Headlines
  • At least five ballistic missile launches from Iran have been detected by the Israelis since midnight.
  • Mehrabad Airport in Tehran is hit by strikes
  • The Prince Sultan Air Base was the target of a ballistic missile that Saudi Arabia's military intercepted and destroyed, according to the country's defense ministry.
  • Heavy gunfire on Friday injured three peacekeepers from the United Nations Interim Force in Lebanon inside their base in southwest Lebanon.
  • To put an end to the bloodshed, UN Secretary-General António Guterres urged serious diplomatic negotiations..
  • In a social media post, President Trump said that "no deal" other than "unconditional surrender" will be with Iran.
  • Iran reportedly receives intelligence from Russia on US targets.

More Details

Most Workers in Southeast Asia’s Scam Centers Are Trafficked

This image released by Amnesty International on June 26, 2025, as part of a report on scam centers where it shows drone footage of a scamming compound with high perimeter walls, security cameras, and security guards.Copyright Amnesty International, 2024.

In the hubs spread throughout Cambodia, Myanmar, Laos, Philippines, and Malaysia, hundreds of thousands of trafficked people of different nationalities are allegedly forced into committing fraud.

The criminal networks mostly by Chinese mafia networks that recruit victims worldwide and employ them at facilities primarily in Cambodia, Myanmar, Laos, the Philippines, and Malaysia are frequently associated with the subterranean operations. Several victims are abducted and sold to other unscrupulous businesses.

A increasing number of scam centers have been found in Southeast Asia, where recruiters use the internet to groom victims and entice them to engage in bogus schemes. However, these recruits are also victims; they are coerced into criminal activity after being duped into accepting job offers in another country.

These criminal groups take potential labor migrants to scam centers located in remote areas after deceitfully recruiting them into employment that appear legal. After then, the victims are compelled to scam people into making investments in cryptocurrencies, video games, or other schemes.

Workers in scam centers put in 12 to 20 hours a day, six days a week, and receive little food or medical care. The employees have daily targets for how many individuals they can con, and they get punished if they fall short of those targets.They frequently risk being spanked, denied meals, or having their pay withheld if they miss the objective.

Workers at scam centers commit crimes by convincing their victims to make cryptocurrency investments or deposit funds into gaming accounts, which are subsequently retained by the groups operating the scam centers. Although the majority of employees in scam centers are forced to take part in these activities but some decide to stay due to the possibility of earning money.

Under threat of harsh punishment and continuous surveillance, workers spend long working hours creating fictitious social media personalities and participating in romantic or financial schemes.

Every worker is required to stay within the building at all times and Outsiders are not allowed in.Some people who attempt to flee are informed that they must find replacements or pay hefty fees to leave the place.

According to media reports,young people, usually between the ages of 15 and 25, are hired by the organization,especially those with IT and language skills.

These scam centers use cutting-edge technology to swiftly and successfully trick victims, increasing the profitability of their scams.Deepfake technology is being used by con artists to execute social engineering scams with alarming success rates, exploiting people’s emotions and trust.

Related Article

Fileless Malware

A type of malicious software known as "fileless malware" infects a computer by using reliable apps. ...
March 6, 2026

Process Hollowing

Using the covert malware injection technique known as “process hollowing,” an attacker suspends ...
March 5, 2026

Bring Your Own Device (BYOD)

Bring Your Own Device (BYOD) is a company policy or practice that permits workers to use their perso ...
March 4, 2026

Cyber Threat Hunting

The act of actively searching for hidden cyber threats in a computer network is known as "cyber thre ...
March 3, 2026

Hash-Based Message Authentication Code (HMAC)

A cryptographic hash function and a secret cryptographic key are used in the Hash-based Message Auth ...
March 2, 2026

Dictionary Attack: How to Avoid

A dictionary attack involves methodically inputting each word in a dictionary or word list as a pass ...
February 27, 2026

Other Article

Pick of the Day

UN Permanent Representative of Iran Briefs…

Amir Saeid Iravani, Permanent Representative of the Islamic Republic of Iran to the United Nations, ...
March 7, 2026
Bizzare News

Malaysian Man Holds Record for Having…

Malaysian Prathab Muniandy has ten more teeth than the typical human. This indicates that he has the ...
March 6, 2026
Pet Corner

Identify the Dog Breed

Identify dog and cat breeds using pictures.ideal match for you.Consider about these facts before pur ...
Prevent Cyber Crime

Fileless Malware

A type of malicious software known as "fileless malware" infects a computer by using reliable apps. ...
Pick of the Day

UN Security Council Meets on Energy,…

Chris Wright, Secretary of Energy of the United States and President of the United Nations Security ...
Bizzare News

Just Before it Collapses, New Jersey…

A horrifying collapse happened minutes after four Jersey Shore police officers were captured on came ...
March 5, 2026

Top