8?pid=Api&rurl=https%3a%2f%2fimages.bhaskarassets.com%2fthumb%2f730x0%2fweb2images%2f1884%2f2026%2f01%2f07%2fgujarat-evening-wrap_1767787395.gif&ehk=ukc1Lo0sotCwBWDW6XCXuwNmEqUhfL60OaAWtARMhSc%3d","cDNContentUrl":"https://th.bing.com/th/id/R.7c35e3d19694335d86d10d8de9733ea8?rik=TTEvryOoKdodUA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"327E0774489D2448065B501DDA29A823AF2F314D","accentColor":"BF740C"},"AE6C009FEEF6673E6BABEEFC0DD64C0D1BC7BBBA":{"name":"A new type of security - Siemens Healthineers India","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.-wpXUmdSGKLK7YnG937N2wHaFj?pid=Api","datePublished":"2019-04-08T18:57:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://marketing.webassets.siemens-healthineers.com/1800000005722311/c37fa1dacaa5/v/44e0f8414b98/blood_gas_mcafee_anti_malware_4x3_1800000005722311.jpg","hostPageUrl":"https://www.siemens-healthineers.com/en-in/point-of-care-testing/featured-topics-in-poct/blood-gas-featured-topics/blood-gas-security","contentSize":"19610 B","width":1408,"height":1055,"cDNContentUrl":"https://th.bing.com/th/id/R.fb0a5752675218a2caed89c6f77ecddb?rik=6sYA%2be5vduO2ug&pid=ImgRaw&r=0","isTransparent":false,"imageId":"ABBB7CB1D0C46DD0CFEEBAB6E3766FEEF900C6EA","accentColor":"B94B12"},"F0211B280EEE5C81A44A6ECC178DAA578F100622":{"name":"Risk Management in Software Engineering - Software Engineering Tutorial","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.Gy00gehI3hf4ligWFRYZnQAAAA?pid=Api","datePublished":"2021-05-06T04:58:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.sitesbay.com/software-engineering/images/risk-management-in-software-engineering.png","hostPageUrl":"https://www.sitesbay.com/software-engineering/se-risk-management-in-software-engineering","contentSize":"65449 B","width":381,"height":417,"cDNContentUrl":"https://th.bing.com/th/id/R.1b2d3481e848de17f89628161516199d?rik=DxKxguDuxRhKpA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"226001F875AAD871CCE6A44A18C5EEE082B1120F","accentColor":"0096CB"},"0AD9BC3FEBE42AA636C00670D93B3E487AD867FC":{"name":"Google Malware Checker | Guard your website from malware!","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.PU67MOefCcePKFqOgQRBvwHaEJ?pid=Api","datePublished":"2020-09-05T20:20:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://yuvrajhinger.in/images/featured_image/1592054247.jpg","hostPageUrl":"https://yuvrajhinger.in/post/google-malware-checker","contentSize":"18263 B","width":714,"height":400,"cDNContentUrl":"https://th.bing.com/th/id/R.3d4ebb30e79f09c78f285a8e810441bf?rik=oJ3L875OompjDA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"CF768DA784E3B39D07600C636AA24EBEF3CB9DA0","accentColor":"054AC6"},"31F3C559CFDA8B8CF7371A99B34671F189FE2AC6":{"name":"How to Outsource Java Development Successfully | Aimprosoft","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.s9_NN7ualJI_Z_PMOqvjHAHaHZ?pid=Api","datePublished":"2022-07-27T03:47:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.aimprosoft.com/wp-content/uploads/2022/07/The-ways-to-reduce-risks.png","hostPageUrl":"https://www.aimprosoft.com/blog/how-to-outsource-java-development/","contentSize":"40199 B","width":1024,"height":1022,"cDNContentUrl":"https://th.bing.com/th/id/R.b3dfcd37bb9a94923f67f3cc3aabe31c?rik=Ez9clfytuMh%2fcw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"6CA2EF981F17643B99A1737FC8B8ADFC955C3F13","accentColor":"0189CA"},"C21C8D94223A223B58B53C4ABD500FDC204D8E3B":{"name":"Infoblox's New AI-Powered SOC Insights Capability Reduces Critical ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.SR4ejq6RBFv7nF9TQT6ImQAAAA?pid=Api","datePublished":"2024-02-28T09:41:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://themasthead.in/front/post/65dedfb18d687-post-inflobox.jpeg","hostPageUrl":"https://themasthead.in/post/infobloxs-new-ai-powered-soc-insights-capability-reduces-critical-security-operations-challenges","contentSize":"5558 B","width":300,"height":168,"cDNContentUrl":"https://th.bing.com/th/id/R.491e1e8eae91045bfb9c5f53413e8899?rik=LMHYSSKjIrOFWw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"B3E8D402CDF005DBA4C35B85B322A32249D8C12C","accentColor":"081937"},"DFDD346BE4116194F4128E0F7B4644F444DC0D7C":{"name":"Global Book","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.DJmZCqOZnBdW8w1RisTgRwAAAA?pid=Api","datePublished":"2020-02-17T13:02:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.goonebook.in/wp-content/uploads/2022/04/Flip.jpg","hostPageUrl":"https://www.goonebook.in/","contentSize":"96207 B","width":250,"height":406,"cDNContentUrl":"https://th.bing.com/th/id/R.0c99990aa3999c1756f30d518ac4e047?rik=%2fd1Dtk4RFklPIQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"C7D0CD444F4464B7F0E8214F4916114EB643DDFD","accentColor":"9F5B2C"},"787062F53A1A46206CE08B19C1CC5FE1947B8BF5":{"name":"What is it like to be in the trenches fighting malware? On the occasion ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.NSJf27n8aZGEgYTDk14ytgAAAA?pid=Api","datePublished":"2022-06-02T09:06:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://web-assets.eset.com/fileadmin/ESET/SG/Newsroom/ESET_Blog/2021/Zuzana.png","hostPageUrl":"https://www.eset.com/in/about/newsroom/corporate-blog/corporate-blog/what-is-it-like-to-be-in-the-trenches-fighting-malware-on-the-occasion-of-international-womens-day/","contentSize":"57100 B","width":320,"height":168,"cDNContentUrl":"https://th.bing.com/th/id/R.35225fdbb9fc6991848184c3935e32b6?rik=hwcmX6OhZALGDg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"5FB8B7491EF5CC1C91B80EC60264A1A35F260787","accentColor":"415B51"},"2CDC485D10E9766194425616FEBF021274931FE6":{"name":"Buy Business Risk Assessment and Management - Excel Template Online in ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.iXS4Yq2iqU5IyLOGmk7sRQHaEj?pid=Api","datePublished":"2022-10-28T16:09:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://i.etsystatic.com/36343571/r/il/0a9b18/4059704003/il_fullxfull.4059704003_kvgb.jpg","hostPageUrl":"https://www.etsy.com/in-en/listing/1254588076/business-risk-assessment-and-management","contentSize":"235014 B","width":1725,"height":1061,"cDNContentUrl":"https://th.bing.com/th/id/R.8974b862ada2a94e48c8b3869a4eec45?rik=ws2E1QGeZxZJJA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"6EF139472120FBEF6165244916679E01D584CDC2","accentColor":"C6B605"},"60FBD3C05486FDBE6C6228B50A11D42E5A8551C8":{"name":"ALERT! Delete these 19 dangerous Google Play Store apps on your phone ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.xa6zU5VoyX73O0AJmKXK2AHaEK?pid=Api","datePublished":"2023-04-29T07:50:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://images.hindustantimes.com/tech/img/2023/04/29/960x540/Untitled_design_53_1682760821821_1682760822107.jpg","hostPageUrl":"https://tech.hindustantimes.com/tech/news/alert-delete-these-19-dangerous-google-play-apps-on-your-phone-amazing-wallpaper-to-private-messenger-check-list-71682754175805.html","contentSize":"30197 B","width":960,"height":539,"cDNContentUrl":"https://th.bing.com/th/id/R.c5aeb3539568c97ef73b400998a5cad8?rik=Br89DEVo3%2bvGJg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"8C1558A5E24D11A05B8226C6EBDF68450C3DBF06","accentColor":"20AB5D"},"868D14443D231AF56644B64593B0111E18D986C8":{"name":"Buy Prevention of Venous Thrombosis after Transvenous Leads Imation ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.DlnnShJHLLNgsB-hdd0GawHaK2?pid=Api","datePublished":"2024-12-11T11:52:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/71D9dGcFJYL.jpg","hostPageUrl":"https://www.desertcart.in/products/172978954-prevention-of-venous-thrombosis-after-transvenous-leads-implantation-prevention-of-venous-thrombosis-by-warfarin-after-permanent-transvenous-leads-implantation-in-high-risk-patients","contentSize":"228768 B","width":1182,"height":1732,"cDNContentUrl":"https://th.bing.com/th/id/R.0e59e74a12472cb360b01fa175dd066b?rik=aNhBRNMyoV9mRA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"8C689D81E1110B39546B44665FA132D34441D868","accentColor":"AE4D1D"},"567C15C7DCB76CDCC6883679D6E75D7A1C44B20F":{"name":"Childcare Garden and Garage Risk Assessment (teacher made)","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.dQLHp3mjSA82wLqqzyqlvQHaDt?pid=Api","datePublished":"2023-03-15T09:01:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://images.twinkl.co.uk/tw1n/image/private/t_630_eco/image_repo/a0/ac/t-ch-83-childcare-garden-and-garage-risk-assessment-template_ver_1.jpg","hostPageUrl":"https://www.twinkl.co.in/resource/t-ch-83-home-based-childcare-garden-and-garage-risk-assessment","contentSize":"22166 B","width":630,"height":315,"cDNContentUrl":"https://th.bing.com/th/id/R.7502c7a779a3480f36c0baaacf2aa5bd?rik=ZcdRfM17xs1siA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"F02B44C1A7D57E6D9763886CCDC67BCD7C51C765","accentColor":"0051B1"},"341B9DF5F09B04048986C9DB99A6D51727A7D96F":{"name":"Risk Mangement Pricing - pmguruonline.com","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.hTGDmAcZvgKIFoLoMOvFlwAAAA?pid=Api","datePublished":"2018-04-16T16:35:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.pmguruonline.com/risk/images/Risk001.png","hostPageUrl":"https://www.pmguruonline.com/risk/price.aspx","contentSize":"610 B","width":148,"height":99,"cDNContentUrl":"https://th.bing.com/th/id/R.853183980719be02881682e830ebc597?rik=Q7HZXw%2b5QECYaA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"F69D7A72715D6A99BD9C68984040B90F5FD9B143","accentColor":"60606B"},"627F9101F77D9BAF205CBEB75C777643BA94ABBF":{"name":"International Trade Settlement in Indian Rupee (INR)","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.Z-oZyLiHtoyxnFuPd7vxjAHaDt?pid=Api","datePublished":"2022-12-01T07:01:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://taxguru.in/wp-content/uploads/2022/11/Indian-side-Export-Overseas-Import.jpg","hostPageUrl":"https://taxguru.in/dgft/international-trade-settlement-indian-rupee-inr.html","contentSize":"85668 B","width":600,"height":300,"cDNContentUrl":"https://th.bing.com/th/id/R.67ea19c8b887b68cb19c5b8f77bbf18c?rik=JvcZEH%2fXufoCxQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"FBBA49AB346777C57BEBC502FAB9D77F1019F726","accentColor":"B17B1A"},"AE3D1D4056A8685D7573D95D7649CE66C019D2C8":{"name":"EPIC = Indian Streetwear Clothing – EPIC CLO OFFICIAL","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.trduPq9GlrSE5-KhzdTNEgHaF4?pid=Api","datePublished":"2023-07-21T17:03:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://epiccloofficial.com/cdn/shop/files/15_600x.png?v=1704802195","hostPageUrl":"https://epiccloofficial.com/","contentSize":"97582 B","width":600,"height":476,"cDNContentUrl":"https://th.bing.com/th/id/R.b6b76e3eaf4696b484e7e2a1cdd4cd12?rik=6tPRBGWKhtVXNw&pid=ImgRaw&r=0","isTransparent":true,"imageId":"8C2D910C66EC9467D59D3757D5868A6504D1D3EA","accentColor":"880404"},"8DCF7BCE3113F5D7CAD5BBAF645DE47F2C8E084E":{"name":"2025 Volkswagen Tiguan R-Line India launch confirmed — Everything you ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.7qeLl1XItCsjJ47Hc13ZlQHaFj?pid=Api","datePublished":"2025-03-08T06:26:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://cdn.cars24.com/prod/auto-news24-cms/Newsroom/2025/03/04/a20d90ba-9d20-425b-9484-80dde61f1364-upcoming-new-2025-volkswagen-tiguan-r-line-suv-price-in-india-vw.webp","hostPageUrl":"https://www.cars24.com/news/auto/2025-volkswagen-tiguan-r-line-india-launch-confirmed/","contentSize":"163998 B","width":1200,"height":900,"cDNContentUrl":"https://th.bing.com/th/id/R.eea78b9755c8b42b23278ec7735dd995?rik=2Py37BMxX32sXQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E480E8C2F74ED546FABB5DAC7D5F3113ECB7FCD8","accentColor":"946837"},"F1B236288952B5E8AEF9FE91CCFE9B65212E3034":{"name":"A Novel Implicit Neural Representation for Volume Data","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.qg-x99hQQZ-RBTGD7PUkfgHaDu?pid=Api","datePublished":"2023-03-03T08:37:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mdpi.com/applsci/applsci-13-03242/article_deploy/html/images/applsci-13-03242-g001.png","hostPageUrl":"https://www.mdpi.com/2076-3417/13/5/3242","contentSize":"386513 B","width":3659,"height":1844,"cDNContentUrl":"https://th.bing.com/th/id/R.aa0fb1f7d850419f91053183ecf5247e?rik=HytjgpglW47qnw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"4303E21256B9EFCC19EF9FEA8E5B259882632B1F","accentColor":"0A4DC1"},"7B7370A1B3A285AF96A93C2BBA2B8263449282CA":{"name":"USD/INR Cracks Big: Falls 2% in 4 Days! | Investing.com India","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.O3i7h1BVUzO6l5LXN1a6sQHaDW?pid=Api","datePublished":"2022-11-09T11:26:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://d56-invdn-com.investing.com/content/965f21db67fcf4fbb29d8bbbbbcd8c9c.png","hostPageUrl":"https://in.investing.com/analysis/usdinr-cracks-big-falls-2-in-4-days-200549858","contentSize":"43505 B","width":1288,"height":583,"cDNContentUrl":"https://th.bing.com/th/id/R.3b78bb8750555333ba9792d73756bab1?rik=tzcHGjsqWPppmg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"AC2829443628B2ABB2C39A69FA582A3B1A0737B7","accentColor":"B71D14"},"65353D23807EFD17A91BE1C074FE4B004D2DCBD9":{"name":"Everyday things that could raise your cancer risk","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.BpPztDadUIwPiswLKQz0NAEsDI?pid=Api","datePublished":"2025-07-10T05:04:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1IjQKm.img?w=800&h=415&q=60&m=2&f=jpg","hostPageUrl":"https://www.msn.com/en-in/health/diseases-and-conditions/everyday-things-that-could-raise-your-cancer-risk/ss-AA1yKDwI","contentSize":"65536 B","width":622,"height":415,"cDNContentUrl":"https://th.bing.com/th/id/R.0693f3b4369d508c0f8acc0b290cf434?rik=VlPTMgjn33GasQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"9DBCD2D400B4EF470C1EB19A71DFE70832D35356","accentColor":"6F2224"},"95F426B4613A7CB02EE05D7FE68BB97C9111FFDA":{"name":"The risks of sharing your kids' lives online","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.lx5qGRYCDQlwyWcK-2Jf1wHaE8?pid=Api","datePublished":"2024-11-11T16:18:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1HPdLs.img?w=800&h=415&q=60&m=2&f=jpg","hostPageUrl":"https://www.msn.com/en-in/lifestyle/family/the-risks-of-sharing-your-kids-lives-online/ss-AA1rvWij","contentSize":"65536 B","width":622,"height":415,"cDNContentUrl":"https://th.bing.com/th/id/R.971e6a1916020d0970c9670afb625fd7?rik=WU9iSxajxwviDg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"ADFF1119C79BB86EF7D50EE20BC7A3164B624F59","accentColor":"336C98"},"4B8121D12E89B692B034C69A1F944D68C3BA4673":{"name":"Shirt – EPIC CLO OFFICIAL","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.6MMdM-H-l9M48YClT-eUvgHaLJ?pid=Api","datePublished":"2024-07-11T01:14:00.0000000Z","isFamilyFriendly":true,"contentUrl":"http://epiccloofficial.com/cdn/shop/files/Risk_Bowling_Shirt_Front.png?v=1749632087","hostPageUrl":"https://epiccloofficial.com/collections/shirt","contentSize":"247487 B","width":2160,"height":3250,"cDNContentUrl":"https://th.bing.com/th/id/R.e8c31d33e1fe97d338f180a54fe794be?rik=tBgSHeKYaykLQw&riu=http%3a%2f%2fepiccloofficial.com%2fcdn%2fshop%2ffiles%2fRisk_Bowling_Shirt_Front.png%3fv%3d1749632087&ehk=uau09uPMdoJZaq7i8pZFakN4%2fNQbR%2fcK3h1FixyYKww%3d&risl=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"3764AB3C86D449F1A96C430B296B98E21D1218B4","accentColor":"CC8E00"},"C166D85B781B33BF4415EF0F763018B9DB1E8B72":{"name":"1 million dong in indian rupees - Brainly.in","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.3j2AhAAnA49B9VlLtDy73wHaMO?pid=Api","datePublished":"2023-06-15T03:32:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://hi-static.z-dn.net/files/d37/0eb302dae899b785361f97f5ca31e201.jpg","hostPageUrl":"https://brainly.in/question/56651626","contentSize":"108466 B","width":1028,"height":1697,"cDNContentUrl":"https://th.bing.com/th/id/R.de3d80840027038f41f5594bb43cbbdf?rik=HGaNtYexM%2ftEUQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"27B8E1BD9B810367F0FE5144FB33B187B58D661C","accentColor":"145AB7"},"AD8590A9C4330EF0F291F8C6DD4AB38E19B69FEC":{"name":"Total rewards","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.5PvfpaXpz5KFTafixTQIKQAAAA?pid=Api","datePublished":"2021-04-20T00:14:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mercer.com/assets/in/en_in/shared-assets/global/covers/cover-people-risk-408x544.jpg.transform/mdotcom-promo-cta-xs/image.jpg","hostPageUrl":"https://www.mercer.com/en-in/insights/total-rewards/","contentSize":"18341 B","width":384,"height":512,"cDNContentUrl":"https://th.bing.com/th/id/R.e4fbdfa5a5e9cf92854da7e2c5340829?rik=2lgJmkwz4A8vGQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"CEF96B91E83BA4DD6C8F192F0FE0334C9A0958DA","accentColor":"A42756"},"C20A92F616E40049E3971BCD0ACCBBD71D4E7471":{"name":"Currency Today: Euro Finds Footing, Dollar Whipsaws, Rupee Tanks | India","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.aSE6HW1bQ55mULwzcRgPWwHaFj?pid=Api","datePublished":"2025-12-02T12:24:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://watcher.guru/news/wp-content/uploads/2023/09/brics-us-dollar-indian-rupee-usd-inr-1024x768.jpg","hostPageUrl":"https://www.btcc.com/en-IN/square/WatcherWGuru/1232787","contentSize":"302166 B","width":1024,"height":768,"cDNContentUrl":"https://th.bing.com/th/id/R.69213a1d6d5b439e6650bc3371180f5b?rik=LKApb2FOAJQ%2beQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"1747E4D17DBBCCA0DCB1793E94004E616F29A02C","accentColor":"484B5B"},"DDF7B1391892813C238096958E0E31E80E9C78E6":{"name":"Hormuz disruption, $100 oil pose risks to India's inflation, rupee ...","thumbnailUrl":"https://tse1.mm.bing.net/th?id=OIF.KKlvbbfe7C%2fwC2cPbYYqEA&pid=Api","datePublished":"2026-04-26T04:50:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA21K4i7.img?w=768&h=576&m=6","hostPageUrl":"https://www.msn.com/en-in/money/topstories/hormuz-disruption-100-oil-pose-risks-to-indias-inflation-rupee-union-bank/ar-AA21JKno","contentSize":"65536 B","width":768,"height":576,"cDNContentUrl":"https://th.bing.com/th/id/R.b44a38245cb65bc9fda7661afec5b867?rik=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"6E87C9E08E13E0E859690832C3182981931B7FDD","accentColor":"142946","isFresh":true},"985C2AF313581EDDE9022F2DCD899093714F9F2B":{"name":"Riyan Parag caught vaping inside RR dressing room; risks imprisonment ...","thumbnailUrl":"https://tse1.mm.bing.net/th?id=OIF.JA%2bbewshj4VEsBhVEDGi%2fA&pid=Api","datePublished":"2026-04-29T01:58:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA21XgIh.img?w=549&h=309&m=6","hostPageUrl":"https://www.msn.com/en-in/sports/cricket/riyan-parag-caught-vaping-inside-rr-dressing-room-risks-imprisonment-heavy-fine-amid-india-s-strict-e-cigarette-ban/ar-AA21XdNa","contentSize":"32768 B","width":549,"height":309,"cDNContentUrl":"https://th.bing.com/th/id/R.a7883241b8dbb330be199a4b00b8a604?rik=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"B2F9F417390998DCD2F2209EDDE185313FA2C589","accentColor":"9A6631","isFresh":true},"4E95EC0A570FDD06FCFC6EE714A7156CED6343DA":{"name":"Computers of armed forces and DRDO hacked - The Economic Times","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.WtAL8rgpRzFYFomOGyBPLQAAAA?pid=Api","datePublished":"2017-11-05T00:04:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://img.etimg.com/thumb/msid-96316934,imgsize-69568,width-183,height-137,quality-100/jayant-gokhales-explosive-resignation-letter-and-the-inr-1200-crore-risk-in-pfss-loan-book.jpg","hostPageUrl":"https://economictimes.indiatimes.com/tech/internet/Computers-of-armed-forces-and-DRDO-hacked/articleshow/31550861.cms","contentSize":"15347 B","width":183,"height":137,"cDNContentUrl":"https://th.bing.com/th/id/R.5ad00bf2b82947315816898e1b204f2d?rik=5FnOoHXw3WDPzw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"AD3436DEC6517A417EE6CFCF60DDF075A0CE59E4","accentColor":"296FA2"},"401F127978E934373A765E878B71E0E1376B9D1C":{"name":"India and Malaysia can now trade in Indian rupee","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.CYbYvIT2x3rpX3J94IdZzwHaHa?pid=Api","datePublished":"2023-04-03T05:20:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://asianlite.uk/wp-content/uploads/2023/04/Fsm8UqIaYAACZhp-1024x1024.jpg","hostPageUrl":"https://currentaffairs.adda247.com/india-malaysia-can-now-trade-in-indian-rupee/","contentSize":"230403 B","width":1024,"height":1024,"cDNContentUrl":"https://th.bing.com/th/id/R.0986d8bc84f6c77ae95f727de08759cf?rik=BPEhl4eeQ3OjZw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"C1D9B6731E0E17B878E567A373439E879721F104","accentColor":"1677B5"},"4CD3A6C76745E7E4C5658EBB8EA18722A38133AF":{"name":"Supply Chain Risk Management: Literature Review","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.dD_XS3NM5IbdKCZNRAXZQgHaHa?pid=Api","datePublished":"2021-01-06T12:06:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mdpi.com/risks/risks-09-00016/article_deploy/html/images/risks-09-00016-g001.png","hostPageUrl":"https://www.mdpi.com/2227-9091/9/1/16","contentSize":"54830 B","width":3408,"height":3412,"cDNContentUrl":"https://th.bing.com/th/id/R.743fd74b734ce486dd28264d4405d942?rik=xD1qfHZUfk5cVg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"FA33183A22781AE8BBE8565C4E7E54767C6A3DC4","accentColor":"383838"},"5EACB65D80359482187F0B8E5CA28667E3561C61":{"name":"Online training on Secure Practices for Digital Gaming | Central ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.YrVEw1d3VeeD8ngzUmvhAgHaHa?pid=Api","datePublished":"2024-10-17T17:03:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://ciet.ncert.gov.in/storage/app/public/files/17/Workshop_and_training_files/sdge/sdge.jpg","hostPageUrl":"https://ciet.ncert.gov.in/activity/sdge","contentSize":"154515 B","width":793,"height":793,"cDNContentUrl":"https://th.bing.com/th/id/R.62b544c3577755e783f27833526be102?rik=5cpr1QhTSSiB9w&pid=ImgRaw&r=0","isTransparent":false,"imageId":"16C1653E76682AC5E8B0F78128495308D56BCAE5","accentColor":"7D3839"}},"relatedSearches":[{"text":"Malware Threats","displayText":"Malware Threats","webSearchUrl":"https://www.bing.com/images/search?q=Malware+Threats&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5830.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+Threats","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Malware+Threats&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malware Detection","displayText":"Malware Detection","webSearchUrl":"https://www.bing.com/images/search?q=Malware+Detection&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5832.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+Detection","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Malware+Detection&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malware Infection","displayText":"Malware Infection","webSearchUrl":"https://www.bing.com/images/search?q=Malware+Infection&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5834.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+Infection","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Malware+Infection&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malware Prevention","displayText":"Malware Prevention","webSearchUrl":"https://www.bing.com/images/search?q=Malware+Prevention&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5836.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+Prevention","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Malware+Prevention&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malware Vírus","displayText":"Malware Vírus","webSearchUrl":"https://www.bing.com/images/search?q=Malware+V%C3%ADrus&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5838.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+V%C3%ADrus","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Malware+V%c3%adrus&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malware Attack","displayText":"Malware Attack","webSearchUrl":"https://www.bing.com/images/search?q=Malware+Attack&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5840.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+Attack","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Malware+Attack&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malware Warning","displayText":"Malware Warning","webSearchUrl":"https://www.bing.com/images/search?q=Malware+Warning&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5842.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+Warning","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Malware+Warning&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Effects of Malware","displayText":"Effects of Malware","webSearchUrl":"https://www.bing.com/images/search?q=Effects+of+Malware&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5844.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Effects+of+Malware","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Effects+of+Malware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Signs of Malware","displayText":"Signs of Malware","webSearchUrl":"https://www.bing.com/images/search?q=Signs+of+Malware&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5846.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Signs+of+Malware","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Signs+of+Malware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malware Protection","displayText":"Malware Protection","webSearchUrl":"https://www.bing.com/images/search?q=Malware+Protection&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5848.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+Protection","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Malware+Protection&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Examples of Malware Attacks","displayText":"Examples of Malware Attacks","webSearchUrl":"https://www.bing.com/images/search?q=Examples+of+Malware+Attacks&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5850.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Examples+of+Malware+Attacks","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Examples+of+Malware+Attacks&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malware Issues","displayText":"Malware Issues","webSearchUrl":"https://www.bing.com/images/search?q=Malware+Issues&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5852.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+Issues","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Malware+Issues&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malware Symptoms","displayText":"Malware Symptoms","webSearchUrl":"https://www.bing.com/images/search?q=Malware+Symptoms&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5854.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+Symptoms","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Malware+Symptoms&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Types of Malware Attacks","displayText":"Types of Malware Attacks","webSearchUrl":"https://www.bing.com/images/search?q=Types+of+Malware+Attacks&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5856.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Types+of+Malware+Attacks","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Types+of+Malware+Attacks&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Define Malware","displayText":"Define Malware","webSearchUrl":"https://www.bing.com/images/search?q=Define+Malware&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5858.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Define+Malware","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Define+Malware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malware Cyber Security","displayText":"Malware Cyber Security","webSearchUrl":"https://www.bing.com/images/search?q=Malware+Cyber+Security&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5860.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+Cyber+Security","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Malware+Cyber+Security&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"How to Protect Against Malware","displayText":"How to Protect Against Malware","webSearchUrl":"https://www.bing.com/images/search?q=How+to+Protect+Against+Malware&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5862.1","searchLink":"https://www.bing.com/api/v7/images/search?q=How+to+Protect+Against+Malware","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=How+to+Protect+Against+Malware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Types of Computer Security Risks","displayText":"Types of Computer Security Risks","webSearchUrl":"https://www.bing.com/images/search?q=Types+of+Computer+Security+Risks&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5864.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Types+of+Computer+Security+Risks","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Types+of+Computer+Security+Risks&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malware Pictures","displayText":"Malware Pictures","webSearchUrl":"https://www.bing.com/images/search?q=Malware+Pictures&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5866.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+Pictures","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Malware+Pictures&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malware Facts","displayText":"Malware Facts","webSearchUrl":"https://www.bing.com/images/search?q=Malware+Facts&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5868.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+Facts","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Malware+Facts&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malware Analysis","displayText":"Malware Analysis","webSearchUrl":"https://www.bing.com/images/search?q=Malware+Analysis&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5870.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+Analysis","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Malware+Analysis&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"What Is Malware","displayText":"What Is Malware","webSearchUrl":"https://www.bing.com/images/search?q=What+Is+Malware&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5872.1","searchLink":"https://www.bing.com/api/v7/images/search?q=What+Is+Malware","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=What+Is+Malware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"How to Avoid Malware","displayText":"How to Avoid Malware","webSearchUrl":"https://www.bing.com/images/search?q=How+to+Avoid+Malware&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5874.1","searchLink":"https://www.bing.com/api/v7/images/search?q=How+to+Avoid+Malware","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=How+to+Avoid+Malware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malicious Malware","displayText":"Malicious Malware","webSearchUrl":"https://www.bing.com/images/search?q=Malicious+Malware&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5876.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malicious+Malware","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Malicious+Malware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Prevent Malware","displayText":"Prevent Malware","webSearchUrl":"https://www.bing.com/images/search?q=Prevent+Malware&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5878.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Prevent+Malware","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Prevent+Malware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Network Security Threats","displayText":"Network Security Threats","webSearchUrl":"https://www.bing.com/images/search?q=Network+Security+Threats&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5880.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Network+Security+Threats","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Network+Security+Threats&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malicious Software","displayText":"Malicious Software","webSearchUrl":"https://www.bing.com/images/search?q=Malicious+Software&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5882.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malicious+Software","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Malicious+Software&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Computer Security Risk","displayText":"Computer Security Risk","webSearchUrl":"https://www.bing.com/images/search?q=Computer+Security+Risk&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5884.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Computer+Security+Risk","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Computer+Security+Risk&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Different Types of Malware","displayText":"Different Types of Malware","webSearchUrl":"https://www.bing.com/images/search?q=Different+Types+of+Malware&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5886.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Different+Types+of+Malware","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Different+Types+of+Malware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Pegasus Malware","displayText":"Pegasus Malware","webSearchUrl":"https://www.bing.com/images/search?q=Pegasus+Malware&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5888.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Pegasus+Malware","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Pegasus+Malware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}}],"createdate":1778049925917}
            [curl_error] => 
            [product_name_used] => Malware-Risks
            [parsed] => Array
                (
                    [name] => malware-risks inr loc:in
                    [totalEstimatedMatches] => 222
                    [nextOffset] => 120
                    [currentOffset] => 0
                    [value] => Array
                        (
                            [E7A8143009CEAD9109900397B06A67280DE621AD] => Array
                                (
                                    [name] => Risk monitoring helps Air India prevent revenue loss of over INR 3 cr ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.MVTnVaL4OfXLs6DPXKukxwHaEu?pid=Api
                                    [datePublished] => 2023-10-14T16:36:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://etimg.etb2bimg.com/thumb/msid-104429059,imgsize-15734,width-1200,height=765,overlay-etinfra/news/aviation/risk-monitoring-helps-air-india-prevent-revenue-loss-of-over-inr-3-cr.jpg
                                    [hostPageUrl] => https://infra.economictimes.indiatimes.com/news/aviation/risk-monitoring-helps-air-india-prevent-revenue-loss-of-over-inr-3-cr/104429059
                                    [contentSize] => 37249 B
                                    [width] => 1200
                                    [height] => 765
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.3154e755a2f839f5cbb3a0cf5caba4c7?rik=fopBA5Ds2hmQCQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => DA126ED08276A60B7930099019DAEC9003418A7E
                                    [accentColor] => A82623
                                )

