Docker Fixes Critical Ask Gordon AI Flaw Allowing Code Execution via Image Metadata

0

Ravie LakshmananFeb 03, 2026Artificial Intelligence / Vulnerability

Cybersecurity researchers have disclosed details of a now-patched security flaw impacting Ask Gordon, an artificial intelligence (AI) assistant built into Docker Desktop and the Docker Command-Line Interface (CLI), that could be exploited to execute code and exfiltrate sensitive data.

The critical vulnerability has been codenamed DockerDash by cybersecurity company Noma Labs. It was addressed by Docker with the release of version 4.50.0 in November 2025.

“In DockerDash, a single malicious metadata label in a Docker image can be used to compromise your Docker environment through a simple three-stage attack: Gordon AI reads and interprets the malicious instruction, forwards it to the MCP [Model Context Protocol] Gateway, which then executes it through MCP tools,” Sasi Levi, security research lead at Noma, said in a report shared with The Hacker News.

“Every stage happens with zero validation, taking advantage of current agents and MCP Gateway architecture.”

Successful exploitation of the vulnerability could result in critical-impact remote code execution for cloud and CLI systems, or high-impact data exfiltration for desktop applications.

The problem, Noma Security said, stems from the fact that the AI assistant treats unverified metadata as executable commands, allowing it to propagate through different layers sans any validation, allowing an attacker to sidestep security boundaries. The result is that a simple AI query opens the door for tool execution.

With MCP acting as a connective tissue between a large language model (LLM) and the local environment, the issue is a failure of contextual trust. The problem has been characterized as a case of Meta-Context Injection.

“MCP Gateway cannot distinguish between informational metadata (like a standard Docker LABEL) and a pre-authorized, runnable internal instruction,” Levi said. “By embedding malicious instructions in these metadata fields, an attacker can hijack the AI’s reasoning process.”

In a hypothetical attack scenario, a threat actor can exploit a critical trust boundary violation in how Ask Gordon parses container metadata. To accomplish this, the attacker crafts a malicious Docker image with embedded instructions in Dockerfile LABEL fields. 

While the metadata fields may seem innocuous, they become vectors for injection when processed by Ask Gordon AI. The code execution attack chain is as follows –

  • The attacker publishes a Docker image containing weaponized LABEL instructions in the Dockerfile
  • When a victim queries Ask Gordon AI about the image, Gordon reads the image metadata, including all LABEL fields, taking advantage of Ask Gordon’s inability to differentiate between legitimate metadata descriptions and embedded malicious instructions
  • Ask Gordon to forward the parsed instructions to the MCP gateway, a middleware layer that sits between AI agents and MCP servers.
  • MCP Gateway interprets it as a standard request from a trusted source and invokes the specified MCP tools without any additional validation
  • MCP tool executes the command with the victim’s Docker privileges, achieving code execution

The data exfiltration vulnerability weaponizes the same prompt injection flaw but takes aim at Ask Gordon’s Docker Desktop implementation to capture sensitive internal data about the victim’s environment using MCP tools by taking advantage of the assistant’s read-only permissions.

The gathered information can include details about installed tools, container details, Docker configuration, mounted directories, and network topology.

It’s worth noting that Ask Gordon version 4.50.0 also resolves a prompt injection vulnerability discovered by Pillar Security that could have allowed attackers to hijack the assistant and exfiltrate sensitive data by tampering with the Docker Hub repository metadata with malicious instructions.

“The DockerDash vulnerability underscores your need to treat AI Supply Chain Risk as a current core threat,” Levi said. “It proves that your trusted input sources can be used to hide malicious payloads that easily manipulate AI’s execution path. Mitigating this new class of attacks requires implementing zero-trust validation on all contextual data provided to the AI model.”



Source link

What would be the impact of a US attack on Iran? | Opinions

0

Growing tensions between the United States and Iran have left the two countries one spark away from a fire. An unprecedented accumulation of US military forces in the Middle East, coupled with Washington’s reliance on gunboat diplomacy, has distinctly increased the risk of war—one that engulfs Iran and the region, with far-reaching regional and global costs.

