+91-9820096678
·
admin@apslaw.co.in
Mon - Sat 09:00-22:00
·
Mumbai
Chennai
Trusted By
10,000+ Clients
Free consultant

Day

May 13, 2024
The Supreme Court’s ruling in this case marks a crucial milestone in safeguarding women’s constitutional right to engage in the workforce and ensuring adequate state assistance for female government workers. Case Title: Shalini Dharmani v. State of Himachal Pradesh & Ors Court: Supreme Court of India Citation: Special Leave to Appeal (C) No.16864/2021 Judges: Hon’ble...
Read More
The MITRE Corporation has officially made available a new threat-modeling framework called EMB3D for makers of embedded devices used in critical infrastructure environments. “The model provides a cultivated knowledge base of cyber threats to embedded devices, providing a common understanding of these threats with the security mechanisms required to mitigate them,” the non-profit said
Read More
With the browser becoming the most prevalent workspace in the enterprise, it is also turning into a popular attack vector for cyber attackers. From account takeovers to malicious extensions to phishing attacks, the browser is a means for stealing sensitive data and accessing organizational systems. Security leaders who are planning their security architecture
Read More
In the last decade, there has been a growing disconnect between front-line analysts and senior management in IT and Cybersecurity. Well-documented challenges facing modern analysts revolve around a high volume of alerts, false positives, poor visibility of technical environments, and analysts spending too much time on manual tasks. The Impact of Alert Fatigue and False...
Read More
Cybersecurity researchers have disclosed multiple security flaws in Cinterion cellular modems that could be potentially exploited by threat actors to access sensitive information and achieve code execution. “These vulnerabilities include critical flaws that permit remote code execution and unauthorized privilege escalation, posing substantial risks to integral communication networks and IoT
Read More
The Black Basta ransomware-as-a-service (RaaS) operation has targeted more than 500 private industry and critical infrastructure entities in North America, Europe, and Australia since its emergence in April 2022. In a joint advisory published by the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the Department of Health and Human Services...
Read More
Centre of Studies in Banking and Finance at National Law University, Jodhpur is inviting submissions for all kinds of original and unpublished submissions from academicians, authors, legal professionals, and students towards publication in Scholasticus Volume XI, Issue II.  About Scholasticus Scholasticus (ISSN 0975-1157) is one of the earliest publications by National Law University, Jodhpur established with...
Read More
Cybersecurity researchers have identified a malicious Python package that purports to be an offshoot of the popular requests library and has been found concealing a Golang-version of the Sliver command-and-control (C2) framework within a PNG image of the project’s logo.  The package employing this steganographic trickery is requests-darwin-lite, which has been
Read More