                            [652A4C1DCAB4E7388F190170A94E23192C62400E] => Array
                                (
                                    [name] => Could be a huge mistake: KKR risk flagged after splurging INR 18 crore ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.anwwskm5-2AP7xU2UiquzQHaEK?pid=Api
                                    [datePublished] => 2025-12-16T12:56:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.hindustantimes.com/ht-img/img/2025/12/16/550x309/PTI03-31-2024-000376B-0_1712129179172_1765887837176.jpg
                                    [hostPageUrl] => https://www.hindustantimes.com/cricket/could-be-huge-mistake-kkr-risk-flagged-splurging-inr-18-crore-matheesha-pathirana-despite-worst-ipl-season-with-csk-101765884180052.html
                                    [contentSize] => 65338 B
                                    [width] => 549
                                    [height] => 309
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.6a7c30b249b9fb600fef1536522aaecd?rik=VqLE0axLfoP4kQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => E00426C29132E49A071091F8837E4BACD1C4A256
                                    [accentColor] => B98B12
                                )

                            [B1B6510697B5CE97870C1BB8C76EDB74A9601DAD] => Array
                                (
                                    [name] => BUY Polkastarter (POLS)in INR on PocketBits!
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.H2i4BOXlnozZwi1Cgu8lDwHaEK?pid=Api
                                    [datePublished] => 2022-01-15T08:37:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://pocketbits.in/blog/content/images/2021/12/pols.jpg
                                    [hostPageUrl] => https://pocketbits.in/blog/buy-polkastarter-pols-in-inr-on-pocketbits-11/
                                    [contentSize] => 94407 B
                                    [width] => 1600
                                    [height] => 900
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.1f68b804e5e59e8cd9c22d4282ef250f?rik=G2sVYHlb7Hl4wA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => DAD1069A47BDE67C8BB1C07879EC5B7960156B1B
                                    [accentColor] => BF0C38
                                )

                            [5F9D9FB9DD8C747342CCFE05591104F96426A410] => Array
                                (
                                    [name] => INR Full Form: What is full form of INR?
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.-HbYAKjSJ-4PC_ZocKUqaAHaEU?pid=Api
                                    [datePublished] => 2022-11-05T12:08:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://st.adda247.com/https://wpassets.adda247.com/wp-content/uploads/multisite/2022/11/05144815/What-is-INR.png
                                    [hostPageUrl] => https://www.bankersadda.com/inr-full-form/
                                    [contentSize] => 35329 B
                                    [width] => 720
                                    [height] => 420
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.f876d800a8d227ee0f0bf66870a52a68?rik=9dn5m93IRzckzA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 014A62469F40119550EFCC243747C8DD9BF9D9F5
                                    [accentColor] => B71414
                                )

                            [5C45162565D8BB28CF6C7A715DA63EB08C889142] => Array
                                (
                                    [name] => Philips Remote Inr Order Form - Fill Online, Printable, Fillable, Blank ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.DUbYLxixf5e5xzupgj38ngAAAA?pid=Api
                                    [datePublished] => 2016-03-30T07:52:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.pdffiller.com/preview/5/739/5739835.png
                                    [hostPageUrl] => https://www.pdffiller.com/5739835-fillable-philips-prescription-form-inr
                                    [contentSize] => 7936 B
                                    [width] => 298
                                    [height] => 386
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.0d46d82f18b17f97b9c73ba9823dfc9e?rik=xVRhUlaNu4L8xg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 241988C80BE36AD517A7C6FC82BB8D56526154C5
                                    [accentColor] => 50697B
                                )

                            [36DF5C3262D3A62B582F7DC41009C7439FAD3808] => Array
                                (
                                    [name] => Currency Converter - Convert USD to INR, INR to EUR | Currency ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.2-e_M7bMmeTMsZhMTAtECAAAAA?pid=Api
                                    [datePublished] => 2017-11-02T02:10:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://img.etimg.com/thumb/msid-121874714,width-160,imglength-81542,resizemode-4/rupee-braces-for-more-losses-on-oil-risks-rbi-likely-to-provide-support.jpg
                                    [hostPageUrl] => https://economictimes.indiatimes.com/markets/forex/currency-converter
                                    [contentSize] => 2858 B
                                    [width] => 160
                                    [height] => 84
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.dbe7bf33b6cc99e4ccb1984c4c0b4408?rik=Y%2f3FIyY9arKF8g&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 8083DAF9347C90014CD7F285B26A3D2623C5FD63
                                    [accentColor] => 674E38
                                )