In the aftermath of the recent crackdown on protests in Iran, US President Donald Trump announced that it was time to remove Iranian Supreme Leader Ayatollah Ali Khamenei. His administration then deployed the USS Abraham Lincoln aircraft carrier and supporting warplanes, along with various air defence assets—including additional THAAD and Patriot missile systems—across the Middle East.

As military assets have been accumulated, Trump has threatened that if Iran does not agree to a deal, “the next attack will be far worse” than last June’s US attack on Iranian nuclear facilities.

From the US perspective, a favourable agreement would require Iran to demolish its nuclear enrichment programme and ballistic missile capabilities, while also pulling back its regional influence. Such maximum demands, combined with Tehran’s deep distrust of negotiations with the US, make a deal highly unlikely. Alaeddin Boroujerdi, a member of the Iranian parliament’s National Security and Foreign Policy Commission, clarified on Monday that civilian nuclear capability, as well as missile and drone capabilities, represent a “red line” for Tehran.

This does not necessarily signal a permanent diplomatic stalemate. However, Tehran interprets the US’s maximum demands as a potential threat of regime change—a notion repeatedly emphasised by Trump and hawks in Washington and Tel Aviv. In this context, another US strike would represent an “existential threat” to the Islamic Republic, eliminating any incentive for restraint.

The impact of any US military action against Iran would principally depend on the attack’s type, scale, and targets, potentially triggering a severe crisis in Iran, across the region, and globally.

Trump favours surgical and targeted military operations, which would probably combine leadership decapitation with efforts to significantly damage Iran’s Islamic Revolutionary Guard Corps (IRGC) military bases, Basij units—a paramilitary force under IRGC control—and police stations, which the US designates as responsible for firing on demonstrators.

Any US effort to impose regime change through military means would undoubtedly lead to dangerous outcomes domestically and regionally. In Iran, an attack could lead to the consolidation of power. But it could also lead to a full takeover by the IRGC or even internal conflict.

An attack on Iran similar to the one last year could well result in the Iranian people rallying behind the flag and rejecting regime change for several reasons. First, the Iranian people are afraid of a scenario similar to Syria and Libya where there is state collapse. Second, there is no credible moderate opposition that can lead change. Third, there is strong sociopolitical cohesion within Iran.

Political institutions, the military, and the IRGC are well-organised and benefit from substantial resources generated by a sanctions-induced rentier system. Moreover, significant segments of society—particularly the working-class groups often referred to as “revolutionaries”—are aligned with this structure.

If the attack is successful in targeting senior leadership of the Islamic Republic, this could bring about a succession crisis, create decision-making vacuums, and deepen competition within the regime. Under these circumstances, tensions between state institutions and military-security entities would grow. Given the concentration of hard power in the hands of the IRGC, the probability of establishing a military-dominated state would expand.

The US and Israel may also try to encourage the outbreak of civil war to geopolitically weaken Iran. Last month, there were calls from some US officials, such as Texas Republican Senator Ted Cruz, to arm Iranian protesters. That could easily extend to armed groups, and there are a number of those that have clashed with the Iranian authorities that the US can turn to.

Among them are the Mojahedin-e Khalq (MEK), formerly designated as a “terrorist” organisation by the US and the European Union (EU); the Party of Free Life of Kurdistan (PJAK), an armed Kurdish group looking for the secession of Iran’s western Kurdistan province; Al-Ahwaziya, an Arab nationalist movement supporting the separation of the oil-rich Khuzestan province in the southwest; Jaish al-Adl (Jundallah), an armed group operating in southeastern Iran; and pan-Turkic groups in the northwest chasing the alliance of Turkic populations across Turkiye, Azerbaijan, and Iran.

