Israel says it is working to intercept missile launched from Yemen
Jun 28, 2025 10:14 AM IST
The Israeli army said on Saturday it had identified the launch of missile from Yemen toward Israeli territory, adding that the aerial defence systems were operating to intercept the threat. (Image for representation) Israel said it has identified the launch of missile from Yemen toward Israeli territory.(REUTERS)
Sirens sounded in several areas in Israel following the launch, the army posted on the Telegram messaging app.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Time of India
11 minutes ago
- Time of India
Iran buries top military commanders killed in Israel war; thousands join in ‘historic' funeral
Mourners attend the funeral ceremony of the Iranian armed forces generals, nuclear scientists and their family members who were killed in Israeli strikes in Tehran (Image credit: AP) Iran began a state funeral service in Tehran on Saturday for around 60 people, including military commanders killed in its war with Israel. It also honoured 14 nuclear scientists killed in an Israeli attack codenamed 'Operation Rising Lion. ' The proceedings started at 8:00 am local time (0430 GMT) in the capital as government offices and many businesses were closed for the occasion. Mourners gathered in the Islamic Revolution Square to honour the fallen commanders and scientists. Iranian state TV broadcasted footage of mourners dressed in black, waving Iranian flags and holding pictures of the killed military commanders. Iranian President Masoud Pezeshkian and other senior government officials also attended the event. Images showed coffins draped in Iranian flags and bearing portraits of the deceased commanders in uniform near Enghelab Square in central Tehran. According to Iran's health ministry, Israeli strikes have killed at least 627 civilians. Meanwhile, Israeli authorities say Iranian attacks have killed 28 people. 'Historic' state funeral: The ceremony is to be followed by a funeral procession to Azadi Square in Tehran. Mohsen Mahmoudi, head of Tehran's Islamic Development Coordination Council, described it as a 'historic day for Islamic Iran and the revolution.' by Taboola by Taboola Sponsored Links Sponsored Links Promoted Links Promoted Links You May Like Free P2,000 GCash eGift UnionBank Credit Card Apply Now Undo Among those killed is Mohammad Bagheri, a major general in Iran's Revolutionary Guards and the second-in-command of the armed forces. He will be buried alongside his wife and daughter, a journalist for a local media outlet, all killed in the Israeli attack. Nuclear scientist Mohammad Mehdi Tehranchi, also killed in the strikes, will be buried with his wife. Revolutionary Guards commander Hossein Salami, who was killed on the first day of the war, will also be laid to rest following Saturday's ceremony. Of the 60 people being buried, four are children.


Time of India
17 minutes ago
- Time of India
STF cracks task-based cyber scam: Mastermind, 2 held from Bhopal; victims lured via Telegram, duped of lakhs
LUCKNOW: In a significant breakthrough against rising online financial fraud, the Special Task Force (STF) of Uttar Pradesh arrested three accused — including the mastermind — from Bhopal, Madhya Pradesh, for operating a sophisticated cyber scam. The scam lured unsuspecting victims through social media platforms by promising handsome returns on completing fake 'tasks.' The trio was arrested on Friday from Danish Nagar, Hoshangabad Road, under Bagh Sewaniya police station limits, in a joint operation with Amethi Police. Additional SP, STF, Vishal Vikram Singh, who led the probe, said that the arrests followed a months-long investigation into a rapidly growing trend of task-based scams proliferating across Telegram and Facebook. "Victims were invited to join private Telegram groups via fraudulent links, where they were enticed to complete small digital 'tasks' in exchange for inflated financial rewards. Initial earnings were credited into fake wallets to build trust — but as victims invested more, they were trapped in an endless cycle of deposits, losing lakhs in the process," he said. The arrested accused have been identified as Shivansh Mishra (22) — the alleged mastermind, son of Shailendra Prasad Mishra, a resident