                            [CEEBD75497D89EE2FE0F9306E2D003156A4C4F21] => Array
                                (
                                    [name] => Is home inr monitoring a safe option for children requiring long-term ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.WCa_IrBWNalFvTWLtXoHjgAAAA?pid=Api
                                    [datePublished] => 2015-05-27T12:26:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.pediatriconcall.com/master/images/sign-up.png
                                    [hostPageUrl] => https://www.pediatriconcall.com/pediatric-journal/view/fulltext-articles/943/C/0/0/833/0
                                    [contentSize] => 480 B
                                    [width] => 24
                                    [height] => 24
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.5826bf22b05635a945bd358bb57a078e?rik=7L59RXmN6S7v8A&pid=ImgRaw&r=0
                                    [isTransparent] => 1
                                    [imageId] => 12F4C4A651300D2E6039F0EF2EE98D79457DBEEC
                                    [accentColor] => 0AACC1
                                )

                            [E148C31E57A68359979B406E75667B19921B767F] => Array
                                (
                                    [name] => MC-ISA: A Multi-Channel Code Visualization Method for Malware Detection
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.Gr3n8QlkYV0BNlXXUv7kzQHaHa?pid=Api
                                    [datePublished] => 2023-05-17T11:31:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.mdpi.com/electronics/electronics-12-02272/article_deploy/html/images/electronics-12-02272-g001.png
                                    [hostPageUrl] => https://www.mdpi.com/2079-9292/12/10/2272
                                    [contentSize] => 1779231 B
                                    [width] => 3548
                                    [height] => 3552
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.1abde7f10964615d013655d752fee4cd?rik=HoQ84XVqOJV5uQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => F767B12991B76657E604B97995386A75E13C841E
                                    [accentColor] => 1765B4
                                )

                            [4406A69803D3A3ECDDBA49A5DDEEBEEC659E4AD0] => Array
                                (
                                    [name] => Building Resilience in Manufacturing: The Critical Need for OT ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.J5GH5VkD-ZMo9UlWTXOJOgHaEK?pid=Api
                                    [datePublished] => 2024-12-10T16:04:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://rockwellautomation.scene7.com/is/image/rockwellautomation/malware-cyber-threats-SHS-2279624513.2400.jpg
                                    [hostPageUrl] => https://www.rockwellautomation.com/en-in/company/news/magazines/cybersecurity-resilience-dragos.html
                                    [contentSize] => 127174 B
                                    [width] => 2400
                                    [height] => 1350
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.279187e55903f99328f549564d73893a?rik=RGBqiTA9Os7dqw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 0DA4E956CEEBEEDD5A94ABDDCE3A3D30896A6044
                                    [accentColor] => 390109
                                )

                            [934B5B2AA38A3B0FD056B37D3420F87AE6CA2900] => Array
                                (
                                    [name] => FBI Alert: BADBOX 2.0 Botnet Targets Smart Devices
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.q1J2TLmG3ZzOHKfPrOCwLQHaEz?pid=Api
                                    [datePublished] => 2025-06-26T13:24:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://blogs.npav.net/media/magefan_blog/badbox-2-iot-malware-warning_3_.png
                                    [hostPageUrl] => https://blogs.npav.net/blogs/post/fbi-alert-badbox-20-botnet-targets-smart-devices
                                    [contentSize] => 1405949 B
                                    [width] => 1080
                                    [height] => 700
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.ab52764cb986dd9cce1ca7cface0b02d?rik=ObS1ojqos%2fANZQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 0092AC6EA78F0243D73B650DF0B3A83AA2B5B439
                                    [accentColor] => C00302
                                )

                            [262B2BBCCA79836C437F6B1D190E222CBAF47466] => Array
                                (
                                    [name] => Your mental health internet search may lead to malware - Blog
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.x2cIIyknAxu9fR0iQmrNmQHaIy?pid=Api
                                    [datePublished] => 2023-09-11T17:46:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://helios-i.mashable.com/imagery/articles/07B8FpolvHmF8cAnkOzzSre/images-1.fill.size_632x750.v1692311998.png
                                    [hostPageUrl] => https://appsmanager.in/blog/your-mental-health-internet-search-may-lead-to-malware
                                    [contentSize] => 117302 B
                                    [width] => 632
                                    [height] => 750
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.c76708232927031bbd7d1d22426acd99?rik=YrKyy6yXOMY09w&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 66474FABC222E091D1B6F734C63897ACCBB2B262
                                    [accentColor] => 1F96AC
                                )

                            [DDCADDF02E6B1C236518692378EE2BEEFC459312] => Array
                                (
                                    [name] => Recent Cases of Watering Hole Attacks, Part 1
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.C-HYizB8PxnYWWiiYpJpWgHaHS?pid=Api
                                    [datePublished] => 2024-12-19T02:55:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://blogs.jpcert.or.jp/en/.assets/watering_hole_attack_2023_1-fig5.png
                                    [hostPageUrl] => https://sechub.in/view/2989271
                                    [contentSize] => 125606 B
                                    [width] => 1189
                                    [height] => 1171
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.0be1d88b307c3f19d85968a26292695a?rik=3azdD%2bK2wTJWgQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 213954CFEEB2EE873296815632C1B6E20FDDACDD
                                    [accentColor] => 820E0F
                                )

                            [C2F40FA815BF17A5EB27C9DC274051627469C89E] => Array
                                (
                                    [name] => Similarity-Based Malware Classification Using Graph Neural Networks
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.1a6qrTBJytHiRKLsZ4wpigHaDI?pid=Api
                                    [datePublished] => 2022-10-26T09:08:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.mdpi.com/applsci/applsci-12-10837/article_deploy/html/images/applsci-12-10837-g001.png
                                    [hostPageUrl] => https://www.mdpi.com/2076-3417/12/21/10837
                                    [contentSize] => 1009729 B
                                    [width] => 3306
                                    [height] => 1395
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.d5aeaaad3049cad1e244a2ec678c298a?rik=LE%2fwilH7cVq%2bcg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => E98C964726150472CD9C72BE5A71FB518AF04F2C
                                    [accentColor] => C47107
                                )

                            [4744E21E60F6237F7BE2F89733EFC2B6DF52695F] => Array
                                (
                                    [name] => Fintech: An Evergreen Sector Getting More Greener (2/2) | nasscom | The ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.usCa8ml8NmerdIgFRkQZeQHaDt?pid=Api
                                    [datePublished] => 2021-07-07T06:36:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://community.nasscom.in/sites/default/files/inline-images/Fintech%202-2.png
                                    [hostPageUrl] => https://community.nasscom.in/communities/productstartups/fintech-evergreen-sector-getting-more-greener-22
                                    [contentSize] => 50495 B
                                    [width] => 953
                                    [height] => 478
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.bac09af2697c3667ab74880546441979?rik=dEQu4QZvMve3Lg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => F59625FD6B2CFE33798F2EB7F7326F06E12E4474
                                    [accentColor] => 0888B1
                                )

                            [807199F9C7BFACF6AA6A59EB2A053D1F828A25B7] => Array
                                (
                                    [name] => Malware Forensics Guide – Static and Dynamic Approach – Yeah Hub
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP._a9PcwTqYroM7Yw0u2HDDQHaDi?pid=Api
                                    [datePublished] => 2017-02-03T18:16:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.yeahhub.com/wp-content/uploads/2017/01/malware.png
                                    [hostPageUrl] => https://www.yeahhub.com/malware-forensics-guide-static-dynamic-approach/
                                    [contentSize] => 451756 B
                                    [width] => 1600
                                    [height] => 764
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.fdaf4f7304ea62ba0ced8c34bb61c30d?rik=CBeZn3z7ym%2bqpg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 7B52A828F1D350A2BE95A6AA6FCAFB7C9F991708
                                    [accentColor] => CB7600
                                )

                            [1B66A7BBD02353C44522377BC8AA30FA9ED6F94D] => Array
                                (
                                    [name] => Is The 16 Billion Password Leak A New Data Breach? Here's The Truth ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.teMB5yrHt8FtMzu3gYsefwHaEK?pid=Api
                                    [datePublished] => 2025-06-20T23:13:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://images.timesnownews.com/thumb/msid-152119608,thumbsize-872832,width-1280,height-720,resizemode-75/152119608.jpg
                                    [hostPageUrl] => https://www.timesnownews.com/world/is-the-16-billion-password-leak-a-new-data-breach-heres-the-truth-article-152119414
                                    [contentSize] => 857204 B
                                    [width] => 1280
                                    [height] => 720
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.b5e301e72ac7b7c16d333bb7818b1e7f?rik=sWZ6uw0yNUxUIg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => D49F6DE9AF03AA8CB77322544C35320DBB7A66B1
                                    [accentColor] => C60508
                                )

                            [311570A1266C25792EBD9D3C6AC18FA84F4F008E] => Array
                                (
                                    [name] => Malware: Your banking information is at risk! New malware Coyote ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.ncK78KzdzXGI1RsnVRNLeAHaEQ?pid=Api
                                    [datePublished] => 2025-07-30T15:00:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1JzX0C.img?w=920&h=528&m=4&q=60
                                    [hostPageUrl] => https://www.msn.com/en-in/money/news/malware-your-banking-information-is-at-risk-new-malware-coyote-activated-under-the-guise-of-windows-feature/ar-AA1JApZ6
                                    [contentSize] => 131072 B
                                    [width] => 920
                                    [height] => 528
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.9dc2bbf0acddcd7188d51b2755134b78?rik=E1EHGmLGUpfi2w&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => E800F4F48AF81CA6C3D9DBE29752C6621A075113
                                    [accentColor] => 1D8FAE
                                )

                            [11D8BAFB3EA43562173EB37D3420F87AE6CA2900] => Array
                                (
                                    [name] => FBI Alert: BADBOX 2.0 Botnet Targets Smart Devices
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.k12OOF6HjqzvPks60RF9JwHaE8?pid=Api
                                    [datePublished] => 2025-06-26T13:24:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://blogs.npav.net/media/wysiwyg/badbox-2-iot-malware-warning_1_.png
                                    [hostPageUrl] => https://blogs.npav.net/blogs/post/fbi-alert-badbox-20-botnet-targets-smart-devices
                                    [contentSize] => 312291 B
                                    [width] => 499
                                    [height] => 333
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.935d8e385e878eacef3e4b3ad1117d27?rik=EY2rv%2bNKUyZx4w&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 0092AC6EA78F0243D73BE37126534AE3BFAB8D11
                                    [accentColor] => BD200E
                                )

                            [9FA4F41F5D7898BE378A3250F12EA4C109453D2C] => Array
                                (
                                    [name] => Cómo responder a una infección de malware en la empresa
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.L8zzkCOGls6ewNcnH4Gd7QAAAA?pid=Api
                                    [datePublished] => 2015-11-24T20:11:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://web-assets.esetstatic.com/wls/2015/11/guia_infeccion_malware_empresa.jpg
                                    [hostPageUrl] => https://www.welivesecurity.com/la-es/2015/11/24/como-responder-infeccion-de-malware-empresa/
                                    [contentSize] => 29009 B
                                    [width] => 400
                                    [height] => 394
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.2fccf390238696ce9ec0d7271f819ded?rik=%2bUpP8dWHietzqA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => C2D354901C4AE21F0523A873EB8987D5F14F4AF9
                                    [accentColor] => 2A96A1
                                )

                            [03BE2DA6ACF4C4BBD08E9AAA27C31A3F0DDD954F] => Array
                                (
                                    [name] => What is Cybercrime | Risks & Anti-Malware Solutions
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.p313af7qIiAF5D6q2xJwhwHaEL?pid=Api
                                    [datePublished] => 2017-10-22T03:56:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.kaspersky.co.in/content/en-in/images/repository/isc/2017-images/malware-img-17.jpg
                                    [hostPageUrl] => https://www.kaspersky.co.in/resource-center/threats/cybercrime
                                    [contentSize] => 111087 B
                                    [width] => 710
                                    [height] => 400
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.a77d7769feea222005e43eaadb127087?rik=MOvSaspPTLsN6A&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => F459DDD0F3A13C72AAA9E80DBB4C4FCA6AD2EB30
                                    [accentColor] => 2E959D
                                )

                            [C403417E6537A7B7A92BB65D571C67D65693619A] => Array
                                (
                                    [name] => Email inbox and spam virus represent internet security risks and ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.WrKJd4Hsxx6igPsMNvtpigHaDt?pid=Api
                                    [datePublished] => 2024-03-10T23:39:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://img.freepik.com/premium-photo/email-inbox-spam-virus-represent-internet-security-risks-compromised-information-concept-internet-security-email-safety-data-breaches-malware-threats-cyber-security_918839-36555.jpg
                                    [hostPageUrl] => https://www.freepik.com/premium-ai-image/email-inbox-spam-virus-represent-internet-security-risks-compromised-information-concept-internet-security-email-safety-data-breaches-malware-threats-cyber-security_154511522.htm
                                    [contentSize] => 48650 B
                                    [width] => 626
                                    [height] => 313
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.5ab2897781ecc71ea280fb0c36fb698a?rik=TDAU51Zzenuasg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => A91639656D76C175D56BB29A7B7A7356E714304C
                                    [accentColor] => B39A18
                                )

                            [88B330097FC490112C5F3E62B3E641CDD567B747] => Array
                                (
                                    [name] => Trellix Global Defenders: Analysis and Protections for Destructive Wipers
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.SGt4O_cLKlLS-47s7UnxKwHaEA?pid=Api
                                    [datePublished] => 2022-11-17T22:38:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.trellix.com/en-us/img/newsroom/stories/analysis-protections-destructive-wipers-9.jpg
                                    [hostPageUrl] => https://www.trellix.com/blogs/research/trellix-global-defenders-analysis-protections-for-destructive-wipers/
                                    [contentSize] => 68863 B
                                    [width] => 1322
                                    [height] => 716
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.486b783bf70b2a52d2fb8eeced49f12b?rik=iDsDkPdMCRHC9Q&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 747B765DDC146E3B26E3F5C211094CF790033B88
                                    [accentColor] => 1A4B64
                                )

                            [69F5D91E8E44DC01562B44F4400F317359B8CBD1] => Array
                                (
                                    [name] => Gaming mouse maker infected users with malware for weeks, then quietly ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.ZNq8k95Ltvubc8cj6S8PfwHaEL?pid=Api
                                    [datePublished] => 2025-07-24T11:15:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://images.hindustantimes.com/tech/img/2025/07/24/1600x900/michael-geiger-JJPqavJBy_k-unsplash_1753355408301_1753355494298.jpg
                                    [hostPageUrl] => https://tech.hindustantimes.com/tech/news/gaming-mouse-maker-infected-users-with-malware-for-weeks-then-quietly-replaced-files-without-warning-71753355320353.html
                                    [contentSize] => 162329 B
                                    [width] => 1596
                                    [height] => 900
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.64dabc93de4bb6fb9b73c723e92f0f7f?rik=ll%2bd4ehEzRBlsg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 1DBC8B953713F0044F44B26510CD44E8E19D5F96
                                    [accentColor] => CC0100
                                )

                            [71CA1EBAFA3BAA1638501313D67CD4583E7859A4] => Array
                                (
                                    [name] => What is Ransomware?
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.2PcIQRquEOcxqgARTExdYQHaEL?pid=Api
                                    [datePublished] => 2018-06-24T10:02:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.kaspersky.co.in/content/en-in/images/repository/isc/2021/ransomware.jpg
                                    [hostPageUrl] => https://www.kaspersky.co.in/resource-center/threats/ransomware
                                    [contentSize] => 43237 B
                                    [width] => 710
                                    [height] => 400
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.d8f708411aae10e731aa00114c4c5d61?rik=F6zhq6%2bzqmGDBQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 4A9587E3854DC76D3131058361AAB3AFABE1AC17
                                    [accentColor] => B93012
                                )

                            [279FB7A7284455EC19653D3658151D97AC8FDD39] => Array
                                (
                                    [name] => Understanding Malware Terminology for Beginners
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.9fecClmt2CwK5drp7emfdQHaEK?pid=Api
                                    [datePublished] => 2024-07-28T01:31:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => http://securityaffairs.co/wordpress/wp-content/uploads/2014/06/malware-computer-virus.jpg
                                    [hostPageUrl] => https://sechub.in/view/92746
                                    [contentSize] => 21343 B
                                    [width] => 640
                                    [height] => 360
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.f5f79c0a59add82c0ae5dae9ede99f75?rik=cvl7eoJEVc6RVg&riu=http%3a%2f%2fsecurityaffairs.co%2fwordpress%2fwp-content%2fuploads%2f2014%2f06%2fmalware-computer-virus.jpg&ehk=CLbQLrvL5fC7WUgJqLisCRmnoapncXeKmfTv94zOTuA%3d&risl=&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 93DDF8CA79D1518563D35691CE5544827A7BF972
                                    [accentColor] => 160404
                                )

                            [1BB7215E7A3E6E129D44ED28EE9EBFAFADF77542] => Array
                                (
                                    [name] => How would i trigger an update for MS 365 Defender -Devices with Malware ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.HlB7_x23x-qNVSyJUVWZ3AAAAA?pid=Api
                                    [datePublished] => 2025-04-14T19:30:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://learn-attachment.microsoft.com/api/attachments/151893-deviceswith-malware.png?platform=QnA
                                    [hostPageUrl] => https://learn.microsoft.com/en-in/answers/questions/637951/how-would-i-trigger-an-update-for-ms-365-defender
                                    [contentSize] => 12247 B
                                    [width] => 433
                                    [height] => 297
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.1e507bff1db7c7ea8d552c89515599dc?rik=sXsS5afj5iHZRA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 24577FDAFAFBE9EE82DE44D921E6E3A7E5127BB1
                                    [accentColor] => 0000CC
                                )

                            [946D56343402B478F3E7FE78913F6F793D152D3A] => Array
                                (
                                    [name] => Exploring the Risks of AI-Powered Malware and Defensive AI
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.c7v-mPoV8xjtIGSKu62HZAAAAA?pid=Api
                                    [datePublished] => 2025-01-02T11:43:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://cdn.img.gen.in/assets/business/5806/feeds/8697/5806_638713796565177679119205.jpg?rendered=true&width=400&height=300&meta=true
                                    [hostPageUrl] => https://www.comtechsystems.in/blog/exploring-the-risks-of-8697
                                    [contentSize] => 28574 B
                                    [width] => 466
                                    [height] => 350
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.73bbfe98fa15f318ed20648abbad8764?rik=SdZlQ0MgS4c%2ffg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => A3D251D397F6F31987EF7E3F874B20434365D649
                                    [accentColor] => 04100E
                                )

