+91-9820096678
·
admin@apslaw.co.in
Mon - Sat 09:00-22:00
·
Mumbai
Chennai
Trusted By
10,000+ Clients
Free consultant

Day

May 22, 2024
Cybersecurity researchers have disclosed details of a previously undocumented threat group called Unfading Sea Haze that’s believed to have been active since 2018. The intrusion singled out high-level organizations in South China Sea countries, particularly military and government targets, Bitdefender said in a report shared with The Hacker News. “The investigation revealed a troubling
Read More
Rockwell Automation is urging its customers to disconnect all industrial control systems (ICSs) not meant to be connected to the public-facing internet to mitigate unauthorized or malicious cyber activity. The company said it’s issuing the advisory due to “heightened geopolitical tensions and adversarial cyber activity globally.” To that end, customers are required to take immediate
Read More
Since the first edition of The Ultimate SaaS Security Posture Management (SSPM) Checklist was released three years ago, the corporate SaaS sprawl has been growing at a double-digit pace. In large enterprises, the number of SaaS applications in use today is in the hundreds, spread across departmental stacks, complicating the job of security teams to protect organizations...
Read More
Cybersecurity researchers have discovered a new cryptojacking campaign that employs vulnerable drivers to disable known security solutions (EDRs) and thwart detection in what’s called a Bring Your Own Vulnerable Driver (BYOVD) attack. Elastic Security Labs is tracking the campaign under the name REF4578 and the primary payload as GHOSTENGINE. Previous research from Chinese
Read More
An unknown threat actor is exploiting known security flaws in Microsoft Exchange Server to deploy a keylogger malware in attacks targeting entities in Africa and the Middle East. Russian cybersecurity firm Positive Technologies said it identified over 30 victims spanning government agencies, banks, IT companies, and educational institutions. The first-ever compromise dates back to 2021....
Read More
Candidates preparing for the Jharkhand Judicial Services Exam should solve the Jharkhand Judicial Services Exam Mains 2014 (Paper-II) and other previous year question papers before they face Prelims and Mains. It also gives an idea about the syllabus and how to prepare the subjects by keeping the previous year’s questions in mind. All toppers are...
Read More
Candidates preparing for the Jharkhand Judicial Services Exam should solve the Jharkhand Judicial Services Exam Mains 2014 (Paper-I) and other previous year question papers before they face Prelims and Mains. It also gives an idea about the syllabus and how to prepare the subjects by keeping the previous year’s questions in mind. All toppers are...
Read More
Taiwanese company QNAP has rolled out fixes for a set of medium-severity flaws impacting QTS and QuTS hero, some of which could be exploited to achieve code execution on its network-attached storage (NAS) appliances. The issues, which impact QTS 5.1.x and QuTS hero h5.1.x, are listed below – CVE-2024-21902 – An incorrect permission assignment for critical resource
Read More
Popular enterprise services provider Zoom has announced the rollout of post-quantum end-to-end encryption (E2EE) for Zoom Meetings, with support for Zoom Phone and Zoom Rooms coming in the future. “As adversarial threats become more sophisticated, so does the need to safeguard user data,” the company said in a statement. “With the launch of post-quantum E2EE, we are...
Read More
Candidates preparing for the Jharkhand Judicial Services Exam should solve the Jharkhand Judicial Services Exam Mains 2014 (Paper-IV) and other previous year question papers before they face Prelims and Mains. It also gives an idea about the syllabus and how to prepare the subjects by keeping the previous year’s questions in mind. All toppers are...
Read More
1 2