+91-9820096678
·
admin@apslaw.co.in
Mon - Sat 09:00-22:00
·
Mumbai
Chennai
Trusted By
10,000+ Clients
Free consultant

Month

September 2024
The company law framework is critical in ensuring the smooth operation of corporate entities. It provides a set of principles and regulations that protect the interests of stakeholders, promote transparency, and help corporate entities function effectively. Over time, several important doctrines have evolved under company law to address various legal concerns and establish foundational principles....
Read More
September 26, 2024 — JSA Advocates and Solicitors, one of India’s leading law firms, successfully defended Mercedes-Benz India Private Limited in a significant product liability case before the National Consumer Disputes Redressal Commission. The case, Mohd. Hyder Khan v. Mercedes-Benz India Private Limited & Anr., revolved around allegations of a manufacturing defect concerning airbag deployment...
Read More
A new set of security vulnerabilities has been disclosed in the OpenPrinting Common Unix Printing System (CUPS) on Linux systems that could permit remote command execution under certain conditions. “A remote unauthenticated attacker can silently replace existing printers’ (or install new ones) IPP urls with a malicious one, resulting in arbitrary command execution (on the...
Read More
As security technology and threat awareness among organizations improves so do the adversaries who are adopting and relying on new techniques to maximize speed and impact while evading detection. Ransomware and malware continue to be the method of choice by big game hunting (BGH) cyber criminals, and the increased use of hands-on or “interactive intrusion”...
Read More
The threat actor known as Storm-0501 has targeted government, manufacturing, transportation, and law enforcement sectors in the U.S. to stage ransomware attacks. The multi-stage attack campaign is designed to compromise hybrid cloud environments and perform lateral movement from on-premises to cloud environment, ultimately resulting in data exfiltration, credential theft, tampering, persistent
Read More
As You Like It, one of William Shakespeare’s most beloved comedies stands out for its exploration of love, identity, and pastoral life. Written between 1599 and 1600, the play presents a lighthearted yet insightful look into human nature through the lives of exiled nobles, mistaken identities, and complex romantic entanglements. Set in the idyllic Forest...
Read More
In today’s fast-evolving digital landscape, cybersecurity has become a cornerstone of organizational resilience. As cyber threats grow increasingly sophisticated, the demand for skilled cybersecurity professionals has never been higher. Whether you’re a seasoned cyber professional or just starting your journey, signing up for the GIAC Newsletter ensures you’re always informed and equipped for
Read More
Russian-speaking users have been targeted as part of a new campaign distributing a commodity trojan called DCRat (aka DarkCrystal RAT) by means of a technique known as HTML smuggling. The development marks the first time the malware has been deployed using this method, a departure from previously observed delivery vectors such as compromised or fake...
Read More
The U.S. government on Thursday sanctioned two cryptocurrency exchanges and unsealed an indictment against a Russian national for his alleged involvement in the operation of several money laundering services that were offered to cybercriminals. The virtual currency exchanges, Cryptex and PM2BTC, have been alleged to facilitate the laundering of cryptocurrencies possibly obtained through
Read More
This case concerns the dissolution of the marriage between Dharmendra Kumar and Usha Kumar, focusing on the enforcement of the restitution of conjugal rights and the subsequent petition for divorce under Section 13(1A)(ii) of the Hindu Marriage Act, 1955. The respondent-wife, Usha Kumar, was granted a decree for restitution of conjugal rights in 1973, and...
Read More
1 2 3 4 5 21