                            [25F28DFC531A75E9582AF8EB21C4D9F146E0EB65] => Array
                                (
                                    [name] => Google Makes Developer Verification Mandatory For Android Apps
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.VqWTRasRNWFJVCUt1QPHtwHaEc?pid=Api
                                    [datePublished] => 2025-08-27T06:47:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.boomlive.in/h-upload/2025/08/27/1047503-google-fi.webp
                                    [hostPageUrl] => https://www.boomlive.in/web-stories/news/google-to-require-developer-verification-for-android-apps-to-curb-malware-risks-2566
                                    [contentSize] => 33346 B
                                    [width] => 1280
                                    [height] => 768
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.56a59345ab1135614954252dd503c7b7?rik=Ui%2fYzzWhV56Fog&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 56BE0E641F9D4C12BE8FA2859E57A135CFD82F52
                                    [accentColor] => C99502
                                )

                            [B3CFFD19179F84BFC8BDCED060D885368AF5BDE6] => Array
                                (
                                    [name] => The Rise of UPI Frauds - How to Prevent Frauds & Stay Safe
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.kFSKdhAUT6NggW2ZNkUnmQHaFU?pid=Api
                                    [datePublished] => 2024-02-08T12:49:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.paisabazaar.com/wp-content/uploads/2024/02/The-Rise-of-UPI-Fraud-1.jpg
                                    [hostPageUrl] => https://www.paisabazaar.com/banking/upi-frauds-prevention/
                                    [contentSize] => 182794 B
                                    [width] => 793
                                    [height] => 570
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.90548a7610144fa360816d9936452799?rik=O%2fzfkXH5SPuM2w&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 6EDB5FA863588D060DECDB8CFB48F97191DFFC3B
                                    [accentColor] => BC590F
                                )

                            [D9376E34F6F79408D5259D8C358BF1F910BF7C0D] => Array
                                (
                                    [name] => Understanding Agobot: The Pioneering Modular Malware - Tech Hyme
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.6lU4EhO8QB1plEQuTYT5YwHaDq?pid=Api
                                    [datePublished] => 2023-08-13T03:23:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://techhyme.com/wp-content/uploads/2023/08/Agobot-Malware-Techhyme-1024x506.jpg
                                    [hostPageUrl] => https://techhyme.com/understanding-agobot-the-pioneering-modular-malware/
                                    [contentSize] => 17646 B
                                    [width] => 1024
                                    [height] => 506
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.ea55381213bc401d6994442e4d84f963?rik=nXPmQ29%2fSYBdUg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => D0C7FB019F1FB853C8D9525D80497F6F43E6739D
                                    [accentColor] => C3084E
                                )

                            [5C0039107061BB6D1830EF8F2E93808CC1945A76] => Array
                                (
                                    [name] => Robust Intelligent Malware Detection Using Deep Learning | S-Logix
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.I0MDQLY9f8sYujHmEOMpJwHaDN?pid=Api
                                    [datePublished] => 2022-06-16T23:58:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://slogix.in/images/machine-learning/robust-intelligent-malware-detection-using-deep-learning.jpg
                                    [hostPageUrl] => https://slogix.in/machine-learning/robust-intelligent-malware-detection-using-deep-learning/
                                    [contentSize] => 40012 B
                                    [width] => 830
                                    [height] => 360
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.23430340b63d7fcb18ba31e610e32927?rik=xQCTAQcWu9aBAw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 67A5491CC80839E2F8FE0381D6BB1607019300C5
                                    [accentColor] => 004B95
                                )

                            [AEDE4612BF85FF90A7C964D02C6CDC5A1DB2AF38] => Array
                                (
                                    [name] => FBI warns against malware risks in free file converters: What you need ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.c2XxCN2jcbui3GKOQ4LPpwHaEK?pid=Api
                                    [datePublished] => 2025-03-10T06:49:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1AAIaq.img?w=768&h=432&m=6&x=262&y=228&s=127&d=127
                                    [hostPageUrl] => https://www.msn.com/en-in/money/news/fbi-warns-against-malware-risks-in-free-file-converters-what-you-need-to-know/ar-AA1AApxk
                                    [contentSize] => 65536 B
                                    [width] => 768
                                    [height] => 432
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.7365f108dda371bba2dc628e4382cfa7?rik=6u1kIftY%2fwl6nA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 83FA2BD1A5CDC6C20D469C7A09FF58FB2164EDEA
                                    [accentColor] => 044763
                                )

                            [C7F78C748FD9B94651AD1C72C3D5F28E6108FD89] => Array
                                (
                                    [name] => Windows 11 Upgrade on mind? Beware, don't click on fake installer ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.5eG5rlS9Z1ujbvyrdODUbgHaEK?pid=Api
                                    [datePublished] => 2022-02-11T07:40:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://images.hindustantimes.com/tech/img/2022/02/11/960x540/Untitled_design_-_2022-02-11T124934.597_1644564944243_1644564969887.jpg
                                    [hostPageUrl] => https://tech.hindustantimes.com/tech/news/windows-11-upgrade-on-mind-beware-don-t-click-on-fake-installer-avoid-big-malware-risk-71644564888416.html
                                    [contentSize] => 53310 B
                                    [width] => 960
                                    [height] => 540
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.e5e1b9ae54bd675ba36efcab74e0d46e?rik=fH%2fIR%2fidm2QV2g&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 98DF8016E82F5D3C27C1DA15649B9DF847C87F7C
                                    [accentColor] => 0642C1
                                )

                            [69A9997739AC2C3F3EB486B47AE5F798D389AFAC] => Array
                                (
                                    [name] => RBI Increases Risk Weights: A Simple Explainer!
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.VlR_HSKfc3Phl9aDdjslQgHaEK?pid=Api
                                    [datePublished] => 2023-11-25T01:21:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.samco.in/images/samshot_images/rbis-new-risk-weights-rules-simplified_ep54.jpg
                                    [hostPageUrl] => https://www.samco.in/samshots/november-ipo-frenzy-over-inr-7300-crores-raised
                                    [contentSize] => 53602 B
                                    [width] => 714
                                    [height] => 402
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.56547f1d229f7373e197d683763b2542?rik=lpqZd5PKwvPjSw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => CAFA983D897F5EA74B684BE3F3C2CA9377999A96
                                    [accentColor] => C73004
                                )

                            [5C1310343CD86EF31AC29F55474ED96D6818A7E6] => Array
                                (
                                    [name] => Ransomware, AI risks, and malware: Acronis report highlights growing ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.SGzCW3Xkib-E6T2cLXkhNwHaEu?pid=Api
                                    [datePublished] => 2025-02-13T18:18:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://etimg.etb2bimg.com/thumb/msid-118217483,imgsize-60000,width-1200,height=765,overlay-etmanufacturing/news/hi-tech/ransomware-ai-risks-and-malware-acronis-report-highlights-growing-cyberthreats-in-h2-2024.jpg
                                    [hostPageUrl] => https://manufacturing.economictimes.indiatimes.com/news/hi-tech/ransomware-ai-risks-and-malware-acronis-report-highlights-growing-cyberthreats-in-h2-2024/118217483
                                    [contentSize] => 109978 B
                                    [width] => 1200
                                    [height] => 765
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.486cc25b75e489bf84e93d9c2d792137?rik=xTEBQ8ON5j%2bhLA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 6E7A8186D69DE47455F92CA13FE68DC3430131C5
                                    [accentColor] => C38C08
                                )

                            [091B87C35203224D61B07410ACF7865F4BA9931E] => Array
                                (
                                    [name] => Exploring the Perioperative Use of DOACs, off the Beaten Track
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.HvjGdGy4wZ1iWGcQ-PD0swHaEj?pid=Api
                                    [datePublished] => 2024-05-24T09:50:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.mdpi.com/jcm/jcm-13-03076/article_deploy/html/images/jcm-13-03076-g002.png
                                    [hostPageUrl] => https://www.mdpi.com/2077-0383/13/11/3076
                                    [contentSize] => 1385070 B
                                    [width] => 3793
                                    [height] => 2335
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.1ef8c6746cb8c19d62586710f8f0f4b3?rik=kLF4PCUwItQWCw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => E1399AB4F5687FCA01470B16D42230253C78B190
                                    [accentColor] => 37516B
                                )

                            [D5FD9BF7A6C60AFF9216B7351945EBE706A35F98] => Array
                                (
                                    [name] => Restart Your Phone Weekly To Avoid Serious Security Risks Such As Scams ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.ZIuEoWZvrMCRGF99Un0t2gHaEK?pid=Api
                                    [datePublished] => 2024-06-03T16:15:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://images.timesnownews.com/thumb/msid-110674132,width-1280,height-720,resizemode-75/110674132.jpg
                                    [hostPageUrl] => https://www.timesnownews.com/technology-science/restart-your-phone-weekly-to-avoid-serious-security-risks-nsa-advises-article-110674132
                                    [contentSize] => 65125 B
                                    [width] => 1280
                                    [height] => 720
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.648b84a1666facc091185f7d527d2dda?rik=Xd%2b5f2psoP8pYQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 89F53A607EBE5491537B6129FFA06C6A7FB9DF5D
                                    [accentColor] => 260C36
                                )

                            [ACECD82CC102D27F0633DAFAC36F47DBFBE5B834] => Array
                                (
                                    [name] => What is Risk Management? Definition of Risk Management, Risk Management ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.JGcx34T-lytYWYCFcANZbgAAAA?pid=Api
                                    [datePublished] => 2012-07-05T05:39:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://img.etimg.com/thumb/msid-110863385,width-160,height-120/markets/forex/learn-with-etmarkets-how-inflation-impacts-inr-what-currency-traders-should-do.jpg
                                    [hostPageUrl] => https://economictimes.indiatimes.com/definition/risk-management
                                    [contentSize] => 3975 B
                                    [width] => 160
                                    [height] => 120
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.246731df84fe972b585980857003596e?rik=ys6NwhwgLfdgMw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 438B5EBFBD74F63CAFAD3360F72D201CC28DCECA
                                    [accentColor] => 376E82
                                )

                            [1898643C27739F5C404EC94E6D2AA7961C1B95B4] => Array
                                (
                                    [name] => Minecraft players at risk: New malware campaign targets player login ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.j546P3uaNBeZ_E7c9cMAUwHaEK?pid=Api
                                    [datePublished] => 2025-06-20T10:34:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://static.digit.in/Minecraft-.png
                                    [hostPageUrl] => https://www.digit.in/news/gaming/minecraft-players-at-risk-new-malware-campaign-targets-player-login-and-crypto-wallets.html
                                    [contentSize] => 90165 B
                                    [width] => 1280
                                    [height] => 720
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.8f9e3a3f7b9a341799fc4edcf5c30053?rik=gYlGw3I3%2bcUE5A&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 4B59B1C1697AA2D6E49CE404C5F93772C3468981
                                    [accentColor] => BC8B0F
                                )

                            [AFDED8C83AA211137525E7565CE3077B2F07DFB0] => Array
                                (
                                    [name] => OpenClaw Complete Guide: Setup, Security Risks, 341 Mal... - Tamiltech
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.SWplHrIrD8MZtzVQSDzhzgHaEg?pid=Api
                                    [datePublished] => 2026-02-05T09:00:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://cdn.tamiltech.in/media/2026/02/what-is-openclaw-4kiyfezY.webp
                                    [hostPageUrl] => https://tamiltech.in/public/article/openclaw-complete-guide-setup-security-risks-clawhub-malware-2026
                                    [contentSize] => 49948 B
                                    [width] => 1516
                                    [height] => 924
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.496a651eb22b0fc319b73550483ce1ce?rik=%2bu2NjKMqETFXUg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 0BFD70F2B7703EC5657E525731112AA38C8DEDFA
                                    [accentColor] => AD241E
                                )

                            [5C871217D6CC18927D3D7410ACF7865F4BA9931E] => Array
                                (
                                    [name] => Exploring the Perioperative Use of DOACs, off the Beaten Track
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.dqYQ5SMMabuU1BY8Jo8fvAHaEW?pid=Api
                                    [datePublished] => 2024-05-24T09:50:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.mdpi.com/jcm/jcm-13-03076/article_deploy/html/images/jcm-13-03076-g005.png
                                    [hostPageUrl] => https://www.mdpi.com/2077-0383/13/11/3076
                                    [contentSize] => 963835 B
                                    [width] => 3290
                                    [height] => 1936
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.76a610e5230c69bb94d4163c268f1fbc?rik=xXghcW3MgSnX0w&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => E1399AB4F5687FCA0147D3D72981CC6D712178C5
                                    [accentColor] => 136AB8
                                )

                            [C9C27212AE1CBD0148D47410ACF7865F4BA9931E] => Array
                                (
                                    [name] => Exploring the Perioperative Use of DOACs, off the Beaten Track
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.NUf0SNSmVjwdZrHKr-iA0wHaFz?pid=Api
                                    [datePublished] => 2024-05-24T09:50:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.mdpi.com/jcm/jcm-13-03076/article_deploy/html/images/jcm-13-03076-g004.png
                                    [hostPageUrl] => https://www.mdpi.com/2077-0383/13/11/3076
                                    [contentSize] => 933619 B
                                    [width] => 2917
                                    [height] => 2287
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.3547f448d4a6563c1d66b1caafe880d3?rik=nCwnIerB2xCETQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => E1399AB4F5687FCA01474D8410DBC1EA21272C9C
                                    [accentColor] => 0277BB
                                )

                            [5F65FE5982227DE5A8F131C21CEDEAB51F806DF6] => Array
                                (
                                    [name] => डॉलर रेट इन इंडिया और पूर्वानुमान
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.bUvwVAsrEsRuFZ2DvcIh7gHaDt?pid=Api
                                    [datePublished] => 2019-12-30T12:04:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://dollarrupee.in/images/rupee_s.jpg
                                    [hostPageUrl] => https://dollarrupee.in/usd-hindi
                                    [contentSize] => 186290 B
                                    [width] => 1024
                                    [height] => 512
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.6d4bf0540b2b12c46e159d83bdc221ee?rik=9VbvlSgi116KHw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 6FD608F15BAEDEC12C131F8A5ED7222895EF56F5
                                    [accentColor] => 3E568D
                                )

                            [3FAA75A54C5BA64885E20791DBCF876672537653] => Array
                                (
                                    [name] => 7 Necessary Precautions To Take While Travel During COVID
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.rZhC61mI4u-tQtfuhe6xnwHaHa?pid=Api
                                    [datePublished] => 2022-03-04T06:19:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://wordpresscmsprodstor.blob.core.windows.net/wp-cms/2022/03/IG-18.webp
                                    [hostPageUrl] => https://www.bajajfinservhealth.in/articles/travel-during-covid-keep-in-mind-these-7-safety-precautions-when-traveling
                                    [contentSize] => 177966 B
                                    [width] => 1921
                                    [height] => 1921
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.ad9842eb5988e2efad42d7ee85eeb19f?rik=86pXWsS1aoRYLg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 356735276678FCBD19702E58846AB5C45A57AAF3
                                    [accentColor] => B47717
                                )

                            [853B933C192BD51A3755196994EFCEA03DCF0FD3] => Array
                                (
                                    [name] => What Is Nerandomilast (Jascayd)?
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.3NjaJLTl4uh075B7t-ep0wHaHa?pid=Api
                                    [datePublished] => 2025-10-21T18:29:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://images.everydayhealth.com/images/seo-graphic-content-initiative/eh-how-myelofibrosis-affects-the-body-seo-graphics-gs.png
                                    [hostPageUrl] => https://www.everydayhealth.com/lung-respiratory/nerandomilast-jascayd/
                                    [contentSize] => 134667 B
                                    [width] => 1080
                                    [height] => 1080
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.dcd8da24b4e5e2e874ef907bb7e7a9d3?rik=WLM5w5GyXaFzVQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 3DF0FCD30AECFE4996915573A15DB291C339B358
                                    [accentColor] => 02684E
                                )

                            [806467B380DCD6161FED8BAD5FD7308A0D180022] => Array
                                (
                                    [name] => What is malware?
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.BIb4B4j0XiyGcdr9kWgYaAAAAA?pid=Api
                                    [datePublished] => 2025-06-03T17:28:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://cdn.kaspersky.com/se/media/rc/side-banner-coin.gif
                                    [hostPageUrl] => https://www.kaspersky.co.in/resource-center/definitions/what-is-malware
                                    [contentSize] => 111703 B
                                    [width] => 300
                                    [height] => 600
                                    [proxyContentUrl] => https://tse2.mm.bing.net/th/id/OGC.0486f80788f45e2c8671dafd91681868?pid=Api&rurl=https%3a%2f%2fcdn.kaspersky.com%2fse%2fmedia%2frc%2fside-banner-coin.gif&ehk=%2ftneSr3fAXRJzvuDDEAl88kjYE9%2f1rZraW%2beAmabL%2bY%3d
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.0486f80788f45e2c8671dafd91681868?rik=CEZ2OwjNbWHx3g&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 220081D0A8037DF5DAB8DEF1616DCD083B764608
                                    [accentColor] => 118DBA
                                )

                            [C68941BA5C672C7DBB78065967D10F045599066B] => Array
                                (
                                    [name] => Риск-менеджмент. Как управлять собственными деньгами. — Teletype
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.0WYQBj44SWu_K9Vg_cdwhwHaEN?pid=Api
                                    [datePublished] => 2023-06-03T13:06:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://centerpointsecurities.com/wp-content/uploads/2022/05/Risk-Reward-Ratios.jpg
                                    [hostPageUrl] => https://teletype.in/@cryptolord01/riskmanagement
                                    [contentSize] => 15638 B
                                    [width] => 566
                                    [height] => 322
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.d16610063e38496bbf2bd560fdc77087?rik=bJgUq8V2wte7hw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => B660995540F01D76956087BBD7C276C5AB14986C
                                    [accentColor] => BC0F16
                                )

                            [E40DC0C19F8BA8E2E70B98691954699442058BD8] => Array
                                (
                                    [name] => i-FRMS © Fraud Risk Management System | IDBI Intech Ltd
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.NikJS8vmo1w0OWRELDjs2AHaHW?pid=Api
                                    [datePublished] => 2022-05-12T01:07:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://idbiintech.com/images/fraud-risk-management-cycle.jpg
                                    [hostPageUrl] => https://idbiintech.com/fraud-risk-management-system.asp
                                    [contentSize] => 39660 B
                                    [width] => 773
                                    [height] => 767
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.3629094bcbe6a35c343964442c38ecd8?rik=TtAMHPm4ii5%2bsA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 8DB85024499645919689B07E2E8AB8F91C0CD04E
                                    [accentColor] => 28C704
                                )

