+91-9820096678
·
[email protected]
Mon - Sat 09:00-22:00
·
Mumbai
Chennai
Trusted By
10,000+ Clients
Free consultant

Day

January 28, 2025
A financially motivated threat actor has been linked to an ongoing phishing email campaign that has been ongoing since at least July 2024 specifically targeting users in Poland and Germany. The attacks have led to the deployment of various payloads, such as Agent Tesla, Snake Keylogger, and a previously undocumented backdoor dubbed TorNet that’s delivered...
Read More
Cybersecurity researchers have disclosed details of a now-patched account takeover vulnerability affecting a popular online travel service for hotel and car rentals. “By exploiting this flaw, attackers can gain unauthorized access to any user’s account within the system, effectively allowing them to impersonate the victim and perform an array of actions on their behalf –...
Read More
Triaging and investigating alerts is central to security operations. As SOC teams strive to keep up with ever-increasing alert volumes and complexity, modernizing SOC automation strategies with AI has emerged as a critical solution. This blog explores how an AI SOC Analyst transforms alert management, addressing key SOC challenges while enabling faster investigations and responses....
Read More
Cybersecurity researchers have found that ransomware attacks targeting ESXi systems are also leveraging the access to repurpose the appliances as a conduit to tunnel traffic to command-and-control (C2) infrastructure and stay under the radar. “ESXi appliances, which are unmonitored, are increasingly exploited as a persistence mechanism and gateway to access corporate networks widely,” Sygnia
Read More
While passwords remain the first line of defense for protecting user accounts against unauthorized access, the methods for creating strong passwords and protecting them are continually evolving. For example, NIST password recommendations are now prioritizing password length over complexity. Hashing, however, remains a non-negotiable. Even long secure passphrases should be hashed to prevent them
Read More
The Council of the European Union has sanctioned three individuals for allegedly carrying out “malicious cyber activities” against Estonia. The three Russian nationals – Nikolay Alexandrovich Korchagin, Vitaly Shevchenko, and Yuriy Fedorovich Denisov – are officers of the General Staff of the Armed Forces of the Russian Federation (GRU) Unit 29155, it said. Per the...
Read More
Criminal conspiracy, as a concept, can be legally defined as a situation wherein two or more individuals collude together to accomplish any specific object through unlawful means or commit a criminal act together. It is a settled position of law that any conspiracy turns into an offence once such agreement between the individuals is duly...
Read More
The case revolved around the refund of stamp duty under the Maharashtra Stamp Act, 1958. The judgment addressed the applicability of an amended limitation period for claiming refunds and the statutory powers of the Chief Controlling Revenue Authority (CCRA) to review its orders. Case Title: Harshit Harish Jain & Anr. v. State of Maharashtra &...
Read More
Indian Sale of Goods Act, 1930, governs the sale and transfer of goods in India. Delivery, under the Act, is a crucial aspect of transferring ownership and possession from the seller to the buyer. Section 2(2) of the Act defines delivery as “voluntary transfer of possession from one person to another.” The modes of delivery...
Read More
Essential Elements in a Conveyance Deed The term “Deed” means a written legal contract that binds the parties to its terms and can be proved in the court as evidence. The term ‘Conveyance’ is used when there is transfer of ownership or legal title in a property from one person to another. Hence, a conveyance...
Read More
1 2 3