+91-9820096678
·
admin@apslaw.co.in
Mon - Sat 09:00-22:00
·
Mumbai
Chennai
Trusted By
10,000+ Clients
Free consultant

Month

April 2024
New Delhi, India – April 20, 2024: The valedictory session of the National Conference on Implementation of Indian Knowledge System (IKS) in Contemporary Legal Education, organized by the Faculty of Law, University of Delhi in collaboration with the Bhartiya Bhasha Abhiyan, concluded on a high note at the Moot Court Hall of Umang Bhawan. Prof....
Read More
The threat actor known as ToddyCat has been observed using a wide range of tools to retain access to compromised environments and steal valuable data. Russian cybersecurity firm Kaspersky characterized the adversary as relying on various programs to harvest data on an “industrial scale” from primarily governmental organizations, some of them defense related, located in
Read More
Over the past two years, a shocking 51% of organizations surveyed in a leading industry report have been compromised by a cyberattack. Yes, over half.  And this, in a world where enterprises deploy an average of 53 different security solutions to safeguard their digital domain.  Alarming? Absolutely. A recent survey of CISOs and CIOs, commissioned by Pentera and
Read More
The MITRE Corporation revealed that it was the target of a nation-state cyber attack that exploited two zero-day flaws in Ivanti Connect Secure appliances starting in January 2024. The intrusion led to the compromise of its Networked Experimentation, Research, and Virtualization Environment (NERVE), an unclassified research and prototyping network. The unknown adversary “performed reconnaissance
Read More
Between crossovers – Do threat actors play dirty or desperate? In our dataset of over 11,000 victim organizations that have experienced a Cyber Extortion / Ransomware attack, we noticed that some victims re-occur. Consequently, the question arises why we observe a re-victimization and whether or not this is an actual second attack, an affiliate crossover...
Read More
New research has found that the DOS-to-NT path conversion process could be exploited by threat actors to achieve rootkit-like capabilities to conceal and impersonate files, directories, and processes. “When a user executes a function that has a path argument in Windows, the DOS path at which the file or folder exists is converted to an...
Read More
Microsoft has revealed that North Korea-linked state-sponsored cyber actors has begun to use artificial intelligence (AI) to make its operations more effective and efficient. “They are learning to use tools powered by AI large language models (LLM) to make their operations more efficient and effective,” the tech giant said in its latest report on East Asia hacking...
Read More
The concept of natural justice, also known as the law of nature or procedural fairness, indeed aims to ensure that legal proceedings are conducted fairly and justly. However, it extends beyond just trials. Although it is not expressly mentioned or discussed in any statute, the principle of natural justice holds the utmost significance. These principles...
Read More
Moot Court Society, Career College of Law is organising its 1st Fali S. Nariman Memorial National Moot Court Competition 2024, scheduled to be held from 17th – 19th May 2024. About the Moot Society Moot Court Society is a student-run committee in law, having its members constituting students of different years from BA.LLB. (5-years) courses...
Read More
A new information stealer has been found leveraging Lua bytecode for added stealth and sophistication, findings from McAfee Labs reveal. The cybersecurity firm has assessed it to be a variant of a known malware called RedLine Stealer owing to the fact that the command-and-control (C2) server IP address has been previously identified as associated with the malware....
Read More
1 4 5 6 7 8 20