logo
Martyrs in Israeli Shelling in Gaza

Martyrs in Israeli Shelling in Gaza

Saba Yemen12-05-2025
Gaza - Saba:
A number of Palestinians were killed and wounded on Sunday in Israeli artillery and airstrikes targeting a house in the Zeitoun neighborhood, east of Gaza City, and a civilian car in the Al-Amal neighborhood in Khan Yunis, south of the Gaza Strip.
The Palestine Today Agency reported that a father and his daughter were killed in an Israeli shelling of their home near Al-Abrar Mosque in the Zeitoun neighborhood, they were taken to the Baptist Hospital.
Whatsapp Telegram Email Print
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Death toll from enemy aggression on Gaza rises to 62,122 martyrs
Death toll from enemy aggression on Gaza rises to 62,122 martyrs

Saba Yemen

time4 hours ago

  • Saba Yemen

Death toll from enemy aggression on Gaza rises to 62,122 martyrs

Gaza – Saba: The death toll from the Israeli aggression on the Gaza Strip rose on Wednesday to 62,122 martyrs and 156,758 wounded since October 7, 2023. The daily statistical report on the number of martyrs and wounded as a result of the Israeli aggression on the Gaza Strip, received by the Yemeni News Agency (Saba), indicated that 58 martyrs (including two recovered martyrs) and 185 wounded arrived at Gaza Strip hospitals over the past 24 hours. The report stated that the death toll from the Israeli aggression on March 18, 2025, has reached 10,576 martyrs and 44,717 wounded. It indicated that a number of victims remain under the rubble and on the streets, as ambulance and civil defense crews are unable to reach them at this time.

A hacker tied to Yemen Cyber Army gets 20 months in prison
A hacker tied to Yemen Cyber Army gets 20 months in prison

Yemen Online

time8 hours ago

  • Yemen Online

A hacker tied to Yemen Cyber Army gets 20 months in prison

UK hacker Al-Tahery Al-Mashriky, tied to Yemen Cyber Army, gets 20 months in prison for website defacements and stolen data possession. Al-Tahery Al-Mashriky (26), a man from South Yorkshire, linked to the Yemen Cyber Army, has been sentenced to 20 months in prison for hacking and defacing websites in hacktivist campaigns. The UK's National Crime Agency (NCA) said he also possessed stolen user data. Law enforcement discovered the personal data and credentials of millions of people stored on Al-Mashriky's laptop. His actions, tied to politically motivated cyberattacks, highlight ongoing threats from hacktivist groups operating across borders. NCA arrested Al-Tahery Al-Mashriky arrested in August 2022 after U.S. intelligence linked him to extremist hacker groups Spider Team and Yemen Cyber Army. NCA investigators tied him to the group via social media and emails, while forensic analysis revealed he had hacked multiple sites, including Yemen's Ministries of Foreign Affairs and Security Media, as well as an Israeli news outlet. The Yemen Cyber Army (YCA) is a hacktivist group that has been active since 2015, declaring support for the Houthi movement in Yemen's conflict. It gained attention for defacing websites and leaking data, often targeting government agencies, media outlets, and organizations in Saudi Arabia and its allies. Its operations are primarily propaganda-driven, aiming to spread political messages rather than financial gain. While some researchers believe the group has ties to Iran-backed actors, the extent of this connection remains uncertain. Al-Mashriky claimed on a hacking forum that he had hacked 3,000 websites over a three-month period in 2022. 'His offending centred around gaining unauthorised access to the websites, then creating hidden webpages containing his online monikers and messaging that furthered his religious and political ideology.' reads the statement published by NCA. 'He would often target websites with low security, gaining kudos in the hacking community for the sheer number of infiltrations. Using one of his many online aliases, Al-Mashriky claimed on one cybercrime forum that he had hacked in to over 3,000 websites during a three month period in 2022.' On 17 March, the man pleaded guilty to nine offences and was sentenced to 20 months' imprisonment at the same court on 15 August. 'Al-Mashriky's attacks crippled the websites targeted, causing significant disruption to their users and the organisations, just so that he could push the political and ideological views of the 'Yemen Cyber Army'.' Deputy Director Paul Foster, head of the NCA's National Cyber Crime Unit, said. 'He had also stolen personal data that could have enabled him to target and defraud millions of people.' 'Cybercrime can often appear faceless, with the belief that perpetrators hide in the shadows and can avoid detection. However, as this investigation shows, the NCA has the technical capability to pursue and identify offenders like Al-Mashriky and bring them to justice.'

Al-Quds Brigades release footage of rocket strikes on Be'eri & Shokeda settlements near Gaza
Al-Quds Brigades release footage of rocket strikes on Be'eri & Shokeda settlements near Gaza

Saba Yemen

timea day ago

  • Saba Yemen

Al-Quds Brigades release footage of rocket strikes on Be'eri & Shokeda settlements near Gaza

Gaza – Saba: Al-Quds Brigades, the military wing of the Palestinian Islamic Jihad Movement, on Tuesday released footage documenting its fighters targeting the Be'eri and Shokeda settlements in the Gaza envelope with rockets. The video shows scenes of rocket preparation followed by their launch toward the designated targets. This operation comes as part of a series of actions carried out by Palestinian resistance factions against Israeli forces engaged in incursions across multiple fronts in Gaza Strip. Resistance factions in Gaza have consistently documented their operations against Israeli troops and military vehicles since the start of the ground offensive on October 27, 2023.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store