Facing Washington’s continuing escalatory rhetoric and track record of regime change operations, Iran has adopted a so-called madman strategy, simultaneously issuing conciliatory and confrontational signals. This posture is apparent in Tehran’s expressed openness to establishing a framework of negotiations with the US, alongside Khamenei’s speech on Monday, which warned that any military attack on Iran would cause a “regional war”, underscoring the state’s prevailing priority of thwarting regime change at any cost—even at the risk of regional and global consequences.

Iran has made clear that it will retaliate, including through allied forces in the region, potentially drawing Israel and Gulf states into a broader regional skirmish. This would trigger political instability and economic vulnerability, which in turn may prompt substantial capital flight, chiefly from the Gulf states, as well as increasing flows of refugees and migrants to Europe.

Moreover, if Iran attacks shipping in the Strait of Hormuz or Gulf energy infrastructure, there would be a spike in global oil and gas prices, exacerbating market volatility, inflationary pressure from higher energy costs, and a knock-on effect for fragile economies, which would further worsen migration pressures.

In the current situation, any US military escalation poses a risk not just for Iran but for the whole region. Middle Eastern history demonstrates that once a conflict is triggered, it spreads like a wildfire, destabilising the whole region in unpredictable ways.

The views expressed in this article are the author’s own and do not necessarily reflect Al Jazeera’s editorial policy.



Source link

Snapchat predator coerced boys to perform sex acts in exchange for Xbox and PlayStation codes | UK News

0


A “depraved” sex predator who befriended schoolboys through Snapchat before coercing them to perform sexual acts in exchange for Xbox and PlayStation codes has been jailed for 10-and-a-half years.

Ross Brogan, 31, bombarded four teenagers with indecent communications and obscene videos, then offered payment to reciprocate.

The Crown Office and Procurator Fiscal Service (COPFS) said the software engineer, from Glasgow, befriended the boys via Snapchat and quickly tried to exploit their friendships for his own gratification.

Prosecutors told the city’s high court how he demanded intimate images and videos of the youngsters – all aged under 16 – in return for Xbox or PlayStation codes which would allow them to make purchases via their games consoles.

In his sentencing statement, Judge Bruce Erroch KC said Brogan adopted an assumed identity on social media and contacted a boy he personally knew.

The judge stated that the worried victim confided in Brogan, unaware he was behind the sexually explicit requests.

Judge Erroch said it culminated in Brogan committing oral rape on the boy.

The judge stated: “It is difficult to conceive of a more calculated course of deceit and manipulation.”

COPFS said Brogan also left sex toys at a pre-arranged drop-off point, instructing that they be used in indecent photos and footage which should be sent to him.

Judge Erroch noted how he also threatened to hurt one of the boys and his family if he refused to obey his twisted demands.

Brogan pleaded guilty to six sexual offence charges at the High Court in Glasgow last month.

He was handed an extended sentence at the same court on Tuesday, with 10-and-a-half years in jail and an additional three years on licence once released back into the community.

The judge acknowledged his lack of a criminal record and apology, but said the harm caused to the boys was “significant”.

He told Brogan: “You are a mature man who chose to act as you did.

“Your actions were clearly planned, were calculated and were the opposite of spontaneous.”

Brogan was also banned from contacting his victims and had his name added to the sex offenders’ register indefinitely.

Read more from Sky News:
Club apologises after ditching rainbow jerseys for Pride match
School failed to probe ‘130 violent incidents’ involving teen’s killer

Procurator Fiscal Faye Cook branded Brogan’s behaviour “predatory and despicable”.

She added: “He targeted young boys and exploited them for his own depraved ends.”

Detective Inspector Stephen Palmer said: “Brogan is a depraved sexual offender who gave no thought to his victims, just using them for his sexual gratification.

“These boys have been deeply impacted by his actions and I hope this sentence brings them some comfort.

“I want to acknowledge the strength of all who provided information to police in this case. Brogan’s conviction is down to them.”



Source link

Talarico faces backlash over alleged ‘mediocre Black man’ comment about Allred

0

NEWYou can now listen to Fox News articles!