                            [039F68CDD959E59ECDB4C49412BAA11438B3D39E] => Array
                                (
                                    [name] => Liberalization of FEMA Regulations for encouraging settlement of cross ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.22il7HXE4UU2YzGlKY-yXQHaE8?pid=Api
                                    [datePublished] => 2025-03-31T04:30:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.ey.com/content/dam/ey-unified-site/ey-com/en-in/insights/ai/images/ey-generative-ai-risk-and-governance-framework.jpeg
                                    [hostPageUrl] => https://www.ey.com/en_in/technical/alerts-hub/2025/03/liberalization-of-fema-regulations-for-encouraging-settlement-of-cross-border-transactions
                                    [contentSize] => 850919 B
                                    [width] => 3840
                                    [height] => 2560
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.db68a5ec75c4e145366331a5298fb25d?rik=MPmG3J2VXuncSw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => E93D3B83411AAB21494C4BDCE95E959DDC86F930
                                    [accentColor] => BC650F
                                )

                            [3EF892D110F007B7662D93672893B592C0E125F1] => Array
                                (
                                    [name] => Zoom,Zoom - Malware : జూమ్‌ ద్వారా స్మార్ట్‌ఫోన్‌లు, కంప్యూటర్లకు ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.FouFgItCHB5dqDGHPHzgygHaEL?pid=Api
                                    [datePublished] => 2022-05-30T05:16:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://telugu.samayam.com/thumb/91882254/zoom-malware-91882254.jpg?imgsize-255213&width=700&height=394&resizemode=75
                                    [hostPageUrl] => https://telugu.samayam.com/tech/news/zoom-has-a-new-malware-threat-that-puts-your-android-windows-iphone-mac-devices-at-risk-know-how-to-safe/articleshow/91882259.cms
                                    [contentSize] => 75423 B
                                    [width] => 699
                                    [height] => 394
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.168b85808b421c1e5da831873c7ce0ca?rik=448pHQEPcHtm0g&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 1F521E0C295B39827639D2667B700F011D298FE3
                                    [accentColor] => 054DC6
                                )

                            [E9B6798C5A4C69AA79E1017702EF6DDE2C5C6477] => Array
                                (
                                    [name] => Leading Financial market data & Forecast provider | Ticker
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.opLqaSaZafLfGMPM0B0-AQHaGN?pid=Api
                                    [datePublished] => 2015-02-25T19:00:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.tickermarket.com/assets/images/stories/Story5.jpg
                                    [hostPageUrl] => https://www.tickermarket.com/
                                    [contentSize] => 104692 B
                                    [width] => 940
                                    [height] => 788
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.a292ea69269969f2df18c3ccd01d3e01?rik=nmuXyKXElqqXHg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 7746C5C2EDD6FE2077101E97AA96C4A5C8976B9E
                                    [accentColor] => 306F9B
                                )

                            [561AF9ECA2D025CE648B0D414B59404D7D813CEA] => Array
                                (
                                    [name] => CYBERSECURITY IN INDIA
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.oJndDbtMJFoejVTUyP7ndAHaLC?pid=Api
                                    [datePublished] => 2021-01-23T21:43:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.iasgyan.in/ig-uploads/images/Screenshot_20201221-081513__01.jpg
                                    [hostPageUrl] => https://www.iasgyan.in/blogs/cyber-security-in-india
                                    [contentSize] => 375296 B
                                    [width] => 992
                                    [height] => 1478
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.a099dd0dbb4c245a1e8d54d4c8fee774?rik=ZaGfzioNUuxGuA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => AEC318D7D40495B414D0B846EC520D2ACE9FA165
                                    [accentColor] => 031F5F
                                )

                            [3339EE206529E977351D7C5BDA7D15F6C929BDD7] => Array
                                (
                                    [name] => Stopping aspirin when on warfarin lowers risk of bleeding, finds JAMA study
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.LwTXecQn4miXw3YenAdiwwHaEv?pid=Api
                                    [datePublished] => 2022-09-21T15:00:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://medicaldialogues.in/h-upload/2022/09/20/185889-aspirin.jpg
                                    [hostPageUrl] => https://medicaldialogues.in/medicine/news/stopping-aspirin-when-on-warfarin-lowers-risk-of-bleeding-finds-jama-study-99420
                                    [contentSize] => 109362 B
                                    [width] => 1500
                                    [height] => 960
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.2f04d779c427e26897c3761e9c0762c3?rik=M5PuAlaSnndT0Q&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 7DDB929C6F51D7ADB5C7D153779E925602EE9333
                                    [accentColor] => A1892A
                                )

                            [C61813373D6617300EAFBEC523613F2C350C98C1] => Array
                                (
                                    [name] => Cyber Security Advisory: Data Wiper Malware
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.Me0_LMojgxBVdRuFFugI8gHaDt?pid=Api
                                    [datePublished] => 2022-05-26T09:34:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://taxguru.in/wp-content/uploads/2022/05/Cyber-Security-Advisory-Data-Wiper-Malware.jpg
                                    [hostPageUrl] => https://taxguru.in/corporate-law/cyber-security-advisory-data-wiper-malware.html
                                    [contentSize] => 14430 B
                                    [width] => 600
                                    [height] => 300
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.31ed3f2cca23831055751b8516e808f2?rik=bIExc9NmcQPg%2bg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 1C89C053C2F316325CEBFAE0037166D37331816C
                                    [accentColor] => BF0C10
                                )

                            [B0F57C26AA105CC47476B5D2741DBA597EB86F55] => Array
                                (
                                    [name] => 10 Million Passwords Stolen and Released; Check if Yours is One of Them ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.gUZAfyFsGr1Y7NHP1RXffAHaD4?pid=Api
                                    [datePublished] => 2015-02-17T10:52:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://data1.ibtimes.co.in/en/full/561017/india-tops-list-golroted-malware-attacks-what-are-risks-how-protect-yourself-your-business.jpg?w=800&h=420
                                    [hostPageUrl] => https://www.ibtimes.co.in/10-million-passwords-stolen-released-check-if-yours-one-them-623758
                                    [contentSize] => 62077 B
                                    [width] => 800
                                    [height] => 420
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.8146407f216c1abd58ecd1cfd515df7c?rik=C1%2fHYqoBxUxHZw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 55F68BE795ABD1472D5B67474CC501AA62C75F0B
                                    [accentColor] => 0ABEC1
                                )

                            [3D8154F3397F8E08515ADBA7EB9D04E3875EE2E9] => Array
                                (
                                    [name] => Online Malware Detection | ESET
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.fKeqyduT-OKrSU9dNgSSdAAAAA?pid=Api
                                    [datePublished] => 2017-01-01T00:15:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://web-assets.eset.com/fileadmin/_processed_/0/5/csm_threat-analysis-grey_b8ef86f61a.png
                                    [hostPageUrl] => https://www.eset.com/in/home/online-scanner/
                                    [contentSize] => 4707 B
                                    [width] => 80
                                    [height] => 80
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.7ca7aac9db93f8e2ab494f5d36049274?rik=0xhFP5P36IAVpQ&pid=ImgRaw&r=0
                                    [isTransparent] => 1
                                    [imageId] => 9E2EE5783E40D9BE7ABDA51580E8F7933F4518D3
                                    [accentColor] => 434E57
                                )

                            [9DBCA664745B35DD64208A88475698F584B983E9] => Array
                                (
                                    [name] => Stocks: Will 3 ‘I’s halt earnings revival hopes? These stocks are at ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.m3Gulp8PWS0bvE4P-bSIrwHaDw?pid=Api
                                    [datePublished] => 2018-08-29T06:32:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://img.etimg.com/photo/msid-65589492,quality-100/table-1-inr.jpg
                                    [hostPageUrl] => https://economictimes.indiatimes.com/markets/stocks/news/will-3-is-halt-earning-revival-hopes-these-stocks-are-at-risk/articleshow/65589512.cms
                                    [contentSize] => 88021 B
                                    [width] => 870
                                    [height] => 442
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.9b71ae969f0f592d1bbc4e0ff9b488af?rik=2ctqRke1U91GAg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 9E389B485F89657488A80246DD53B547466ACBD9
                                    [accentColor] => 7A6651
                                )

                            [143C84A7BA86620922FEDAD4F9790C828448BFF5] => Array
                                (
                                    [name] => IPL 2021: Brad Hogg feels RCB have taken a huge risk by buying Glenn ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.L642ItCyF8LefcqEUAY5IwHaE7?pid=Api
                                    [datePublished] => 2021-02-20T04:23:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://statico.sportskeeda.com/editor/2021/02/c25bc-16137904876412-800.jpg
                                    [hostPageUrl] => https://www.sportskeeda.com/cricket/news-ipl-2021-brad-hogg-feels-rcb-taken-huge-risk-going-for-glenn-maxwell-huge-price
                                    [contentSize] => 50344 B
                                    [width] => 800
                                    [height] => 533
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.2fae3622d0b217c2de7dca8450063923?rik=QcNIeqtoJpAi7w&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 5FFB844828C0979F4DADEF22902668AB7A48C341
                                    [accentColor] => 157249
                                )

                            [C4BFFDC3601DB54992A41FD7CD585FEF85B458D8] => Array
                                (
                                    [name] => What's alternative therapies? Understanding benefits, risks, and ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.MpMqNuly3eGfeeE1gKpABgAAAA?pid=Api
                                    [datePublished] => 2024-04-13T07:37:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://img.etimg.com/thumb/msid-126678082,imgsize-1250031,width-138,height-104/prime/transportation/inr22-cr-fine-on-inr80k-cr-revenue-airline-what-indigos-record-penalty-really-means.jpg
                                    [hostPageUrl] => https://economictimes.indiatimes.com/news/how-to/whats-alternative-therapies-understanding-benefits-risks-and-differences-from-traditional-medication/articleshow/109265940.cms
                                    [contentSize] => 1828 B
                                    [width] => 138
                                    [height] => 104
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.32932a36e972dde19f79e13580aa4006?rik=TPvfPAbRW5QpSg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 8D854B58FEF585DC7DF14A29945BD1063CDFFB4C
                                    [accentColor] => 2B3C6A
                                )

                            [FDAE5FB7D8F01CEBE36CFA984C1AFAB08972FEFF] => Array
                                (
                                    [name] => Anticoagulation in Acute Pulmonary Embolism: Which Drug? How Long ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.iMDKiulbxTdYiVEtDnIl1AHaFh?pid=Api
                                    [datePublished] => 2023-04-16T12:24:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.universimed.com/__image/a/286905/alias/xl/v/2/c/10/ar/flexible/fn/Fig%201.jpg
                                    [hostPageUrl] => https://www.universimed.com/ch/article/kardiologie-gefaessmedizin/anticoagulation-acute-pulmonary-embolism-which-drug-how-long-286902
                                    [contentSize] => 68533 B
                                    [width] => 854
                                    [height] => 637
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.88c0ca8ae95bc5375889512d0e7225d4?rik=3%2br1e40Pwb4%2bxg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => FFEF27980BAFA1C489AFC63EBEC10F8D7BF5EADF
                                    [accentColor] => BC0F16
                                )

                            [753A2DD0CB4AE74C613BC06F08892F8E41EED344] => Array
                                (
                                    [name] => Breaking down revenue streams of Reliance Industries
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.sqLFWAPo4MQRxclwhTF_SQHaFy?pid=Api
                                    [datePublished] => 2020-05-01T09:32:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://d3jlwjv6gmyigl.cloudfront.net/images/2020/04/Revenue-streams-of-Reliance-Industries.jpg
                                    [hostPageUrl] => https://finshots.in/infographic/revenue-streams-of-reliance-industries/
                                    [contentSize] => 57127 B
                                    [width] => 680
                                    [height] => 532
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.b2a2c55803e8e0c411c5c97085317f49?rik=V6PSDbykfsQWsw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 443DEE14E8F29880F60CB316C47EA4BC0DD2A357
                                    [accentColor] => 173F89
                                )

                            [A7C6E80623C23E76DD9F9DED4FA2DA6891E3EAC2] => Array
                                (
                                    [name] => How To Unlock The Heretic Class in Risk Of Rain 2 | Gurugamer.com
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.-wIK-Ky0vXwZ8ZfLoQbyOAHaEH?pid=Api
                                    [datePublished] => 2024-09-08T03:32:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://img.gurugamer.com/resize/740x-/photo_galleries/2024/09/08/how-to-unlock-the-heretic-class-in-risk-of-rain-2-4e67.png
                                    [hostPageUrl] => https://gurugamer.com/pc-console/how-to-unlock-the-heretic-class-in-risk-of-rain-2-24099
                                    [contentSize] => 124793 B
                                    [width] => 740
                                    [height] => 412
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.fb020af8acb4bd7c19f197cba106f238?rik=emyOYDIs42fd%2bQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 2CAE3E1986AD2AF4DED9F9DD67E32C32608E6C7A
                                    [accentColor] => 8E2023
                                )

                            [793F9A7ABAE471F9913AD3A1A1CAADF6F0958F21] => Array
                                (
                                    [name] => Best Free Trojan Virus Removal Solutions You Should Try in 2026
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.0ua_y9nYhK7zUrSn7q6-AwHaD5?pid=Api
                                    [datePublished] => 2023-12-11T16:25:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://images.wondershare.com/recoverit/article/best-free-trojan-remover.jpg
                                    [hostPageUrl] => https://recoverit.wondershare.com/windows-computer-tips/free-trojan-remover.html
                                    [contentSize] => 31860 B
                                    [width] => 1328
                                    [height] => 700
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.d2e6bfcbd9d884aef352b4a7eeaebe03?rik=l%2fOpp6tOF58Zow&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 12F8590F6FDAAC1A1A3DA3199F174EABA7A9F397
                                    [accentColor] => BB6210
                                )

                            [ACAE7DD3FFD6B3CBAB6A72BAAD1CDC9E0B95A2B9] => Array
                                (
                                    [name] => Amber: Fossil Resin, Deposits, Inclusions & Uses I UPSC
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.i0xqQlRCR3agXaAElMjAUAHaHa?pid=Api
                                    [datePublished] => 2024-11-16T09:25:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://iasgyan.sgp1.digitaloceanspaces.com/imagedb/GLOBAL_RISKS_REPORT_2025.jpg
                                    [hostPageUrl] => https://www.iasgyan.in/daily-current-affairs/amber
                                    [contentSize] => 277495 B
                                    [width] => 1431
                                    [height] => 1431
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.8b4c6a4254424776a05da00494c8c050?rik=yurXPf9tO7y6pg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 9B2A59B0E9CDC1DAAB27A6BABC3B6DFF3DD7EACA
                                    [accentColor] => 008248
                                )

                            [F9A6595088162FC12F190DC33F1F4B81EBC2097C] => Array
                                (
                                    [name] => SwiftSlicer: New destructive wiper malware strikes Ukraine
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.DWY_AuXwEk0tnZs3OndbrQHaEK?pid=Api
                                    [datePublished] => 2023-01-27T18:06:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://web-assets.esetstatic.com/tn/-x700/wls/2023/01/ukraine-swiftslicer-wiper-malware-ukraine.jpg
                                    [hostPageUrl] => https://www.welivesecurity.com/2023/01/27/swiftslicer-new-destructive-wiper-malware-ukraine/
                                    [contentSize] => 392516 B
                                    [width] => 1244
                                    [height] => 700
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.0d663f02e5f0124d2d9d9b373a775bad?rik=n2qVBYhh8hzykQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => C7902CBE18B4F1F33CD091F21CF2618805956A9F
                                    [accentColor] => 10446B
                                )

                            [9C5EE7C62AD387DE54597410ACF7865F4BA9931E] => Array
                                (
                                    [name] => Exploring the Perioperative Use of DOACs, off the Beaten Track
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.rRpT-sv2q4RbloJj_rNaiAHaEH?pid=Api
                                    [datePublished] => 2024-05-24T09:50:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.mdpi.com/jcm/jcm-13-03076/article_deploy/html/images/jcm-13-03076-g003.png
                                    [hostPageUrl] => https://www.mdpi.com/2077-0383/13/11/3076
                                    [contentSize] => 1048158 B
                                    [width] => 3763
                                    [height] => 2090
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.ad1a53facbf6ab845b968263feb35a88?rik=yeV%2bbKI9eO1FlQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => E1399AB4F5687FCA01479545ED783DA26C7EE5C9
                                    [accentColor] => A82325
                                )

                            [98AA70DAF6BE5C38B234B603018702EB747F3DB9] => Array
                                (
                                    [name] => SHOP ALL – EPIC CLO OFFICIAL
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.2luKK_eYAIdDm1PqW-ZoQwHaLJ?pid=Api
                                    [datePublished] => 2024-04-06T20:41:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => http://epiccloofficial.com/cdn/shop/files/Copy_of_Product_photo_resolution_77f6dbb2-c9b4-4bfd-934c-4787b38e63aa.png?v=1740332367
                                    [hostPageUrl] => https://epiccloofficial.com/collections/view-collection
                                    [contentSize] => 1529916 B
                                    [width] => 2160
                                    [height] => 3250
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.da5b8a2bf7980087439b53ea5be66843?rik=iaoHrW%2frxYMrQw&riu=http%3a%2f%2fepiccloofficial.com%2fcdn%2fshop%2ffiles%2fCopy_of_Product_photo_resolution_77f6dbb2-c9b4-4bfd-934c-4787b38e63aa.png%3fv%3d1740332367&ehk=qBi4Vhay1%2fijMRfcaN7xVeECZvcqQN1NWdSIvpqSh14%3d&risl=&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 9BD3F747BE207810306B432B83C5EB6FAD07AA89
                                    [accentColor] => 379437
                                )

