+91-9820096678
·
admin@apslaw.co.in
Mon - Sat 09:00-22:00
·
Mumbai
Chennai
Trusted By
10,000+ Clients
Free consultant

Month

March 2024
The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) sanctioned three cryptocurrency exchanges for offering services used to evade economic restrictions imposed on Russia following its invasion of Ukraine in early 2022. This includes Bitpapa IC FZC LLC, Crypto Explorer DMCC (AWEX), and Obshchestvo S Ogranichennoy Otvetstvennostyu Tsentr Obrabotki Elektronnykh Platezhey (
Read More
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday placed three security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerabilities added are as follows – CVE-2023-48788 (CVSS score: 9.3) – Fortinet FortiClient EMS SQL Injection Vulnerability CVE-2021-44529 (CVSS score: 9.8) – Ivanti
Read More
Law Audience Journal is inviting submissions in the form of articles, research papers, short notes, book reviews & case comments for its Volume 5, Issue 5. About the Journal Law Audience Journal (e-ISSN: 2581-6705)’, is an online research scholarly Journal in the field of law. It is a double-blind peer-reviewed Journal. The frequency of this...
Read More
Unidentified adversaries orchestrated a sophisticated attack campaign that has impacted several individual developers as well as the GitHub organization account associated with Top.gg, a Discord bot discovery site. “The threat actors used multiple TTPs in this attack, including account takeover via stolen browser cookies, contributing malicious code with verified commits, setting up a custom
Read More
In January 2024, Microsoft discovered they’d been the victim of a hack orchestrated by Russian-state hackers Midnight Blizzard (sometimes known as Nobelium). The concerning detail about this case is how easy it was to breach the software giant. It wasn’t a highly technical hack that exploited a zero-day vulnerability – the hackers used a simple password spray...
Read More
A new security shortcoming discovered in Apple M-series chips could be exploited to extract secret keys used during cryptographic operations. Dubbed GoFetch, the vulnerability relates to a microarchitectural side-channel attack that takes advantage of a feature known as data memory-dependent prefetcher (DMP) to target constant-time cryptographic implementations and capture sensitive data
Read More
The Article explains ‘Important Judgments of 2024: Legal Bites Year Update’ and the cases related to the Electoral Bonds, Environmental Pollution Control Authority, Pension Rules, Delhi High Court’s decision in the context of Reebok India Company and so on. The author’s idea is to make all the readers well-versed with the case laws decided by...
Read More
The Iran-affiliated threat actor tracked as MuddyWater (aka Mango Sandstorm or TA450) has been linked to a new phishing campaign in March 2024 that aims to deliver a legitimate Remote Monitoring and Management (RMM) solution called Atera. The activity, which took place from March 7 through the week of March 11, targeted Israeli entities spanning global manufacturing,...
Read More
Delve into the legal framework and cultural myths shaping the vibrant celebration of Holi in India. Explore common misconceptions and legal nuances, ensuring a safe and enjoyable festival experience for all. Holi, the festival of colours, is a jubilant occasion celebrated with immense fervour across India. Amidst the kaleidoscope of hues and joyous revelry, there...
Read More
The North Korea-linked threat actor known as Kimsuky (aka Black Banshee, Emerald Sleet, or Springtail) has been observed shifting its tactics, leveraging Compiled HTML Help (CHM) files as vectors to deliver malware for harvesting sensitive data. Kimsuky, active since at least 2012, is known to target entities located in South Korea as well as North America, Asia,...
Read More
1 4 5 6 7 8 17