A Texas Democrat running for Senate is facing backlash over his comments about his former opponent.

Morgan Thompson, a political influencer who posts on TikTok under the username @morga_tt, claimed that state Rep. James Talarico, a Democrat, referred to former Rep. Colin Allred, D-Texas, as a “mediocre Black man.” 

Thompson, who is Black, said the remark was made after a Jan. 12 town hall in Plano Texas. Talarico, who is now facing off against Rep. Jasmine Crockett, allegedly told Thompson that he “signed up to run against a mediocre Black man, not a formidable, intelligent Black woman.”

Talarico was reportedly referring to Allred as the “mediocre Black man” and Crockett as “a formidable, intelligent Black woman.” Allred had ended his campaign in early December as Crockett prepared to enter the race. She formally launched her bid for the Senate on Dec. 8, 2025, the same day Allred ended his campaign.

EX-SNL STAR BOWEN YANG, PODCAST CO-HOST WALK BACK COMMENTS CRITICIZING JASMINE CROCKETT’S SENATE CAMPAIGN

James Talarico and Colin Allred in a split image

James Talarico, who is facing off against Rep. Jasmine Crockett in the Democratic primary for the U.S. Senate nomination, was slammed for allegedly calling former Rep. Colin Allred a “mediocre Black man.” (Bob Daemmrich/The Texas Tribune/Bloomberg via Getty Images; Sergio Flores for The Washington Post via Getty Images)

In response to Fox News Digital’s request for comment, Talarico’s campaign pointed to a statement that was released after Thompson’s video went viral. In the statement, Talarico claimed that it was a “mischaracterization of a private conversation.”

“In my praise of Congresswoman Crockett, I described Congressman Allred’s method of campaigning as mediocre — but his life and service are not. I would never attack him on the basis of race,” Talarico’s statement read. “As a Black man in America, Congressman Allred has had to work twice as hard to get where he is. I understand how my critique of the Congressman’s campaign could be interpreted given this country’s painful legacy of racism, and I care deeply about the impact my words have on others.”

Talarico asserted that Democrats are “all on the same team” and said he “deeply” respects Allred.

Former Rep. Colin Allred of Texas is running for the Senate in 2026

Texas Democratic Senate candidate Colin Allred reacts at a campaign rally for Vice President Kamala Harris in Houston, Texas, on Oct. 25. (Reuters/Marco Bello)

CORNYN TORCHES DEMOCRATIC FIELD, SAYS PARTY NOW ‘RULED BY SOCIALISTS’

Allred, a former NFL linebacker, civil rights attorney and congressman, responded to Talarico in a video posted on X. He slammed Talarico for having “the temerity and the audacity” to make the remark to Thompson.

“First, let me give you some free advice James, if you want to compliment Black women, just do it,” Allred said in the video. “Just do it. Don’t do it while also tearing down a Black man, okay?”

“We’re tired of folks using praise for Black women to mask criticism for Black men. That’s not good for our community,” Allred added.

James Talarico and Jasmine Crockett shake hands

State Rep. James Talarico, a Democrat U.S. Senate candidate, left, and Rep. Jasmine Crockett, D-Texas, a U.S. Senate candidate, shake hands during a debate at the 2026 Texas AFL-CIO COPE Convention in Georgetown, Texas, on Saturday, Jan. 24, 2026.  (Bob Daemmrich/The Texas Tribune/Bloomberg via Getty Images)

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

The former congressman suggested that there was “a bit of confession” in Talarico’s remarks, saying “Maybe you used the word ‘mediocre’ because there was something creeping into your mind about yourself because I know you’re not talking about somebody who’s been better at three things than you’ve ever been at one.”

At the end of his video, Allred encouraged people to vote for Crockett, and said that Talarico “should not be our nominee for United States Senate.”

Crockett and Talarico will face off in the state’s March 3 primary. The winner will then run against Sen. John Cornyn, R-Texas.

Fox News Digital reached out to Crockett’s office for comment.



