+91-9820096678
·
[email protected]
Mon - Sat 09:00-22:00
·
Mumbai
Chennai
Trusted By
10,000+ Clients
Free consultant

Day

February 12, 2025
A subgroup within the infamous Russian state-sponsored hacking group known as Sandworm has been attributed to a multi-year initial access operation dubbed BadPilot that stretched across the globe. “This subgroup has conducted globally diverse compromises of Internet-facing infrastructure to enable Seashell Blizzard to persist on high-value targets and support tailored network operations,” the
Read More
Cybersecurity researchers have discovered a bypass for a now-patched security vulnerability in the NVIDIA Container Toolkit that could be exploited to break out of a container’s isolation protections and gain complete access to the underlying host. The new vulnerability is being tracked as CVE-2025-23359 (CVSS score: 8.3). It affects the following versions – NVIDIA Container...
Read More
In a major policy shift, the University Grants Commission (UGC) has officially discontinued its Consortium for Academic and Research Ethics (CARE) list of approved journals. The decision, aimed at streamlining academic research publications, introduces a decentralized model where Higher Educational Institutions (HEIs) will have the authority to assess and recognize journals independently. The move comes...
Read More
CISOs are finding themselves more involved in AI teams, often leading the cross-functional effort and AI strategy. But there aren’t many resources to guide them on what their role should look like or what they should bring to these meetings.  We’ve pulled together a framework for security leaders to help push AI teams and committees...
Read More
The North Korea-linked threat actor known as Kimsuky has been observed using a new tactic that involves deceiving targets into running PowerShell as an administrator and then instructing them to paste and run malicious code provided by them. “To execute this tactic, the threat actor masquerades as a South Korean government official and over time...
Read More
Microsoft on Tuesday released fixes for 63 security flaws impacting its software products, including two vulnerabilities that it said has come under active exploitation in the wild. Of the 63 vulnerabilities, three are rated Critical, 57 are rated Important, one is rated Moderate, and two are rated Low in severity. This is aside from the...
Read More
Bharatiya Sakshya Adhiniyam (BSA) – Solved High-Quality MCQs for Judiciary Prelims A ready compilation of 100 Bhartiya Sakshya Adhiniyam, (BSA) MCQs for ease and regularity of practice to enhance students’ understanding of the new criminal law and boost their preparation by familiarizing them with questions similar to the exam pattern of popular law and judiciary...
Read More
Ivanti has released security updates to address multiple security flaws impacting Connect Secure (ICS), Policy Secure (IPS), and Cloud Services Application (CSA) that could be exploited to achieve arbitrary code execution. The list of vulnerabilities is below – CVE-2024-38657 (CVSS score: 9.1) – External control of a file name in Ivanti Connect Secure before version...
Read More
Copyright is a legal right that grants creators exclusive rights over their literary, artistic, musical, and dramatic works. The Indian Copyright Act, 1957, governs copyright laws in India, providing a structured framework for the ownership, transfer, and protection of copyright. Understanding the ownership of copyright is crucial in determining who holds the rights over a...
Read More