                            [A64C56FACC835D085225C165DC6DC87B433FFB4A] => Array
                                (
                                    [name] => How to manage privacy risks and customer impact following a data breach ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.YHEXxPhCCdSN5qdrx3OopAHaE8?pid=Api
                                    [datePublished] => 2025-05-16T05:11:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://r.fashionunited.com/heMhYTJ91U_sKM2oNMh2hLZdtIl05l0BT-6F5dfCdU8/resize:fit:1200:630:0/gravity:ce/quality:70/aHR0cHM6Ly9mYXNoaW9udW5pdGVkLmNvbS9pbWcvdXBsb2FkLzIwMjUvMDUvMTUvZGlvci1sdW5hLXNob3QtMDUtMTI3NS12My1yZ2ItNjZ6cHdpdGItMjAyNS0wMS0xNi0xNng3NzZ1cS0yMDI1LTA1LTE1LmpwZWc.jpeg
                                    [hostPageUrl] => https://fashionunited.in/news/retail/how-to-manage-privacy-risks-and-customer-impact-following-a-data-breach-like-diors/2025051549815
                                    [contentSize] => 48333 B
                                    [width] => 945
                                    [height] => 630
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.607117c4f84209d48de6a76bc773a8a4?rik=asRlr8w41YAlUg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => A4BFF334B78CD6CD561C522580D538CCAF65C46A
                                    [accentColor] => 8C6340
                                )

                            [A6C145D36AF3B692786EEE7D7C2DCE918B7FB630] => Array
                                (
                                    [name] => Classification and Analysis of Malicious Code Detection Techniques ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.NKbKHFzNUn3Xi32N2CveTQHaDT?pid=Api
                                    [datePublished] => 2023-02-23T15:34:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.mdpi.com/applsci/applsci-13-02894/article_deploy/html/images/applsci-13-02894-g001.png
                                    [hostPageUrl] => https://www.mdpi.com/2076-3417/13/5/2894
                                    [contentSize] => 870594 B
                                    [width] => 3733
                                    [height] => 1666
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.34a6ca1c5ccd527dd78b7d8dd82bde4d?rik=ahxUPaY%2faymH5g&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 036BF7B819ECD2C7D7EEE687296B3FA63D541C6A
                                    [accentColor] => CB5300
                                )

                            [AC5B3C444D187F9D3875A8AB1FCFCDEDCE4A9BB3] => Array
                                (
                                    [name] => Administration of Warfarin Inhibits the Development of Cerulein-Induced ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.7iVcwzYi6Ckk9jHT0C03cAHaE0?pid=Api
                                    [datePublished] => 2023-06-06T07:49:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.mdpi.com/biomolecules/biomolecules-13-00948/article_deploy/html/images/biomolecules-13-00948-g001.png
                                    [hostPageUrl] => https://www.mdpi.com/2218-273X/13/6/948
                                    [contentSize] => 47258 B
                                    [width] => 3698
                                    [height] => 2408
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.ee255cc33622e82924f631d3d02d3770?rik=yrXDRNSB99mDVw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 3BB9A4ECDEDCFCF1BA8A5783D9F781D444C3B5CA
                                    [accentColor] => A0A000
                                )

                            [57978BC7B78758DBE502A7949D7951DF5DF6BEF7] => Array
                                (
                                    [name] => Understanding Risk & Return
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.8KEtgQ9JQPZVBN_jFNUPZQAAAA?pid=Api
                                    [datePublished] => 2022-03-14T14:10:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.barodabnpparibasmf.in/assets/images/understanding-risk-return-img1.jpg
                                    [hostPageUrl] => https://www.barodabnpparibasmf.in/learn-invest/understanding-risk-return
                                    [contentSize] => 5800 B
                                    [width] => 450
                                    [height] => 284
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.f0a12d810f4940f65504dfe314d50f65?rik=dXm4fHt4hb1eIA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 7FEB6FD5FD1597D9497A205EBD85787B7CB87975
                                    [accentColor] => C1380A
                                )

                            [1F6657233B1DC18EDE6C9D13EB3F4B091701F24D] => Array
                                (
                                    [name] => Fracture risk higher with warfarin compared to DOACs: JAMA
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.Nmk_M-5wHy7jnW9mnHVvmAAAAA?pid=Api
                                    [datePublished] => 2019-11-30T06:23:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://speciality.medicaldialogues.in/wp-content/uploads/2017/03/warfarin.jpg
                                    [hostPageUrl] => https://speciality.medicaldialogues.in/newer-doacs-versus-warfarin-lowers-risk-of-fracture-in-atrial-fibrillation-patients-jama-direct-oral-anticoagulants/
                                    [contentSize] => 7586 B
                                    [width] => 366
                                    [height] => 225
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.36693f33ee701f2ee39d6f669c756f98?rik=8WZ1MrPRHOjtxg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => D42F107190B4F3BE31D9C6EDE81CD1B3327566F1
                                    [accentColor] => A7244C
                                )

                            [1AFDC38E670687963E18365872699CDF96A52F59] => Array
                                (
                                    [name] => Android vs iOS Privacy and Security 2026: The Truth Most Users Don’t Know
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.YEGyShY2WRihW1yPz4ZTRwEsCo?pid=Api
                                    [datePublished] => 2026-02-20T05:26:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://newsd.in/wp-content/uploads/2024/01/Data-Privacy-Day-2024-History-FAQs-Dates-and-Activities.jpg
                                    [hostPageUrl] => https://newsd.in/android-vs-ios-privacy-and-security-2026-the-truth-most-users-dont-know/
                                    [contentSize] => 91125 B
                                    [width] => 1600
                                    [height] => 900
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.6041b24a16365918a15b5c8fcf865347?rik=od886HZgeGnjgQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 95F25A69FDC99627856381E369786076E83CDFA1
                                    [accentColor] => 2D959E
                                )

                            [277215DF65A275E7AE6593B08937679AE225E633] => Array
                                (
                                    [name] => Hong Kong Dollar Indian Rupee (HKD INR) Converter - Investing.com India
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.bs-qGg4-_xs31OwprU0AqQAAAA?pid=Api
                                    [datePublished] => 2017-02-18T11:39:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://i-invdn-com.investing.com/news/moved_small-LYNXNPEL370OT_L.jpg
                                    [hostPageUrl] => https://in.investing.com/currencies/hkd-inr-converter
                                    [contentSize] => 4168 B
                                    [width] => 150
                                    [height] => 100
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.6ecfaa1a0e3eff1b37d4ec29ad4d00a9?rik=cidR%2fVYqV37qVg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 336E522EA97673980B3956EA7E572A56FD512772
                                    [accentColor] => 2F669C
                                )

                            [7FDBFDBCF100AD356951B59CAEFFF3BFBDBCA471] => Array
                                (
                                    [name] => GDP expected to grow 6-6.5 per cent in FY24: BoB Eco Research
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.-LGJ1D_IZ4JDk5YlOcCA5AHaEK?pid=Api
                                    [datePublished] => 2023-05-29T05:48:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://wpassets.adda247.com/wp-content/uploads/multisite/sites/5/2023/05/29111045/sbi.jpeg
                                    [hostPageUrl] => https://currentaffairs.adda247.com/gdp-expected-to-grow-6-6-5-per-cent-in-fy24-bob-eco-research/
                                    [contentSize] => 166462 B
                                    [width] => 1280
                                    [height] => 720
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.f8b189d43fc867824393962539c080e4?rik=973fyx8A2lOWFQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 174ACBDBFB3FFFEAC95B159653DA001FCBDFBDF7
                                    [accentColor] => 0F7CBC
                                )

                            [0981FCCCFBB4E2DC1EBB72D8A28A62BCEEE61BA3] => Array
                                (
                                    [name] => Artificial Intelligence Model for Risk Management in Healthcare ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.QQee5VsE57QVlgeXNNfayQHaFz?pid=Api
                                    [datePublished] => 2022-12-27T07:37:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://pub.mdpi-res.com/sustainability/sustainability-15-00420/article_deploy/html/images/sustainability-15-00420-g001-550.jpg?1672126426
                                    [hostPageUrl] => https://www.mdpi.com/2071-1050/15/1/420
                                    [contentSize] => 95780 B
                                    [width] => 550
                                    [height] => 431
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.41079ee55b04e7b41596079734d7dac9?rik=kBjPzL9LLs3huw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 3AB16EEECB26A82A8D27BBE1CD2E4BBFCCCF1890
                                    [accentColor] => CAB001
                                )

                            [0970B74250AC233011218AE582E3FC63D20D5CAA] => Array
                                (
                                    [name] => Risk of AI - PwC India
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.1wnbKvEQFdda8RD_wFYGnwHaEg?pid=Api
                                    [datePublished] => 2021-01-08T10:55:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.pwc.in/assets/images/consulting/technology/data-and-analytics/ai/infographics-7.jpg
                                    [hostPageUrl] => https://www.pwc.in/consulting/technology/data-and-analytics/ai-an-opportunity-amidst-a-crisis/risk-of-ai.html
                                    [contentSize] => 53475 B
                                    [width] => 655
                                    [height] => 399
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.d709db2af11015d75af110ffc056069f?rik=kAd7JAXKMgMREg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => AAC5D02D36CF3E285EA812110332CA05247B0790
                                    [accentColor] => C37508
                                )

                            [25DBF5D02196E9467C38876782785750914FCF69] => Array
                                (
                                    [name] => Disaster Risk Management Plan -Temple Complex at Jejuri | CEPT - Portfolio
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.CFHvvQ6dGMZ10hGgKpA3qQHaFP?pid=Api
                                    [datePublished] => 2022-09-28T05:45:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://portfolio.cept.ac.in/assets/supportive_projects/visuals/2022/CR4051/visual_20220721134603_02_understandingrisks.jpg
                                    [hostPageUrl] => https://portfolio.cept.ac.in/student/anagha-l-pcr20038/disaster-risk-management-plan-temple-complex-at-jejuri-spring-2022-cr4051-pcr20038
                                    [contentSize] => 225659 B
                                    [width] => 1600
                                    [height] => 1131
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.0851efbd0e9d18c675d211a02a9037a9?rik=Ur1fDRJpnmTHgw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 96FCF41905758728767883C7649E69120D5FBD52
                                    [accentColor] => 434343
                                )

                            [66AEFC2F13DD6DB54631F13F1A7B7FD5C82EAF90] => Array
                                (
                                    [name] => What is Cryptojacking & How does it work?
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.4AqusWwve71p36FbkbLaLQHaEL?pid=Api
                                    [datePublished] => 2021-04-03T23:34:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.kaspersky.co.in/content/en-in/images/repository/isc/2021/what_is_cryptojacking_image2_710x400px_300dpi.jpg
                                    [hostPageUrl] => https://www.kaspersky.co.in/resource-center/definitions/what-is-cryptojacking
                                    [contentSize] => 59272 B
                                    [width] => 710
                                    [height] => 400
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.e00aaeb16c2f7bbd69dfa15b91b2da2d?rik=ZurP8jHd1ltkEw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 09FAE28C5DF7B7A1F31F13645BD6DD31F2CFEA66
                                    [accentColor] => 3B7590
                                )

                            [8DA564154397CC83737801D051DD4C6BED54E3A1] => Array
                                (
                                    [name] => Use of NOACs in diabetes with AF tied to decreased risk of osteoporotic ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.yTYhDz4Dkgc-VWKfLX3_cAHaEc?pid=Api
                                    [datePublished] => 2022-10-05T18:46:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://medicaldialogues.in/h-upload/2020/04/28/127915-anticoagulants.webp
                                    [hostPageUrl] => https://medicaldialogues.in/diabetes-endocrinology/news/use-of-noacs-in-diabetes-with-af-tied-to-decreased-risk-of-osteoporotic-fractures-compared-to-warfarin-100173
                                    [contentSize] => 21574 B
                                    [width] => 1500
                                    [height] => 900
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.c936210f3e0392073e55629f2d7dff70?rik=2FpGUTR5zDg3hw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 1A3E45DEB6C4DD150D10873738CC793451465AD8
                                    [accentColor] => 86441A
                                )

                            [482A51636050C1D4A79DD95D7649CE66C019D2C8] => Array
                                (
                                    [name] => EPIC | Rock Fashion India – EPIC CLO OFFICIAL
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.4sJN9VNNs9_02lwBFezYEgHaI_?pid=Api
                                    [datePublished] => 2023-07-21T17:03:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://epiccloofficial.com/cdn/shop/files/Untitled_design_1_5f0a10df-8fb9-4db4-a791-7eefcf9bf706_600x.png?v=1741870190
                                    [hostPageUrl] => https://epiccloofficial.com/
                                    [contentSize] => 572530 B
                                    [width] => 600
                                    [height] => 729
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.e2c24df5534db3dff4da5c0115ecd812?rik=hKIVNgYFHE162Q&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 8C2D910C66EC9467D59DD97A4D1C05063615A284
                                    [accentColor] => 61463B
                                )

                            [9FD418E99C70C563082249FE138DB05AD750DD03] => Array
                                (
                                    [name] => ডেলিভারি ওটিপি ও এনসিওরেন্স সাইবার ক্রাইম... জালিয়াতির নতুন দুটি ফাঁদ ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.KoSdLZX_JJ2feHN_sUDutAHaEJ?pid=Api
                                    [datePublished] => 2025-02-06T17:41:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://img.helpnetsecurity.com/wp-content/uploads/2023/09/25200942/online-fraud.jpg
                                    [hostPageUrl] => https://bengalfusion.in/how-protect-yourself-from-online-fraud
                                    [contentSize] => 325849 B
                                    [width] => 1456
                                    [height] => 816
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.2a849d2d95ff249d9f78737fb140eeb4?rik=%2bU2BnskHXDaAIg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 30DD057DA50BD831EF942280365C07C99E814DF9
                                    [accentColor] => A43627
                                )

                            [DA59C41498708884360A597F21E8B3FAB74605BC] => Array
                                (
                                    [name] => Net Protector Antivirus – Download Best Antivirus for PC & Mobiles
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP._2iVGwHeX4TIbLJmZMUrXwHaE8?pid=Api
                                    [datePublished] => 2017-09-01T08:30:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://blogs.npav.net/media/magefan_blog/img_2_.png
                                    [hostPageUrl] => https://blogs.npav.net/
                                    [contentSize] => 233188 B
                                    [width] => 499
                                    [height] => 333
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.ff68951b01de5f84c86cb26664c52b5f?rik=rZVMQYkHiEhjoA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => CB50647BAF3B8E12F795A06348880789414C95AD
                                    [accentColor] => CC9500
                                )

                            [63FAE2612408E183D50CE22C8E2F23BF8B4BC7DD] => Array
                                (
                                    [name] => Ex-Fed Chair Ben Bernanke Warns Bitcoin (BTC) Faces Two Massive Risks ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.Y9hkUMZ6DbsN29Dhg1xqAwHaEV?pid=Api
                                    [datePublished] => 2022-05-19T18:56:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://dailyhodl.com/wp-content/uploads/2022/05/BTC-Faces-Two-Massive.jpg
                                    [hostPageUrl] => https://cryptopanic.com/news/15258072/Ex-Fed-Chair-Ben-Bernanke-Warns-Bitcoin-BTC-Faces-Two-Massive-Risks-That-Investors-Should-Be-Aware-Of
                                    [contentSize] => 84252 B
                                    [width] => 1365
                                    [height] => 800
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.63d86450c67a0dbb0ddbd0e1835c6a03?rik=Nq8uFkKAHjhdwA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => DD7CB4B8FB32F2E8C22EC05D381E8042162EAF36
                                    [accentColor] => 000751
                                )

                            [7C55CC03758279F83B95FEAC23C9E75BEF106CB2] => Array
                                (
                                    [name] => Warf-5 Tablet: Uses, Side-effects, Price, Dosage & More Info - PharmEasy
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.0uqyJUyRvgj3Ob8reIKrfAHaDG?pid=Api
                                    [datePublished] => 2020-03-20T13:23:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://cdn01.pharmeasy.in/dam/products/D03619/warf-5mg-tablet-30s-1-1641537933.jpg
                                    [hostPageUrl] => https://pharmeasy.in/online-medicine-order/warf-5mg-tablet-30-s-229350
                                    [contentSize] => 43961 B
                                    [width] => 1301
                                    [height] => 545
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.d2eab2254c91be08f739bf2b7882ab7c?rik=x1XMMFcol4%2bzWQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 2BC601FEB57E9C32CAEF59B38F97285730CC55C7
                                    [accentColor] => BA6111
                                )

                            [8A630D95501770154E0C58F153887882FDDE86EE] => Array
                                (
                                    [name] => Search Result for Microsoft-Edge-Browser – TechGig
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.LUtRKf7CgO_jIiM7gA2zhQHaDw?pid=Api
                                    [datePublished] => 2023-03-24T17:28:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://contentstatic.techgig.com/photo/97373455/Indias-CERT-In-beware-Microsoft-users-about-new-malware-risk.jpg
                                    [hostPageUrl] => https://content.techgig.com/searchresult.cms?query=Microsoft-Edge-Browser
                                    [contentSize] => 55952 B
                                    [width] => 1118
                                    [height] => 568
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.2d4b5129fec280efe322233b800db385?rik=qDbQWQVxB1HkwA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => EE68EDDF288788351F85C0E45107710559D036A8
                                    [accentColor] => 124572
                                )

                            [682D1178FED790D20E9588B8C8216E6DDAC17293] => Array
                                (
                                    [name] => First Advance Estimates of India’s GDP: What are They and What do the ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.sbtStbNWOvmmZMpGRW-NDwHaEK?pid=Api
                                    [datePublished] => 2025-06-11T15:54:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://vajiramandravi.com/current-affairs/wp-content/uploads/2025/04/gdp_advance_estimates.webp
                                    [hostPageUrl] => https://vajiramandravi.com/current-affairs/gdp-advance-estimates/
                                    [contentSize] => 56010 B
                                    [width] => 1600
                                    [height] => 900
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.b1bb52b5b3563af9a664ca46456f8d0f?rik=htIRh%2b99CS3gWQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 39271CADD6E6128C8B8859E02D097DEF8711D286
                                    [accentColor] => C46008
                                )

                            [99579AD42AB168326D6DD7F6874CD13B3951C1BD] => Array
                                (
                                    [name] => Gold Spot Indian Rupee (XAU INR) Converter - Investing.com India
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.K2FXZDbTFuzIHwud_7EB5QAAAA?pid=Api
                                    [datePublished] => 2022-03-16T07:16:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://d1-invdn-com.investing.com/company_logo/498bb2498fbc73656d8d309c40f3589c.jpg
                                    [hostPageUrl] => https://in.investing.com/currencies/xau-inr-converter
                                    [contentSize] => 63002 B
                                    [width] => 350
                                    [height] => 350
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.2b61576436d316ecc81f0b9dffb101e5?rik=mXWpTaIbhiPW1g&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => DB1C1593B31DC4786F7DD6D623861BA24DA97599
                                    [accentColor] => 010204
                                )

