+91-9820096678
·
[email protected]
Mon - Sat 09:00-22:00
·
Mumbai
Chennai
Trusted By
10,000+ Clients
Free consultant

Month

January 2025
January 24, 2025 – In a significant step towards advancing legal education and fostering academic collaboration, Dharmashastra National Law University (DNLU), Jabalpur, has signed a Memorandum of Understanding (MoU) with Maharashtra National Law University (NLU), Nagpur. The MoU was formally executed at a ceremony held at the NLU Nagpur campus in the presence of distinguished...
Read More
In legal parlance, the term “Dominus Litis” refers to the master or controller of the litigation. A plaintiff, being the one who initiates a lawsuit, is often regarded as the dominus litis of the case. This principle underscores the autonomy of the plaintiff in steering the course of the legal proceedings, including determining the parties...
Read More
A COMPLETE GUIDE TO DEEMED CONVEYANCE Most of the flat-owners of the newly constructed Societies/apartments do not have their sale deeds or conveyance deeds. Mostly in the newly constructed buildings, the builders provide for forming a housing co-operative society to which they shall transfer their interest in the property. Then the builders form the society...
Read More
Google has launched a new feature called Identity Check for supported Android devices that locks sensitive settings behind biometric authentication when outside of trusted locations. “When you turn on Identity Check, your device will require explicit biometric authentication to access certain sensitive resources when you’re outside of trusted locations,” Google said in a post announcing...
Read More
Faculty of Law, SGT University in collaboration with the Centre for Criminal Investigation and Forensic Science (CCISF), is excited to announce the launch of a comprehensive 1-Year Postgraduate Diploma in Criminology & Forensic Science. About the PG Diploma This program is designed to provide in-depth knowledge and practical skills in crime scene investigation, forensic analysis,...
Read More
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday placed a now-patched security flaw impacting the popular jQuery JavaScript library to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The medium-severity vulnerability is CVE-2020-11023 (CVSS score: 6.1/6.9), a nearly five-year-old cross-site scripting (XSS) bug that could be
Read More
The case revolves around the bail application of a foreign national, Aizaz Kilicheva, under judicial custody for alleged violations of the Foreigners Act, 1946 and the Indian Penal Code (IPC).  Case Title: Aizaz Kilicheva @ Aziza @ Maya v. State NCT of Delhi Court: High Court of Delhi, New Delhi Citation: Bail Application. 1872/2024 Bench:...
Read More
An exhaustive evaluation of three firewall models from Palo Alto Networks has uncovered a host of known security flaws impacting the devices’ firmware as well as misconfigured security features. “These weren’t obscure, corner-case vulnerabilities,” security vendor Eclypsium said in a report shared with The Hacker News. “Instead these were very well-known issues that we wouldn’t...
Read More
Cybersecurity researchers are calling attention to a new malware campaign that leverages fake CAPTCHA verification checks to deliver the infamous Lumma information stealer. “The campaign is global, with Netskope Threat Labs tracking victims targeted in Argentina, Colombia, the United States, the Philippines, and other countries around the world,” Leandro Fróes, senior threat research engineer at
Read More
Enterprise-grade Juniper Networks routers have become the target of a custom backdoor as part of a campaign dubbed J-magic. According to the Black Lotus Labs team at Lumen Technologies, the activity is so named for the fact that the backdoor continuously monitors for a “magic packet” sent by the threat actor in TCP traffic.  “J-magic...
Read More
1 7 8 9 10 11 29