back to top

Trending Content:

Babar Azam resigns as Pakistan crew captain

Pakistan batter Babar Azam. — AFP/File Pakistan skipper Babar Azam...

Assembly the Third-Social gathering Threat Necessities of 23 NY CRR | Cybersecurity

The NY CRR 500 laws was instituted by the...

Australia win toss, decide to bat in second T20I towards Pakistan

Pakistani bowler Sufyan Moqim bowls Australian gamers on the Sydney Cricket Floor in Sydney, Australia, on November 16, 2024. —Screengrab/ Geo Information

After profitable the toss, Australia opted to bat within the second T20I of three-match sequence towards Pakistan in Sydney on Saturday.

Australia lead the T20I sequence 1-0.

In a rain-hit T20I sequence opener, a dominant Australia secured victory by 29 runs after the bowlers sparked a Pakistan batting collapse at The Gabba on Thursday.

The Males in Inexperienced solely managed to attain 64/9 in pursuit of a frightening 94-run goal in seven overs.

Pakistan and Australia have competed 26 instances in T20Is with the previous having barely higher document, profitable 13 fixtures, in comparison with the latter’s 12, whereas one match led to no outcome.

Whole matches 26: Pakistan 13, Australia 12, No Consequence 1.

The final 5 matches have consecutively been received by Australia although.

Pakistans Mohammad Rizwan and Australias Josh Inglis at the toss. — X/@TheRealPCB_Live

Pakistan’s Mohammad Rizwan and Australia’s Josh Inglis on the toss. — X/@TheRealPCB_Live

Enjoying XI

Pakistan: Babar Azam, Mohammad Rizwan (capt, wk), Sahibzada Farhan, Usman Khan, Salman Ali Agha, Irfan Khan, Abbas Afridi, Shaheen Shah Afridi, Haris Rauf, Naseem Shah, Sufiyan Muqeem

Australia: Jake Fraser-McGurk, Matt Quick, Josh Inglis (capt, wk), Glenn Maxwell, Tim David, Marcus Stoinis, Aaron Hardie, Xavier Bartlett, Nathan Ellis, Adam Zampa, Spencer Johnson

This can be a creating story and is being up to date with extra particulars.

Latest

Why is Third-Celebration Threat Administration Essential in 2025? | Cybersecurity

Third-party danger administration is necessary as a result of...

What are Indicators of Assault (IOAs)? How they Differ from IOCs | Cybersecurity

Indicators of Assault (IOAs) exhibit the intentions behind a...

The Baseline Necessities of the RBI Cyber Safety Framework | Cybersecurity

Monetary establishments are amongst probably the most extremely focused...

What’s Risk Modelling? 10 Risk Identification Strategies Defined | Cybersecurity

Risk modelling is a course of for figuring out...

Newsletter

Don't miss

Selecting a Healthcare Cyber Threat Remediation Product in 2025 | Cybersecurity

Knowledge breaches within the Healthcare sector are on an...

6 Massive Influencers in Software program Outlined Networking | Cybersecurity

Software program-Outlined Networking (SDN) has change into a sizzling...

What’s an Impersonation Assault? | Cybersecurity

An impersonation assault is a sort of focused phishing...

LEAVE A REPLY

Please enter your comment!
Please enter your name here