                            [50D6FA67F03A5895FA9B8E0F7B4644F444DC0D7C] => Array
                                (
                                    [name] => Global Book
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.Mt4qpnx1f3SutGvZKiFU8gAAAA?pid=Api
                                    [datePublished] => 2020-02-17T13:02:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.goonebook.in/wp-content/uploads/2022/05/THINK-AND-250.jpg
                                    [hostPageUrl] => https://www.goonebook.in/
                                    [contentSize] => 88735 B
                                    [width] => 250
                                    [height] => 400
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.32de2aa67c757f74aeb46bd92a2154f2?rik=BW2vdg%2bjhVmvuQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => C7D0CD444F4464B7F0E8B9AF5985A30F76AF6D05
                                    [accentColor] => C16E0A
                                )

                            [46F78740C883EA67CB6461B76423C23B18ADCC79] => Array
                                (
                                    [name] => HSBC Value Fund | HSBC Asset Management India
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.owDMff76ZvR5bIDRqFtqUwAAAA?pid=Api
                                    [datePublished] => 2022-11-26T12:16:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.assetmanagement.hsbc.co.in/-/media/images/india/riskometer/riskometer-label-color/scheme-risk-o-meter-very-high-risk.png
                                    [hostPageUrl] => https://www.assetmanagement.hsbc.co.in/en/mutual-funds/investment-expertise/equity-funds/hsbc-value-fund
                                    [contentSize] => 18604 B
                                    [width] => 389
                                    [height] => 249
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.a300cc7dfefa66f4796c80d1a85b6a53?rik=ZH94BIw4rna8Rg&pid=ImgRaw&r=0
                                    [isTransparent] => 1
                                    [imageId] => 97CCDA81B32C32467B1646BC76AE388C04787F64
                                    [accentColor] => 65CC00
                                )

                            [D413F2FA328A92ADD105B5608442D9844770E723] => Array
                                (
                                    [name] => SC warns stray dogs pose accident risks, orders streets kept clear; MD ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.fDXj0ZaUM12G0Q2N6XM-qAHaFj?pid=Api
                                    [datePublished] => 2026-01-08T00:02:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://images.bhaskarassets.com/thumb/730x0/web2images/1884/2026/01/07/gujarat-evening-wrap_1767787395.gif
                                    [hostPageUrl] => https://www.bhaskarenglish.in/local/gujarat/video/sc-warns-stray-dogs-pose-accident-risks-orders-streets-kept-clear-md-drug-lab-running-inside-surat-mall-busted-more-136884093.html
                                    [contentSize] => 3231392 B
                                    [width] => 730
                                    [height] => 548
                                    [proxyContentUrl] => https://tse2.mm.bing.net/th/id/OGC.7c35e3d19694335d86d10d8de9733ea8?pid=Api&rurl=https%3a%2f%2fimages.bhaskarassets.com%2fthumb%2f730x0%2fweb2images%2f1884%2f2026%2f01%2f07%2fgujarat-evening-wrap_1767787395.gif&ehk=ukc1Lo0sotCwBWDW6XCXuwNmEqUhfL60OaAWtARMhSc%3d
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.7c35e3d19694335d86d10d8de9733ea8?rik=TTEvryOoKdodUA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 327E0774489D2448065B501DDA29A823AF2F314D
                                    [accentColor] => BF740C
                                )

                            [AE6C009FEEF6673E6BABEEFC0DD64C0D1BC7BBBA] => Array
                                (
                                    [name] => A new type of security - Siemens Healthineers India
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.-wpXUmdSGKLK7YnG937N2wHaFj?pid=Api
                                    [datePublished] => 2019-04-08T18:57:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://marketing.webassets.siemens-healthineers.com/1800000005722311/c37fa1dacaa5/v/44e0f8414b98/blood_gas_mcafee_anti_malware_4x3_1800000005722311.jpg
                                    [hostPageUrl] => https://www.siemens-healthineers.com/en-in/point-of-care-testing/featured-topics-in-poct/blood-gas-featured-topics/blood-gas-security
                                    [contentSize] => 19610 B
                                    [width] => 1408
                                    [height] => 1055
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.fb0a5752675218a2caed89c6f77ecddb?rik=6sYA%2be5vduO2ug&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => ABBB7CB1D0C46DD0CFEEBAB6E3766FEEF900C6EA
                                    [accentColor] => B94B12
                                )

                            [F0211B280EEE5C81A44A6ECC178DAA578F100622] => Array
                                (
                                    [name] => Risk Management in Software Engineering - Software Engineering Tutorial
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.Gy00gehI3hf4ligWFRYZnQAAAA?pid=Api
                                    [datePublished] => 2021-05-06T04:58:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.sitesbay.com/software-engineering/images/risk-management-in-software-engineering.png
                                    [hostPageUrl] => https://www.sitesbay.com/software-engineering/se-risk-management-in-software-engineering
                                    [contentSize] => 65449 B
                                    [width] => 381
                                    [height] => 417
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.1b2d3481e848de17f89628161516199d?rik=DxKxguDuxRhKpA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 226001F875AAD871CCE6A44A18C5EEE082B1120F
                                    [accentColor] => 0096CB
                                )

                            [0AD9BC3FEBE42AA636C00670D93B3E487AD867FC] => Array
                                (
                                    [name] => Google Malware Checker | Guard your website from malware!
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.PU67MOefCcePKFqOgQRBvwHaEJ?pid=Api
                                    [datePublished] => 2020-09-05T20:20:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://yuvrajhinger.in/images/featured_image/1592054247.jpg
                                    [hostPageUrl] => https://yuvrajhinger.in/post/google-malware-checker
                                    [contentSize] => 18263 B
                                    [width] => 714
                                    [height] => 400
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.3d4ebb30e79f09c78f285a8e810441bf?rik=oJ3L875OompjDA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => CF768DA784E3B39D07600C636AA24EBEF3CB9DA0
                                    [accentColor] => 054AC6
                                )

                            [31F3C559CFDA8B8CF7371A99B34671F189FE2AC6] => Array
                                (
                                    [name] => How to Outsource Java Development Successfully | Aimprosoft
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.s9_NN7ualJI_Z_PMOqvjHAHaHZ?pid=Api
                                    [datePublished] => 2022-07-27T03:47:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.aimprosoft.com/wp-content/uploads/2022/07/The-ways-to-reduce-risks.png
                                    [hostPageUrl] => https://www.aimprosoft.com/blog/how-to-outsource-java-development/
                                    [contentSize] => 40199 B
                                    [width] => 1024
                                    [height] => 1022
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.b3dfcd37bb9a94923f67f3cc3aabe31c?rik=Ez9clfytuMh%2fcw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 6CA2EF981F17643B99A1737FC8B8ADFC955C3F13
                                    [accentColor] => 0189CA
                                )

                            [C21C8D94223A223B58B53C4ABD500FDC204D8E3B] => Array
                                (
                                    [name] => Infoblox's New AI-Powered SOC Insights Capability Reduces Critical ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.SR4ejq6RBFv7nF9TQT6ImQAAAA?pid=Api
                                    [datePublished] => 2024-02-28T09:41:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://themasthead.in/front/post/65dedfb18d687-post-inflobox.jpeg
                                    [hostPageUrl] => https://themasthead.in/post/infobloxs-new-ai-powered-soc-insights-capability-reduces-critical-security-operations-challenges
                                    [contentSize] => 5558 B
                                    [width] => 300
                                    [height] => 168
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.491e1e8eae91045bfb9c5f53413e8899?rik=LMHYSSKjIrOFWw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => B3E8D402CDF005DBA4C35B85B322A32249D8C12C
                                    [accentColor] => 081937
                                )

                            [DFDD346BE4116194F4128E0F7B4644F444DC0D7C] => Array
                                (
                                    [name] => Global Book
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.DJmZCqOZnBdW8w1RisTgRwAAAA?pid=Api
                                    [datePublished] => 2020-02-17T13:02:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.goonebook.in/wp-content/uploads/2022/04/Flip.jpg
                                    [hostPageUrl] => https://www.goonebook.in/
                                    [contentSize] => 96207 B
                                    [width] => 250
                                    [height] => 406
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.0c99990aa3999c1756f30d518ac4e047?rik=%2fd1Dtk4RFklPIQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => C7D0CD444F4464B7F0E8214F4916114EB643DDFD
                                    [accentColor] => 9F5B2C
                                )

                            [787062F53A1A46206CE08B19C1CC5FE1947B8BF5] => Array
                                (
                                    [name] => What is it like to be in the trenches fighting malware? On the occasion ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.NSJf27n8aZGEgYTDk14ytgAAAA?pid=Api
                                    [datePublished] => 2022-06-02T09:06:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://web-assets.eset.com/fileadmin/ESET/SG/Newsroom/ESET_Blog/2021/Zuzana.png
                                    [hostPageUrl] => https://www.eset.com/in/about/newsroom/corporate-blog/corporate-blog/what-is-it-like-to-be-in-the-trenches-fighting-malware-on-the-occasion-of-international-womens-day/
                                    [contentSize] => 57100 B
                                    [width] => 320
                                    [height] => 168
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.35225fdbb9fc6991848184c3935e32b6?rik=hwcmX6OhZALGDg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 5FB8B7491EF5CC1C91B80EC60264A1A35F260787
                                    [accentColor] => 415B51
                                )

                            [2CDC485D10E9766194425616FEBF021274931FE6] => Array
                                (
                                    [name] => Buy Business Risk Assessment and Management - Excel Template Online in ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.iXS4Yq2iqU5IyLOGmk7sRQHaEj?pid=Api
                                    [datePublished] => 2022-10-28T16:09:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://i.etsystatic.com/36343571/r/il/0a9b18/4059704003/il_fullxfull.4059704003_kvgb.jpg
                                    [hostPageUrl] => https://www.etsy.com/in-en/listing/1254588076/business-risk-assessment-and-management
                                    [contentSize] => 235014 B
                                    [width] => 1725
                                    [height] => 1061
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.8974b862ada2a94e48c8b3869a4eec45?rik=ws2E1QGeZxZJJA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 6EF139472120FBEF6165244916679E01D584CDC2
                                    [accentColor] => C6B605
                                )

                            [60FBD3C05486FDBE6C6228B50A11D42E5A8551C8] => Array
                                (
                                    [name] => ALERT! Delete these 19 dangerous Google Play Store apps on your phone ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.xa6zU5VoyX73O0AJmKXK2AHaEK?pid=Api
                                    [datePublished] => 2023-04-29T07:50:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://images.hindustantimes.com/tech/img/2023/04/29/960x540/Untitled_design_53_1682760821821_1682760822107.jpg
                                    [hostPageUrl] => https://tech.hindustantimes.com/tech/news/alert-delete-these-19-dangerous-google-play-apps-on-your-phone-amazing-wallpaper-to-private-messenger-check-list-71682754175805.html
                                    [contentSize] => 30197 B
                                    [width] => 960
                                    [height] => 539
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.c5aeb3539568c97ef73b400998a5cad8?rik=Br89DEVo3%2bvGJg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 8C1558A5E24D11A05B8226C6EBDF68450C3DBF06
                                    [accentColor] => 20AB5D
                                )

                            [868D14443D231AF56644B64593B0111E18D986C8] => Array
                                (
                                    [name] => Buy Prevention of Venous Thrombosis after Transvenous Leads Imation ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.DlnnShJHLLNgsB-hdd0GawHaK2?pid=Api
                                    [datePublished] => 2024-12-11T11:52:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/71D9dGcFJYL.jpg
                                    [hostPageUrl] => https://www.desertcart.in/products/172978954-prevention-of-venous-thrombosis-after-transvenous-leads-implantation-prevention-of-venous-thrombosis-by-warfarin-after-permanent-transvenous-leads-implantation-in-high-risk-patients
                                    [contentSize] => 228768 B
                                    [width] => 1182
                                    [height] => 1732
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.0e59e74a12472cb360b01fa175dd066b?rik=aNhBRNMyoV9mRA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 8C689D81E1110B39546B44665FA132D34441D868
                                    [accentColor] => AE4D1D
                                )

                            [567C15C7DCB76CDCC6883679D6E75D7A1C44B20F] => Array
                                (
                                    [name] => Childcare Garden and Garage Risk Assessment (teacher made)
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.dQLHp3mjSA82wLqqzyqlvQHaDt?pid=Api
                                    [datePublished] => 2023-03-15T09:01:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://images.twinkl.co.uk/tw1n/image/private/t_630_eco/image_repo/a0/ac/t-ch-83-childcare-garden-and-garage-risk-assessment-template_ver_1.jpg
                                    [hostPageUrl] => https://www.twinkl.co.in/resource/t-ch-83-home-based-childcare-garden-and-garage-risk-assessment
                                    [contentSize] => 22166 B
                                    [width] => 630
                                    [height] => 315
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.7502c7a779a3480f36c0baaacf2aa5bd?rik=ZcdRfM17xs1siA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => F02B44C1A7D57E6D9763886CCDC67BCD7C51C765
                                    [accentColor] => 0051B1
                                )

                            [341B9DF5F09B04048986C9DB99A6D51727A7D96F] => Array
                                (
                                    [name] => Risk Mangement Pricing - pmguruonline.com
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.hTGDmAcZvgKIFoLoMOvFlwAAAA?pid=Api
                                    [datePublished] => 2018-04-16T16:35:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.pmguruonline.com/risk/images/Risk001.png
                                    [hostPageUrl] => https://www.pmguruonline.com/risk/price.aspx
                                    [contentSize] => 610 B
                                    [width] => 148
                                    [height] => 99
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.853183980719be02881682e830ebc597?rik=Q7HZXw%2b5QECYaA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => F69D7A72715D6A99BD9C68984040B90F5FD9B143
                                    [accentColor] => 60606B
                                )

                            [627F9101F77D9BAF205CBEB75C777643BA94ABBF] => Array
                                (
                                    [name] => International Trade Settlement in Indian Rupee (INR)
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.Z-oZyLiHtoyxnFuPd7vxjAHaDt?pid=Api
                                    [datePublished] => 2022-12-01T07:01:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://taxguru.in/wp-content/uploads/2022/11/Indian-side-Export-Overseas-Import.jpg
                                    [hostPageUrl] => https://taxguru.in/dgft/international-trade-settlement-indian-rupee-inr.html
                                    [contentSize] => 85668 B
                                    [width] => 600
                                    [height] => 300
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.67ea19c8b887b68cb19c5b8f77bbf18c?rik=JvcZEH%2fXufoCxQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => FBBA49AB346777C57BEBC502FAB9D77F1019F726
                                    [accentColor] => B17B1A
                                )

                            [AE3D1D4056A8685D7573D95D7649CE66C019D2C8] => Array
                                (
                                    [name] => EPIC = Indian Streetwear Clothing – EPIC CLO OFFICIAL
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.trduPq9GlrSE5-KhzdTNEgHaF4?pid=Api
                                    [datePublished] => 2023-07-21T17:03:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://epiccloofficial.com/cdn/shop/files/15_600x.png?v=1704802195
                                    [hostPageUrl] => https://epiccloofficial.com/
                                    [contentSize] => 97582 B
                                    [width] => 600
                                    [height] => 476
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.b6b76e3eaf4696b484e7e2a1cdd4cd12?rik=6tPRBGWKhtVXNw&pid=ImgRaw&r=0
                                    [isTransparent] => 1
                                    [imageId] => 8C2D910C66EC9467D59D3757D5868A6504D1D3EA
                                    [accentColor] => 880404
                                )

                            [8DCF7BCE3113F5D7CAD5BBAF645DE47F2C8E084E] => Array
                                (
                                    [name] => 2025 Volkswagen Tiguan R-Line India launch confirmed — Everything you ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.7qeLl1XItCsjJ47Hc13ZlQHaFj?pid=Api
                                    [datePublished] => 2025-03-08T06:26:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://cdn.cars24.com/prod/auto-news24-cms/Newsroom/2025/03/04/a20d90ba-9d20-425b-9484-80dde61f1364-upcoming-new-2025-volkswagen-tiguan-r-line-suv-price-in-india-vw.webp
                                    [hostPageUrl] => https://www.cars24.com/news/auto/2025-volkswagen-tiguan-r-line-india-launch-confirmed/
                                    [contentSize] => 163998 B
                                    [width] => 1200
                                    [height] => 900
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.eea78b9755c8b42b23278ec7735dd995?rik=2Py37BMxX32sXQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => E480E8C2F74ED546FABB5DAC7D5F3113ECB7FCD8
                                    [accentColor] => 946837
                                )

                            [F1B236288952B5E8AEF9FE91CCFE9B65212E3034] => Array
                                (
                                    [name] => A Novel Implicit Neural Representation for Volume Data
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.qg-x99hQQZ-RBTGD7PUkfgHaDu?pid=Api
                                    [datePublished] => 2023-03-03T08:37:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.mdpi.com/applsci/applsci-13-03242/article_deploy/html/images/applsci-13-03242-g001.png
                                    [hostPageUrl] => https://www.mdpi.com/2076-3417/13/5/3242
                                    [contentSize] => 386513 B
                                    [width] => 3659
                                    [height] => 1844
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.aa0fb1f7d850419f91053183ecf5247e?rik=HytjgpglW47qnw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 4303E21256B9EFCC19EF9FEA8E5B259882632B1F
                                    [accentColor] => 0A4DC1
                                )

                            [7B7370A1B3A285AF96A93C2BBA2B8263449282CA] => Array
                                (
                                    [name] => USD/INR Cracks Big: Falls 2% in 4 Days! | Investing.com India
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.O3i7h1BVUzO6l5LXN1a6sQHaDW?pid=Api
                                    [datePublished] => 2022-11-09T11:26:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://d56-invdn-com.investing.com/content/965f21db67fcf4fbb29d8bbbbbcd8c9c.png
                                    [hostPageUrl] => https://in.investing.com/analysis/usdinr-cracks-big-falls-2-in-4-days-200549858
                                    [contentSize] => 43505 B
                                    [width] => 1288
                                    [height] => 583
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.3b78bb8750555333ba9792d73756bab1?rik=tzcHGjsqWPppmg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => AC2829443628B2ABB2C39A69FA582A3B1A0737B7
                                    [accentColor] => B71D14
                                )

