+91-9820096678
·
[email protected]
Mon - Sat 09:00-22:00
·
Mumbai
Chennai
Trusted By
10,000+ Clients
Free consultant

Month

January 2025
Reporters Without Borders published the WorldPress Freedom Index (WPFI) rankings for 2024 which should be seen as an alarming situation for India as India was ranked at 159th position out of a total of 180 countries. As compared to last year India’s ranking has improved by 2 but still India falls into the Dark Red...
Read More
The Supreme Court, in this judgment, recognized the failure of the judicial system to address his juvenility claim, a constitutional mandate rooted in the principle of reformation, rehabilitation, and reintegration of juveniles. Case Title: Om Prakash @ Israel @ Raju @ Raju Das vs. Union of India & Anr. Court: Supreme Court of India Citation:...
Read More
Alliance Centre for Intellectual Property Rights (ACIPR) under the aegis of Alliance School of Law, Alliance University, Bengaluru is organizing a National Workshop on IP Strategies for Startups on February 08th, 2025. About Alliance School of Law Alliance School of Law, Alliance University is approved by the Bar Council of India (BCI), New Delhi. The...
Read More
Palo Alto Networks has released software patches to address several security flaws in its Expedition migration tool, including a high-severity bug that an authenticated attacker could exploit to access sensitive data. “Multiple vulnerabilities in the Palo Alto Networks Expedition migration tool enable an attacker to read Expedition database contents and arbitrary files, as well as...
Read More
Cybersecurity researchers have uncovered a new, stealthier version of a macOS-focused information-stealing malware called Banshee Stealer. “Once thought dormant after its source code leak in late 2024, this new iteration introduces advanced string encryption inspired by Apple’s XProtect,” Check Point Research said in a new analysis shared with The Hacker News. “This development allows it...
Read More
As SaaS providers race to integrate AI into their product offerings to stay competitive and relevant, a new challenge has emerged in the world of AI: shadow AI.  Shadow AI refers to the unauthorized use of AI tools and copilots at organizations. For example, a developer using ChatGPT to assist with writing code, a salesperson...
Read More
Japan’s National Police Agency (NPA) and National Center of Incident Readiness and Strategy for Cybersecurity (NCSC) accused a China-linked threat actor named MirrorFace of orchestrating a persistent attack campaign targeting organizations, businesses, and individuals in the country since 2019. The primary objective of the attack campaign is to steal information related to Japan’s national
Read More
Ransomware isn’t slowing down—it’s getting smarter. Encryption, designed to keep our online lives secure, is now being weaponized by cybercriminals to hide malware, steal data, and avoid detection.The result? A 10.3% surge in encrypted attacks over the past year and some of the most shocking ransom payouts in history, including a $75 million ransom in...
Read More
Threat actors are attempting to take advantage of a recently disclosed security flaw impacting GFI KerioControl firewalls that, if successfully exploited, could allow malicious actors to achieve remote code execution (RCE). The vulnerability in question, CVE-2024-52875, refers to a carriage return line feed (CRLF) injection attack, paving the way for HTTP response splitting, which could...
Read More
The European General Court on Wednesday fined the European Commission, the primary executive arm of the European Union responsible for proposing and enforcing laws for member states, for violating the bloc’s own data privacy regulations. The development marks the first time the Commission has been held liable for infringing stringent data protection laws in the...
Read More
1 20 21 22 23 24 29