+91-9820096678
·
[email protected]
Mon - Sat 09:00-22:00
·
Mumbai
Chennai
Trusted By
10,000+ Clients
Free consultant

Month

January 2025
Threat actors are exploiting an unspecified zero-day vulnerability in Cambium Networks cnPilot routers to deploy a variant of the AISURU botnet called AIRASHI to carry out distributed denial-of-service (DDoS) attacks. According to QiAnXin XLab, the attacks have leveraged the security flaw since June 2024. Additional details about the shortcomings have been withheld to prevent further...
Read More
For a criminal trial to start, the registration of an FIR becomes necessary in the cognizable offences, which allows the police officer to arrest without a warrant; when it comes to the non-cognizable offences, the police cannot arrest without a warrant from the Magistrate [Section 174(2)]. It is considered one of the most important steps...
Read More
As GenAI tools and SaaS platforms become a staple component in the employee toolkit, the risks associated with data exposure, identity vulnerabilities, and unmonitored browsing behavior have skyrocketed. Forward-thinking security teams are looking for security controls and strategies to address these risks, but they do not always know which risks to prioritize. In some cases,...
Read More
U.S. President Donald Trump on Tuesday granted a “full and unconditional pardon” to Ross Ulbricht, the creator of the infamous Silk Road drug marketplace, after spending 11 years behind bars. “I just called the mother of Ross William Ulbricht to let her know that in honor of her and the Libertarian Movement, which supported me...
Read More
A previously undocumented China-aligned advanced persistent threat (APT) group named PlushDaemon has been linked to a supply chain attack targeting a South Korean virtual private network (VPN) provider in 2023, according to new findings from ESET. “The attackers replaced the legitimate installer with one that also deployed the group’s signature implant that we have named...
Read More
Oracle is urging customers to apply its January 2025 Critical Patch Update (CPU) to address 318 new security vulnerabilities spanning its products and services. The most severe of the flaws is a bug in the Oracle Agile Product Lifecycle Management (PLM) Framework (CVE-2025-21556, CVSS score: 9.9) that could allow an attacker to seize control of...
Read More
The rapid growth of e-commerce has revolutionized international trade, breaking down traditional barriers and enabling businesses to access global markets with ease. According to the United Nations Conference on Trade and Development (UNCTAD), global e-commerce sales reached $26.7 trillion in 2021, emphasizing the significance of this digital transformation. However, this surge presents both opportunities and...
Read More
Research methodology forms the backbone of systematic inquiry and analysis, guiding scholars in their pursuit of knowledge. One of the fundamental elements of research methodology is the identification and definition of the research problem. Properly defining the research problem is essential for the direction and focus of a study and the validity and relevance of...
Read More
Web infrastructure and security company Cloudflare on Tuesday said it detected and blocked a 5.6 Terabit per second (Tbps) distributed denial-of-service (DDoS) attack, the largest ever attack to be reported to date. The UDP protocol-based attack took place on October 29, 2024, targeting one of its customers, an unnamed internet service provider (ISP) from Eastern...
Read More
The doctrine of mens rea is derived from the Latin maxim ‘Actus non facit reum nisi mens sit rea’ which means an act alone does not make a man guilty unless his intentions were so. Coined by Lord Edward Coke, this principle emphasizes the necessity of a guilty mind in establishing criminal liability. Mens rea...
Read More
1 9 10 11 12 13 29