+91-9820096678
·
[email protected]
Mon - Sat 09:00-22:00
·
Mumbai
Chennai
Trusted By
10,000+ Clients
Free consultant

Day

February 13, 2025
The Supreme Court of India’s ruling in Ashok Saxena v. State of Uttarakhand (2025) holds significant importance in criminal jurisprudence, particularly with the doctrine of transferred malice (also known as transmigration of motive) under Section 301 of the Indian Penal Code (IPC) [Currently, Section 102 of Bharatiya Nyaya Sanhita (BNS)]. The appeal stemmed from a...
Read More
A widespread phishing campaign has been observed leveraging bogus PDF documents hosted on the Webflow content delivery network (CDN) with an aim to steal credit card information and commit financial fraud. “The attacker targets victims searching for documents on search engines, resulting in access to malicious PDF that contains a CAPTCHA image embedded with a...
Read More
A nation-state threat actor with ties to North Korea has been linked to an ongoing campaign targeting South Korean business, government, and cryptocurrency sectors. The attack campaign, dubbed DEEP#DRIVE by Securonix, has been attributed to a hacking group known as Kimsuky, which is also tracked under the names APT43, Black Banshee, Emerald Sleet, Sparkling Pisces,...
Read More
Prayagraj, February 13, 2025 – Dr. Rajendra Prasad National Law University, Prayagraj (RPNLU) and the Institute of Constitutional and Parliamentary Studies (ICPS), Delhi, have signed a landmark Memorandum of Understanding (MoU) to foster academic and research collaboration in the areas of parliamentary procedures, constitutional law, and legislative drafting. A Step Towards Academic Excellence The MoU...
Read More
Jabalpur, February 12, 2025 – Centre for Advocacy, Practice, and Research on Intellectual Property (CAPRIP) at Dharmashastra National Law University (DNLU) successfully organized a thought-provoking talk session on February 12, 2025. The event featured a keynote address by Dr. Shibashish Giri, a renowned expert in endogenous stem cell research and regenerative therapies. The session was...
Read More
Ever felt like your team is stuck in a constant battle? Developers rush to add new features, while security folks worry about vulnerabilities. What if you could bring both sides together without sacrificing one for the other? We invite you to our upcoming webinar, “Opening the Fast Lane for Secure Deployments.” This isn’t another tech...
Read More
An RA World ransomware attack in November 2024 targeting an unnamed Asian software and services company involved the use of a malicious tool exclusively used by China-based cyber espionage groups, raising the possibility that the threat actor may be moonlighting as a ransomware player in an individual capacity. “During the attack in late 2024, the...
Read More
AI is everywhere now, transforming how businesses operate and how users engage with apps, devices, and services. A lot of applications now have some Artificial Intelligence inside, whether supporting a chat interface, intelligently analyzing data or matching user preferences. No question AI benefits users, but it also brings new security challenges, especially Identity-related security
Read More
The criminal proceedings when in their pre-trial stage entail the framing of charges. This step is taken by the court once it determines that there are sufficient prima facie grounds to believe that the accused may have committed the alleged offence. This step is crucial as it also depicts that the court is now moving...
Read More
Palo Alto Networks has addressed a high-severity security flaw in its PAN-OS software that could result in an authentication bypass. The vulnerability, tracked as CVE-2025-0108, carries a CVSS score of 7.8 out of 10.0. The score, however, drops to 5.1 if access to the management interface is restricted to a jump box. “An authentication bypass...
Read More
1 2