Source link

Kimwolf Botnet Lurking in Corporate, Govt. Networks

0

A new Internet-of-Things (IoT) botnet called Kimwolf has spread to more than 2 million devices, forcing infected systems to participate in massive distributed denial-of-service (DDoS) attacks and to relay other malicious and abusive Internet traffic. Kimwolf’s ability to scan the local networks of compromised systems for other IoT devices to infect makes it a sobering threat to organizations, and new research reveals Kimwolf is surprisingly prevalent in government and corporate networks.

Image: Shutterstock, @Elzicon.

Kimwolf grew rapidly in the waning months of 2025 by tricking various “residential proxy” services into relaying malicious commands to devices on the local networks of those proxy endpoints. Residential proxies are sold as a way to anonymize and localize one’s Web traffic to a specific region, and the biggest of these services allow customers to route their Internet activity through devices in virtually any country or city around the globe.

The malware that turns one’s Internet connection into a proxy node is often quietly bundled with various mobile apps and games, and it typically forces the infected device to relay malicious and abusive traffic — including ad fraud, account takeover attempts, and mass content-scraping.

Kimwolf mainly targeted proxies from IPIDEA, a Chinese service that has millions of proxy endpoints for rent on any given week. The Kimwolf operators discovered they could forward malicious commands to the internal networks of IPIDEA proxy endpoints, and then programmatically scan for and infect other vulnerable devices on each endpoint’s local network.

Most of the systems compromised through Kimwolf’s local network scanning have been unofficial Android TV streaming boxes. These are typically Android Open Source Project devices — not Android TV OS devices or Play Protect certified Android devices — and they are generally marketed as a way to watch unlimited (read:pirated) video content from popular subscription streaming services for a one-time fee.

However, a great many of these TV boxes ship to consumers with residential proxy software pre-installed. What’s more, they have no real security or authentication built-in: If you can communicate directly with the TV box, you can also easily compromise it with malware.

While IPIDEA and other affected proxy providers recently have taken steps to block threats like Kimwolf from going upstream into their endpoints (reportedly with varying degrees of success), the Kimwolf malware remains on millions of infected devices.

A screenshot of IPIDEA’s proxy service.

Kimwolf’s close association with residential proxy networks and compromised Android TV boxes might suggest we’d find relatively few infections on corporate networks. However, the security firm Infoblox said a recent review of its customer traffic found nearly 25 percent of them made a query to a Kimwolf-related domain name since October 1, 2025, when the botnet first showed signs of life.

Infoblox found the affected customers are based all over the world and in a wide range of industry verticals, from education and healthcare to government and finance.

“To be clear, this suggests that nearly 25% of customers had at least one device that was an endpoint in a residential proxy service targeted by Kimwolf operators,” Infoblox explained. “Such a device, maybe a phone or a laptop, was essentially co-opted by the threat actor to probe the local network for vulnerable devices. A query means a scan was made, not that new devices were compromised. Lateral movement would fail if there were no vulnerable devices to be found or if the DNS resolution was blocked.”

Synthient, a startup that tracks proxy services and was the first to disclose on January 2 the unique methods Kimwolf uses to spread, found proxy endpoints from IPIDEA were present in alarming numbers at government and academic institutions worldwide. Synthient said it spied at least 33,000 affected Internet addresses at universities and colleges, and nearly 8,000 IPIDEA proxies within various U.S. and foreign government networks.

The top 50 domain names sought out by users of IPIDEA’s residential proxy service, according to Synthient.

In a webinar on January 16, experts at the proxy tracking service Spur profiled Internet addresses associated with IPIDEA and 10 other proxy services that were thought to be vulnerable to Kimwolf’s tricks. Spur found residential proxies in nearly 300 government owned and operated networks, 318 utility companies, 166 healthcare companies or hospitals, and 141 companies in banking and finance.

