+91-9820096678
·
admin@apslaw.co.in
Mon - Sat 09:00-22:00
·
Mumbai
Chennai
Trusted By
10,000+ Clients
Free consultant

Month

August 2024
Organizations in Kazakhstan are the target of a threat activity cluster dubbed Bloody Wolf that delivers a commodity malware called STRRAT (aka Strigoi Master). “The program selling for as little as $80 on underground resources allows the adversaries to take control of corporate computers and hijack restricted data,” cybersecurity vendor BI.ZONE said in a new...
Read More
The Loper Bright decision has yielded impactful results: the Supreme Court has overturned forty years of administrative law, leading to potential litigation over the interpretation of ambiguous laws previously decided by federal agencies. This article explores key questions for cybersecurity professionals and leaders as we enter a more contentious period of cybersecurity law. Background What...
Read More
Incident response is a structured approach to managing and addressing security breaches or cyber-attacks. Security teams must overcome challenges such as timely detection, comprehensive data collection, and coordinated actions to enhance readiness. Improving these areas ensures a swift and effective response, minimizing damage and restoring normal operations quickly. Challenges in incident
Read More
Gujarat National Law University (GNLU) is organizing the 9th GNLU Air and Space Law Academy GASLA 2024 Institute of Air Law, Space Law and Cyber Law and is accepting registration for the same. About GNLU Gujarat National Law University The Gujarat National Law University (GNLU) is an eminent public law school and a National Law...
Read More
A high-severity security bypass vulnerability has been disclosed in Rockwell Automation ControlLogix 1756 devices that could be exploited to execute common industrial protocol (CIP) programming and configuration commands. The flaw, which is assigned the CVE identifier CVE-2024-6242, carries a CVSS v3.1 score of 8.4. “A vulnerability exists in the affected products that allows a threat...
Read More
Cybersecurity researchers have discovered a new Android banking trojan called BlankBot targeting Turkish users with an aim to steal financial information. “BlankBot features a range of malicious capabilities, which include customer injections, keylogging, screen recording and it communicates with a control server over a WebSocket connection,” Intel 471 said in an analysis published last week.
Read More
The China-linked threat actor known as Evasive Panda compromised an unnamed internet service provider (ISP) to push malicious software updates to target companies in mid-2023, highlighting a new level of sophistication associated with the group. Evasive Panda, also known by the names Bronze Highland, Daggerfly, and StormBamboo, is a cyber espionage group that’s been active...
Read More
July 31, 2024 – In a historic move poised to reshape the intellectual property landscape in India, the Indian Centre for Child and Human Rights (ICCHR) proudly announces the establishment of the Centre for Development of Intellectual Property and Research (CDIPR). This groundbreaking initiative marks CDIPR as India’s first non-governmental research organization dedicated to the...
Read More
Sachin Mishra is a distinguished legal expert with over eight years of experience in indirect taxation and general litigation. His expertise goes beyond mere knowledge; he is a specialist in representing clients before courts, high courts, tribunals, and quasi-judicial authorities, ensuring adept handling of complex legal issues. Before establishing Legalyst Advocates, he made significant contributions to...
Read More
The U.S. Department of Justice (DoJ), along with the Federal Trade Commission (FTC), filed a lawsuit against popular video-sharing platform TikTok for “flagrantly violating” children’s privacy laws in the country. The agencies claimed the company knowingly permitted children to create TikTok accounts and to view and share short-form videos and messages with adults and others...
Read More
1 18 19 20 21 22 23