+91-9820096678
·
admin@apslaw.co.in
Mon - Sat 09:00-22:00
·
Mumbai
Chennai
Trusted By
10,000+ Clients
Free consultant

Day

June 19, 2024
National Testing Agency on Wednesday announced the cancellation of the UGC-NET examination following prima facie indications that the integrity of the exam was compromised. The National Testing Agency (NTA) conducted the UGC NET June 2024 Examination in OMR (pen and paper) mode on 18th June 2024, across various cities in two shifts. However, on 19th...
Read More
Crypto exchange Kraken revealed that an unnamed security researcher exploited an “extremely critical” zero-day flaw in its platform to steal $3 million in digital assets and refused to return them. Details of the incident were shared by Kraken’s Chief Security Officer, Nick Percoco, on X (formerly Twitter), stating it received a Bug Bounty program alert...
Read More
The China-nexus cyber espionage actor linked to the zero-day exploitation of security flaws in Fortinet, Ivanti, and VMware devices has been observed utilizing multiple persistence mechanisms in order to maintain unfettered access to compromised environments. “Persistence mechanisms encompassed network devices, hypervisors, and virtual machines, ensuring alternative channels remain available
Read More
This article thoroughly explores the legal framework surrounding minors committing offences and highlights, through case laws, the various reasons why it is dangerous to let a minor drive a motor vehicle. Introduction Every other day an example has been setting up how dangerous it can be for a minor to drive a motor vehicle. Driving...
Read More
Are your tags really safe with Google Tag Manager? If you’ve been thinking that using GTM means that your tracking tags and pixels are safely managed, then it might be time to think again. In this article we look at how a big-ticket seller that does business on every continent came unstuck when it forgot...
Read More
Chinese-speaking users are the target of a never-before-seen threat activity cluster codenamed Void Arachne that employs malicious Windows Installer (MSI) files for virtual private networks (VPNs) to deliver a command-and-control (C&C) framework called Winos 4.0. “The campaign also promotes compromised MSI files embedded with nudifiers and deepfake pornography-generating software, as well as
Read More
A threat actor who goes by alias markopolo has been identified as behind a large-scale cross-platform scam that targets digital currency users on social media with information stealer malware and carries out cryptocurrency theft. The attack chains involve the use of a purported virtual meeting software named Vortax (and 23 other apps) that are used...
Read More
Two security vulnerabilities have been disclosed in the Mailcow open-source mail server suite that could be exploited by malicious actors to achieve arbitrary code execution on susceptible instances. Both shortcomings impact all versions of the software prior to version 2024-04, which was released on April 4, 2024. The issues were responsibly disclosed by SonarSource on...
Read More
Candidates preparing for Bihar Judicial Services Exam should solve the Bihar Judicial Services Exam Mains 2018 (Law of Evidence and Procedure) and other previous year question papers before they face Prelims and Mains. It also gives an idea about the syllabus and how to prepare the subjects by keeping the previous year’s questions in mind....
Read More