“I looked at the 298 [government] owned and operated [networks], and so many of them were DoD [U.S. Department of Defense], which is kind of terrifying that DoD has IPIDEA and these other proxy services located inside of it,” Spur Co-Founder Riley Kilmer said. “I don’t know how these enterprises have these networks set up. It could be that [infected devices] are segregated on the network, that even if you had local access it doesn’t really mean much. However, it’s something to be aware of. If a device goes in, anything that device has access to the proxy would have access to.”

Kilmer said Kimwolf demonstrates how a single residential proxy infection can quickly lead to bigger problems for organizations that are harboring unsecured devices behind their firewalls, noting that proxy services present a potentially simple way for attackers to probe other devices on the local network of a targeted organization.

“If you know you have [proxy] infections that are located in a company, you can chose that [network] to come out of and then locally pivot,” Kilmer said. “If you have an idea of where to start or look, now you have a foothold in a company or an enterprise based on just that.”

This is the third story in our series on the Kimwolf botnet. Next week, we’ll shed light on the myriad China-based individuals and companies connected to the Badbox 2.0 botnet, the collective name given to a vast number of Android TV streaming box models that ship with no discernible security or authentication built-in, and with residential proxy malware pre-installed.

Further reading:

The Kimwolf Botnet is Stalking Your Local Network

Who Benefitted from the Aisuru and Kimwolf Botnets?

A Broken System Fueling Botnets (Synthient).



Source link

Access Denied

0

Access Denied You don’t have permission to access “http://hindi.gadgets360.com/mobiles/oppo-find-x10-pro-may-get-dual-200-megapixel-rear-camera-vivo-samsung-xiaomi-news-10941275” on this server.

Reference #18.8eaf0660.1770144868.1a3b0a62

https://errors.edgesuite.net/18.8eaf0660.1770144868.1a3b0a62

WPL Delhi Capitals reached final for fourth time after: Delhi Capitals team has reached the final for the fourth consecutive time in the Women’s Premier League.

0

Last Updated:

WPL 2026: In the eliminator of Women’s Premier League 2026, Delhi Capitals defeated Gujarat Giants by 7 wickets and made their place in the final. Delhi will face Royal Challengers Bangalore in the final. Delhi Capitals has reached the finals in the tournament for the fourth consecutive time. The journey to reach the final was not easy for Delhi, it had to face defeat in the initial match.

Delhi's dominance in WPL 2026, in the final for the fourth time, title battle with RCBZoom
Delhi Capitals reached the final for the fourth time

Vadodara: After strong bowling by Shinel Henry and Nandini Sharma, Delhi Capitals defeated Gujarat Giants in the women’s eliminator by 7 wickets due to strong batting. With this victory, Delhi Capitals got the ticket to the final for the fourth consecutive time. The Capitals will face a challenge from former champion Royal Challengers Bangalore in the final to be played on Thursday. After Jemimah Rodrigues’ team restricted the Giants to 168 runs for seven wickets, Delhi Capitals achieved the target by losing three wickets in 15.4 overs.

For Capitals, Liezel Lee contributed 43 runs in 24 balls, Shefali Verma 31 runs in 21 balls, captain Jemimah Rodrigues 41 runs in 23 balls and Laura Wolvaardt contributed 24 not out and 32 runs. While Liezel Lee and Shefali set the tone for the match with an aggressive partnership of 89 runs in 43 balls for the first wicket, Wolvaardt and Jemima did not let the good start go to waste by making a partnership of 68 runs in 42 balls for the third wicket. For the Giants, Georgia Wareham got two wickets while Rajeshwari Gaikwad got one wicket.

Beth Mooney’s strong start for Gujarat

Giants scored 168 runs for seven wickets on the basis of opener Beth Mooney’s brilliant unbeaten inning of 62 runs. Mooney, while holding one end, hit six fours in his 51-ball innings and made 61 runs in 46 balls with Georgia Wareham for the fifth wicket, while in the last overs, he made a partnership of 39 runs in 19 balls with Kashvi Gautam to take the team to a competitive score. Wareham scored 35 runs in 25 balls with three fours and a six while Kashvi hit three fours in his innings of 18 runs in 10 balls.