                            [65353D23807EFD17A91BE1C074FE4B004D2DCBD9] => Array
                                (
                                    [name] => Everyday things that could raise your cancer risk
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.BpPztDadUIwPiswLKQz0NAEsDI?pid=Api
                                    [datePublished] => 2025-07-10T05:04:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1IjQKm.img?w=800&h=415&q=60&m=2&f=jpg
                                    [hostPageUrl] => https://www.msn.com/en-in/health/diseases-and-conditions/everyday-things-that-could-raise-your-cancer-risk/ss-AA1yKDwI
                                    [contentSize] => 65536 B
                                    [width] => 622
                                    [height] => 415
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.0693f3b4369d508c0f8acc0b290cf434?rik=VlPTMgjn33GasQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 9DBCD2D400B4EF470C1EB19A71DFE70832D35356
                                    [accentColor] => 6F2224
                                )

                            [95F426B4613A7CB02EE05D7FE68BB97C9111FFDA] => Array
                                (
                                    [name] => The risks of sharing your kids' lives online
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.lx5qGRYCDQlwyWcK-2Jf1wHaE8?pid=Api
                                    [datePublished] => 2024-11-11T16:18:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1HPdLs.img?w=800&h=415&q=60&m=2&f=jpg
                                    [hostPageUrl] => https://www.msn.com/en-in/lifestyle/family/the-risks-of-sharing-your-kids-lives-online/ss-AA1rvWij
                                    [contentSize] => 65536 B
                                    [width] => 622
                                    [height] => 415
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.971e6a1916020d0970c9670afb625fd7?rik=WU9iSxajxwviDg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => ADFF1119C79BB86EF7D50EE20BC7A3164B624F59
                                    [accentColor] => 336C98
                                )

                            [4B8121D12E89B692B034C69A1F944D68C3BA4673] => Array
                                (
                                    [name] => Shirt – EPIC CLO OFFICIAL
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.6MMdM-H-l9M48YClT-eUvgHaLJ?pid=Api
                                    [datePublished] => 2024-07-11T01:14:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => http://epiccloofficial.com/cdn/shop/files/Risk_Bowling_Shirt_Front.png?v=1749632087
                                    [hostPageUrl] => https://epiccloofficial.com/collections/shirt
                                    [contentSize] => 247487 B
                                    [width] => 2160
                                    [height] => 3250
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.e8c31d33e1fe97d338f180a54fe794be?rik=tBgSHeKYaykLQw&riu=http%3a%2f%2fepiccloofficial.com%2fcdn%2fshop%2ffiles%2fRisk_Bowling_Shirt_Front.png%3fv%3d1749632087&ehk=uau09uPMdoJZaq7i8pZFakN4%2fNQbR%2fcK3h1FixyYKww%3d&risl=&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 3764AB3C86D449F1A96C430B296B98E21D1218B4
                                    [accentColor] => CC8E00
                                )

                            [C166D85B781B33BF4415EF0F763018B9DB1E8B72] => Array
                                (
                                    [name] => 1 million dong in indian rupees - Brainly.in
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.3j2AhAAnA49B9VlLtDy73wHaMO?pid=Api
                                    [datePublished] => 2023-06-15T03:32:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://hi-static.z-dn.net/files/d37/0eb302dae899b785361f97f5ca31e201.jpg
                                    [hostPageUrl] => https://brainly.in/question/56651626
                                    [contentSize] => 108466 B
                                    [width] => 1028
                                    [height] => 1697
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.de3d80840027038f41f5594bb43cbbdf?rik=HGaNtYexM%2ftEUQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 27B8E1BD9B810367F0FE5144FB33B187B58D661C
                                    [accentColor] => 145AB7
                                )

                            [AD8590A9C4330EF0F291F8C6DD4AB38E19B69FEC] => Array
                                (
                                    [name] => Total rewards
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.5PvfpaXpz5KFTafixTQIKQAAAA?pid=Api
                                    [datePublished] => 2021-04-20T00:14:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.mercer.com/assets/in/en_in/shared-assets/global/covers/cover-people-risk-408x544.jpg.transform/mdotcom-promo-cta-xs/image.jpg
                                    [hostPageUrl] => https://www.mercer.com/en-in/insights/total-rewards/
                                    [contentSize] => 18341 B
                                    [width] => 384
                                    [height] => 512
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.e4fbdfa5a5e9cf92854da7e2c5340829?rik=2lgJmkwz4A8vGQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => CEF96B91E83BA4DD6C8F192F0FE0334C9A0958DA
                                    [accentColor] => A42756
                                )

                            [C20A92F616E40049E3971BCD0ACCBBD71D4E7471] => Array
                                (
                                    [name] => Currency Today: Euro Finds Footing, Dollar Whipsaws, Rupee Tanks | India
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.aSE6HW1bQ55mULwzcRgPWwHaFj?pid=Api
                                    [datePublished] => 2025-12-02T12:24:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://watcher.guru/news/wp-content/uploads/2023/09/brics-us-dollar-indian-rupee-usd-inr-1024x768.jpg
                                    [hostPageUrl] => https://www.btcc.com/en-IN/square/WatcherWGuru/1232787
                                    [contentSize] => 302166 B
                                    [width] => 1024
                                    [height] => 768
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.69213a1d6d5b439e6650bc3371180f5b?rik=LKApb2FOAJQ%2beQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 1747E4D17DBBCCA0DCB1793E94004E616F29A02C
                                    [accentColor] => 484B5B
                                )

                            [DDF7B1391892813C238096958E0E31E80E9C78E6] => Array
                                (
                                    [name] => Hormuz disruption, $100 oil pose risks to India's inflation, rupee ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th?id=OIF.KKlvbbfe7C%2fwC2cPbYYqEA&pid=Api
                                    [datePublished] => 2026-04-26T04:50:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA21K4i7.img?w=768&h=576&m=6
                                    [hostPageUrl] => https://www.msn.com/en-in/money/topstories/hormuz-disruption-100-oil-pose-risks-to-indias-inflation-rupee-union-bank/ar-AA21JKno
                                    [contentSize] => 65536 B
                                    [width] => 768
                                    [height] => 576
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.b44a38245cb65bc9fda7661afec5b867?rik=&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 6E87C9E08E13E0E859690832C3182981931B7FDD
                                    [accentColor] => 142946
                                    [isFresh] => 1
                                )

                            [985C2AF313581EDDE9022F2DCD899093714F9F2B] => Array
                                (
                                    [name] => Riyan Parag caught vaping inside RR dressing room; risks imprisonment ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th?id=OIF.JA%2bbewshj4VEsBhVEDGi%2fA&pid=Api
                                    [datePublished] => 2026-04-29T01:58:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA21XgIh.img?w=549&h=309&m=6
                                    [hostPageUrl] => https://www.msn.com/en-in/sports/cricket/riyan-parag-caught-vaping-inside-rr-dressing-room-risks-imprisonment-heavy-fine-amid-india-s-strict-e-cigarette-ban/ar-AA21XdNa
                                    [contentSize] => 32768 B
                                    [width] => 549
                                    [height] => 309
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.a7883241b8dbb330be199a4b00b8a604?rik=&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => B2F9F417390998DCD2F2209EDDE185313FA2C589
                                    [accentColor] => 9A6631
                                    [isFresh] => 1
                                )

                            [4E95EC0A570FDD06FCFC6EE714A7156CED6343DA] => Array
                                (
                                    [name] => Computers of armed forces and DRDO hacked - The Economic Times
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.WtAL8rgpRzFYFomOGyBPLQAAAA?pid=Api
                                    [datePublished] => 2017-11-05T00:04:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://img.etimg.com/thumb/msid-96316934,imgsize-69568,width-183,height-137,quality-100/jayant-gokhales-explosive-resignation-letter-and-the-inr-1200-crore-risk-in-pfss-loan-book.jpg
                                    [hostPageUrl] => https://economictimes.indiatimes.com/tech/internet/Computers-of-armed-forces-and-DRDO-hacked/articleshow/31550861.cms
                                    [contentSize] => 15347 B
                                    [width] => 183
                                    [height] => 137
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.5ad00bf2b82947315816898e1b204f2d?rik=5FnOoHXw3WDPzw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => AD3436DEC6517A417EE6CFCF60DDF075A0CE59E4
                                    [accentColor] => 296FA2
                                )

                            [401F127978E934373A765E878B71E0E1376B9D1C] => Array
                                (
                                    [name] => India and Malaysia can now trade in Indian rupee
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.CYbYvIT2x3rpX3J94IdZzwHaHa?pid=Api
                                    [datePublished] => 2023-04-03T05:20:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://asianlite.uk/wp-content/uploads/2023/04/Fsm8UqIaYAACZhp-1024x1024.jpg
                                    [hostPageUrl] => https://currentaffairs.adda247.com/india-malaysia-can-now-trade-in-indian-rupee/
                                    [contentSize] => 230403 B
                                    [width] => 1024
                                    [height] => 1024
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.0986d8bc84f6c77ae95f727de08759cf?rik=BPEhl4eeQ3OjZw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => C1D9B6731E0E17B878E567A373439E879721F104
                                    [accentColor] => 1677B5
                                )

                            [4CD3A6C76745E7E4C5658EBB8EA18722A38133AF] => Array
                                (
                                    [name] => Supply Chain Risk Management: Literature Review
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.dD_XS3NM5IbdKCZNRAXZQgHaHa?pid=Api
                                    [datePublished] => 2021-01-06T12:06:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.mdpi.com/risks/risks-09-00016/article_deploy/html/images/risks-09-00016-g001.png
                                    [hostPageUrl] => https://www.mdpi.com/2227-9091/9/1/16
                                    [contentSize] => 54830 B
                                    [width] => 3408
                                    [height] => 3412
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.743fd74b734ce486dd28264d4405d942?rik=xD1qfHZUfk5cVg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => FA33183A22781AE8BBE8565C4E7E54767C6A3DC4
                                    [accentColor] => 383838
                                )

                            [5EACB65D80359482187F0B8E5CA28667E3561C61] => Array
                                (
                                    [name] => Online training on Secure Practices for Digital Gaming | Central ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.YrVEw1d3VeeD8ngzUmvhAgHaHa?pid=Api
                                    [datePublished] => 2024-10-17T17:03:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://ciet.ncert.gov.in/storage/app/public/files/17/Workshop_and_training_files/sdge/sdge.jpg
                                    [hostPageUrl] => https://ciet.ncert.gov.in/activity/sdge
                                    [contentSize] => 154515 B
                                    [width] => 793
                                    [height] => 793
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.62b544c3577755e783f27833526be102?rik=5cpr1QhTSSiB9w&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 16C1653E76682AC5E8B0F78128495308D56BCAE5
                                    [accentColor] => 7D3839
                                )

                        )

                    [relatedSearches] => Array
                        (
                            [0] => Array
                                (
                                    [text] => Malware Threats
                                    [displayText] => Malware Threats
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malware+Threats&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5830.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+Threats
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=Malware+Threats&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [1] => Array
                                (
                                    [text] => Malware Detection
                                    [displayText] => Malware Detection
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malware+Detection&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5832.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+Detection
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=Malware+Detection&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [2] => Array
                                (
                                    [text] => Malware Infection
                                    [displayText] => Malware Infection
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malware+Infection&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5834.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+Infection
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=Malware+Infection&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [3] => Array
                                (
                                    [text] => Malware Prevention
                                    [displayText] => Malware Prevention
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malware+Prevention&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5836.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+Prevention
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Malware+Prevention&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [4] => Array
                                (
                                    [text] => Malware Vírus
                                    [displayText] => Malware Vírus
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malware+V%C3%ADrus&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5838.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+V%C3%ADrus
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=Malware+V%c3%adrus&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [5] => Array
                                (
                                    [text] => Malware Attack
                                    [displayText] => Malware Attack
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malware+Attack&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5840.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+Attack
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Malware+Attack&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [6] => Array
                                (
                                    [text] => Malware Warning
                                    [displayText] => Malware Warning
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malware+Warning&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5842.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+Warning
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Malware+Warning&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [7] => Array
                                (
                                    [text] => Effects of Malware
                                    [displayText] => Effects of Malware
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Effects+of+Malware&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5844.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Effects+of+Malware
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=Effects+of+Malware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [8] => Array
                                (
                                    [text] => Signs of Malware
                                    [displayText] => Signs of Malware
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Signs+of+Malware&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5846.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Signs+of+Malware
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=Signs+of+Malware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [9] => Array
                                (
                                    [text] => Malware Protection
                                    [displayText] => Malware Protection
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malware+Protection&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5848.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+Protection
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=Malware+Protection&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [10] => Array
                                (
                                    [text] => Examples of Malware Attacks
                                    [displayText] => Examples of Malware Attacks
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Examples+of+Malware+Attacks&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5850.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Examples+of+Malware+Attacks
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=Examples+of+Malware+Attacks&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [11] => Array
                                (
                                    [text] => Malware Issues
                                    [displayText] => Malware Issues
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malware+Issues&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5852.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+Issues
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Malware+Issues&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [12] => Array
                                (
                                    [text] => Malware Symptoms
                                    [displayText] => Malware Symptoms
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malware+Symptoms&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5854.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+Symptoms
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Malware+Symptoms&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [13] => Array
                                (
                                    [text] => Types of Malware Attacks
                                    [displayText] => Types of Malware Attacks
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Types+of+Malware+Attacks&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5856.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Types+of+Malware+Attacks
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=Types+of+Malware+Attacks&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [14] => Array
                                (
                                    [text] => Define Malware
                                    [displayText] => Define Malware
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Define+Malware&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5858.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Define+Malware
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=Define+Malware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [15] => Array
                                (
                                    [text] => Malware Cyber Security
                                    [displayText] => Malware Cyber Security
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malware+Cyber+Security&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5860.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+Cyber+Security
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=Malware+Cyber+Security&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [16] => Array
                                (
                                    [text] => How to Protect Against Malware
                                    [displayText] => How to Protect Against Malware
                                    [webSearchUrl] => https://www.bing.com/images/search?q=How+to+Protect+Against+Malware&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5862.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=How+to+Protect+Against+Malware
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=How+to+Protect+Against+Malware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [17] => Array
                                (
                                    [text] => Types of Computer Security Risks
                                    [displayText] => Types of Computer Security Risks
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Types+of+Computer+Security+Risks&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5864.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Types+of+Computer+Security+Risks
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Types+of+Computer+Security+Risks&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [18] => Array
                                (
                                    [text] => Malware Pictures
                                    [displayText] => Malware Pictures
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malware+Pictures&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5866.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+Pictures
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=Malware+Pictures&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [19] => Array
                                (
                                    [text] => Malware Facts
                                    [displayText] => Malware Facts
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malware+Facts&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5868.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+Facts
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=Malware+Facts&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [20] => Array
                                (
                                    [text] => Malware Analysis
                                    [displayText] => Malware Analysis
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malware+Analysis&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5870.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+Analysis
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Malware+Analysis&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [21] => Array
                                (
                                    [text] => What Is Malware
                                    [displayText] => What Is Malware
                                    [webSearchUrl] => https://www.bing.com/images/search?q=What+Is+Malware&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5872.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=What+Is+Malware
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=What+Is+Malware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [22] => Array
                                (
                                    [text] => How to Avoid Malware
                                    [displayText] => How to Avoid Malware
                                    [webSearchUrl] => https://www.bing.com/images/search?q=How+to+Avoid+Malware&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5874.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=How+to+Avoid+Malware
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=How+to+Avoid+Malware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [23] => Array
                                (
                                    [text] => Malicious Malware
                                    [displayText] => Malicious Malware
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malicious+Malware&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5876.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malicious+Malware
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Malicious+Malware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [24] => Array
                                (
                                    [text] => Prevent Malware
                                    [displayText] => Prevent Malware
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Prevent+Malware&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5878.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Prevent+Malware
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Prevent+Malware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [25] => Array
                                (
                                    [text] => Network Security Threats
                                    [displayText] => Network Security Threats
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Network+Security+Threats&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5880.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Network+Security+Threats
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Network+Security+Threats&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [26] => Array
                                (
                                    [text] => Malicious Software
                                    [displayText] => Malicious Software
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malicious+Software&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5882.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malicious+Software
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Malicious+Software&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [27] => Array
                                (
                                    [text] => Computer Security Risk
                                    [displayText] => Computer Security Risk
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Computer+Security+Risk&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5884.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Computer+Security+Risk
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=Computer+Security+Risk&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [28] => Array
                                (
                                    [text] => Different Types of Malware
                                    [displayText] => Different Types of Malware
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Different+Types+of+Malware&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5886.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Different+Types+of+Malware
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=Different+Types+of+Malware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [29] => Array
                                (
                                    [text] => Pegasus Malware
                                    [displayText] => Pegasus Malware
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Pegasus+Malware&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5888.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Pegasus+Malware
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Pegasus+Malware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                        )

                    [createdate] => 1778049925917
                )

            [json_error] => No error
            [products_count] => 120
            [related_searches_count] => 30
            [first_product_sample] => Array
                (
                    [name] => Risk monitoring helps Air India prevent revenue loss of over INR 3 cr ...
                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.MVTnVaL4OfXLs6DPXKukxwHaEu?pid=Api
                    [datePublished] => 2023-10-14T16:36:00.0000000Z
                    [isFamilyFriendly] => 1
                    [contentUrl] => https://etimg.etb2bimg.com/thumb/msid-104429059,imgsize-15734,width-1200,height=765,overlay-etinfra/news/aviation/risk-monitoring-helps-air-india-prevent-revenue-loss-of-over-inr-3-cr.jpg
                    [hostPageUrl] => https://infra.economictimes.indiatimes.com/news/aviation/risk-monitoring-helps-air-india-prevent-revenue-loss-of-over-inr-3-cr/104429059
                    [contentSize] => 37249 B
                    [width] => 1200
                    [height] => 765
                    [cDNContentUrl] => https://th.bing.com/th/id/R.3154e755a2f839f5cbb3a0cf5caba4c7?rik=fopBA5Ds2hmQCQ&pid=ImgRaw&r=0
                    [isTransparent] => 
                    [imageId] => DA126ED08276A60B7930099019DAEC9003418A7E
                    [accentColor] => A82623
                )

        )

    [skipped_products] => Array
        (
        )

)

Related Searches

How to Discover Better Malware Risks Options

Try combining terms like fit, fabric, or occasion with your core query. For example, add words like oversized, linen, party, office, or wedding to get more targeted fashion product discovery results.

Search Help

How can I find better fashion options for this search?

Use related searches, refine your keywords by style or occasion, and compare multiple product cards before opening store pages.

Are these results from one store only?

No, Styleberry is a discovery layer that surfaces fashion products from multiple sources to simplify comparison.

Can I search using occasion terms like office or wedding?

Yes, occasion keywords often produce stronger and more relevant results for fashion discovery.

Search