of Ganeshganj, Suhagpur, Shahdol (M.P.), and a B. Pharma student at Bhabha University, Bhopal. Ravi Singh (23) — son of Vinod Singh, also from Suhagpur, Shahdol, and a close childhood friend and classmate of Shivansh. Umashankar Tiwari (43) — maternal uncle of Shivansh, residing at South Tatya Tope Nagar, Bhopal. He played a key role in procuring bank accounts using real and forged documents. Police also seized three mobile phones used for scam coordination, 16 debit cards linked to fraudulent bank accounts, 15 cheque books, nine bank passbooks, and 359 screenshots of incriminating WhatsApp conversations related to cyber fraud. One PAN card, one driving licence, and one IGT Solutions employee ID card were also seized. One of the complainants, Ashish Vikram Singh from Amethi, filed an FIR (No. 13/24) at the Cyber Crime Police Station, detailing how he was targeted. Ashish received a Facebook link promoting a 'work-from-home reward scheme.' Upon clicking, he was added to a Telegram group where he was assigned digital tasks. After depositing ₹10,000, he received a small bonus of ₹2,512, giving the appearance of legitimacy. Encouraged, Ashish completed 28 rounds of 'tasks,' seeing increasing fake rewards in his digital wallet. At one point, a balance of ₹9.13 lakh appeared in the account, and he was promised he could withdraw it after completing a final task worth Rs 3.16 lakh. But when he attempted to withdraw, he was told to deposit additional 'security amounts' — first Rs 2.25 lakh, then Rs 3 lakh more, and finally Rs 6.3 lakh for "VIP access." Ultimately, he was defrauded of Rs 13 lakh. ASP Singh said that during interrogation, Shivansh confessed that he and Ravi were recruited during a brief stint at a Bhopal call centre operated by IGT Solutions. There, they met cyber fraud recruiters — Zubair Khan, Saif Khan, and most crucially, Anil and Amit Nayar — who ran a parallel racket involving rented bank accounts. For every new bank account with full access kits (ATM card, cheque book, SIM card, login credentials), Shivansh and the team were paid Rs 15,000 and a share in the illicit earnings. They created nearly 50 bank accounts over the last year, often using forged documents or by convincing acquaintances. These accounts served as the primary money mules through which fraudulent deposits were laundered and withdrawn. Umashankar Tiwari, Shivansh's uncle, admitted to arranging for bank accounts and delivering complete kits to his nephew, who passed them on to the Nayar brothers. Recognising a pattern in multiple such fraud complaints across Uttar Pradesh, STF cyber units were tasked by Additional Superintendent of Police Vishal Vikram Singh to intensify intelligence gathering. Based on digital footprint tracking, technical analysis, and confidential tip-offs, a coordinated STF team — in collaboration with Amethi Police — raided the gang's hideout in Bhopal and arrested the three accused. Police said that efforts are ongoing to apprehend Anil Nayar, Amit Nayar, and others involved in this widespread scam. Police suspect the gang has operated across at least 200 fake bank accounts in the past year, defrauding victims across states. ASP Singh said the case highlights the alarming evolution of cybercrime in India — no longer limited to phishing emails or tech support scams, but now mimicking professional reward systems, task apps, and digital wallets to dupe individuals with promises of quick money. The STF has urged citizens to remain cautious and verify any online reward-based scheme before investing time or money. The STF has appealed to potential victims of similar task frauds to come forward and file complaints as further investigation into this pan-India racket continues.


Time of India
17 minutes ago
- Time of India
Watch: Israel resumes strikes on Hezbollah in Lebanon after ceasefire, releases attack footage
Israel resumed military operations on June 28, striking Hezbollah sites in Southern Lebanon after a brief ceasefire. Smoke rose from Nabatieh as Israeli forces released footage of the assault. The renewed conflict follows a US-brokered truce and ongoing tensions since Hezbollah's attacks in October 2023. Key Hezbollah leaders, including Hassan Nasrallah, were killed in earlier Israeli strikes. Show more Show less