Lizel and Shefali batted brilliantly

Lizelle Lee and Shefali Verma gave a fast start to the Capitals while chasing the target. While Lee hit fours against Renuka Singh and Kashvi Gautam in the first two overs, Shefali sent the ball across the boundary line twice in Rajshwari Gaikwad’s over.

While Lizelle Lee hit a hat-trick four in the fifth over against Renuka, Shefli finished the over with two consecutive fours. The team scored 21 runs from this over. Lee continued his aggressive attitude against Rajshwari in the next over, hitting a four and the first six of the innings, taking the team’s score to 75 runs without any loss in the powerplay.

Jemimah Rodrigues did not do any mistake

This is the team’s best score in powerplay in the current season. Lizelle Lee and Shefali’s partnership of 89 runs in 43 balls was broken by Wareham by LBWing Lee in the eighth over. He also gave a double blow to the Capitals by bowling Shefali in the same over.

Laura Wolvaardt, who came to the crease, opened her hand by hitting a four against Kashvi, while captain Jemimah Rodrigues, after the passage of time at the crease, increased the pace of the match by hitting fours against Ashleigh Gardner and Sophie Devine. Jemima’s aggressive innings ended by getting caught by Divine while trying to play a big shot against Rajeshwari. However, before getting out, she had already ensured the team’s victory.

About the Author

Jitendra Kumar

Working as Chief Sub Editor in Network 18 Group since October 2025. 9 years experience in journalism. Started career with sports beat in ABP News Digital. Reputable institutions like India TV and Navbharat Times Group…read more

homecricket

Delhi’s dominance in WPL 2026, in the final for the fourth time, title battle with RCB

US-Iran conflict in Arabian Sea, US Navy shoots down drone coming near aircraft carrier

0

The US Navy has shot down an Iranian drone approaching an aircraft carrier in the Arabian Sea. According to Reuters report, an American official said that this drone was moving towards the American warship, which was seen as a threat. This incident came to light when talks on nuclear deal between America and Iran are about to begin in Türkiye this week.

According to the news agency, the name of this Iranian drone was Shaheed-139. It was targeted in the air by America’s F-35 fighter jet and shot down. However, there has been no reaction from Iran on the entire incident.

Earlier, Wall Street Journal had reported that Iranian armed boats had tried to stop an American oil tanker in the Strait of Hormuz. However, the tanker had increased its speed. It was then provided security by American warships.

The US has increased military activity around Iran in the last month

Let us tell you, in the last one month America has increased military deployment around Iran. America has deployed dozens of aircraft here. About a dozen warships have been deployed.

Let us tell you, the American aircraft carrier USS Abraham Lincoln along with three guided missile destroyers had entered the operation area of ​​the US Central Command on January 26. At present he is deployed in the Arabian Sea. America has deployed about 8 warships in these areas. These include destroyers deployed near the Strait of Hormuz. These activities have been recorded on the basis of American defense officials and satellite imagery.

Tension between America and Iran increased again due to Khamenei’s warning

Earlier, Iran’s Supreme Leader Ayatollah Ali Khamenei warned on Sunday (February 1, 2026) that if America attacks, this entire region could take the form of war. He termed the ongoing protests in Iran as a coup supported by America and Israel.

Khamenei said that the Iranian people are not afraid of any threat. He also added that Iran will not take the initiative to attack any country, but any attack will be given a strong response.

‘Vada Pav Girl’ Chandrika Dixit accused her husband of cheating, what did the family say?

0

Chandrika Dixit, popularly known as ‘Vada Pav Girl’ on social media, is in the news these days about her personal life. Chandrika has made serious allegations of cheating on her husband Yugam Gera. In a video that surfaced recently, she is seen crying bitterly and shouting angrily over her husband’s alleged affair.

Chandrika Dixit has been a contestant in Bigg Boss

In the video, she also showed the chats on her mobile phone, in which it is being claimed that her husband was talking to another woman. As soon as the video went viral, there was a stir on social media. Chandrika Dixit has been an ex-contestant in Bigg Boss. He has 5.88 lakh followers on Instagram. His videos keep going viral on social media.

I also have proof – Chandrika Dixit

Chandrika Dixit says in the video that she had never imagined such a situation in her marriage. He says that the person whom he trusted hurt him the most. In the caption of the video, Chandrika wrote, I also have the evidence, which clearly indicates that she has enough evidence to prove her allegations.

What did Chandrika Dixit’s family say?

Seeing this emotional video, a large number of people have come out in support of Chandrika. After posting the video on social media, when ABP News tried to contact Chandrika Dixit and her family members, her family members refused to talk about the matter in any way. When the ABP News team tried to talk to Chandrika Dixit, the family members said that her health was not good and she was taking rest.

ENG vs SL Jacob Bethell lethal England Beat Sri Lanka: In the last match of the three-match T20 series, England defeated Sri Lanka by 12 runs.

0

Last Updated:

England Beat Sri Lanka in 3rd T20I: England cricket team defeated Sri Lanka by 12 runs in a low scoring match and won the three-match series 3-0. Sam Curran demonstrated a strong performance in batting for England in this match. After this, Jacob Bethel gave his team a thrilling victory with excellent bowling.

England defeated Sri Lanka in the third T20 on the strength of Jacob Bethel and Will Jacques.Zoom
England beat Sri Lanka by 12 runs in the third T20.

New Delhi: With the lethal bowling of Jacob Bethel and Will Jacques, England defeated Sri Lanka by 12 runs in the third T20. With this victory, the England team wiped out Sri Lanka in the three-match series. The condition of England, who came to bat first in the match, was also bad. England somehow managed to reach the score of 128 runs at the loss of 9 wickets in the stipulated 20 overs game. It seemed that the Sri Lankan team would win comfortably in this low scoring match, but while chasing the target, it was limited to 116 runs in 19.3 overs.

Jacob Bethel bowled brilliantly for England in defense of the target of 129 runs. Bethele took four wickets for just 11 runs in 3.3 overs. Apart from this, Will Jacques also wreaked havoc in bowling. Will Jacques took 4 wickets for 14 runs in 4 overs. Adil Rashid, Luke Wood and Liam Dawson also took one wicket each. In this way the England team registered a thrilling victory in the last match.

Sri Lanka’s batting was bad

Sri Lanka’s batting was very poor in this match against England. For Sri Lanka, opener batsman Kamil Misara was out without opening the account. After this, Pathum Nissanka and Kusal Mendis definitely raised hopes for some time, but they too could not take the team towards victory. Nissanka scored 23 runs while Mendis scored 26 runs. Apart from this, Pawan Ratnayake contributed 13 runs, Kusal Mendis contributed 14 runs and Janith Liyanage contributed 17 runs.

Dushmantha Chameera’s claw became useless

Dushmantha Chameera performed brilliantly in bowling for Sri Lanka. In this match against England, Chameera took five wickets for 24 runs in 4 overs. This is the reason why the England team stopped at the score of 128 runs. Apart from this, Mathisa Pathirana also took 2 wickets in his account. Sam Curran showed tremendous performance in batting for England.

Amidst the continuous falling of wickets, Sam Curran scored 58 runs in 48 balls for his team and gave a respectable score to England. Apart from Sam Curran, Jos Buttler also scored 25 runs. Apart from this, Lian Dawson also contributed 14 runs. Apart from these three, not a single batsman from England could cross the double figures.

About the Author

Jitendra Kumar

Working as Chief Sub Editor in Network 18 Group since October 2025. 9 years experience in journalism. Started career with sports beat in ABP News Digital. Reputable institutions like India TV and Navbharat Times Group…read more

homecricket

England defeated Sri Lanka in the third T20 on the strength of Jacob Bethel and Will Jacques.