+91-9820096678
·
[email protected]
Mon - Sat 09:00-22:00
·
Mumbai
Chennai
Trusted By
10,000+ Clients
Free consultant

Day

February 18, 2025
Two security vulnerabilities have been discovered in the OpenSSH secure networking utility suite that, if successfully exploited, could result in an active machine-in-the-middle (MitM) and a denial-of-service (DoS) attack, respectively, under certain conditions. The vulnerabilities, detailed by the Qualys Threat Research Unit (TRU), are listed below – CVE-2025-26465 – The OpenSSH client
Read More
The Chinese state-sponsored threat actor known as Mustang Panda has been observed employing a novel technique to evade detection and maintain control over infected systems. This involves the use of a legitimate Microsoft Windows utility called Microsoft Application Virtualization Injector (MAVInject.exe) to inject the threat actor’s malicious payload into an external process, waitfor.exe,
Read More
Cybersecurity researchers are alerting to a new campaign that leverages web injects to deliver a new Apple macOS malware known as FrigidStealer. The activity has been attributed to a previously undocumented threat actor known as TA2727, with the information stealers for other platforms such as Windows (Lumma Stealer or DeerStealer) and Android (Marcher). TA2727 is...
Read More
The article ‘A Comparative Study of GATT and WTO’ by Snehil Sharma attempts to decode the similarities in the origin of GATT and WTO. This will impliedly assist in understanding how both the instruments dealing with trade initially, diversified the scope and area of international trade, thereby leading to its massive success today. The article...
Read More
Juniper Networks has released security updates to address a critical security flaw impacting Session Smart Router, Session Smart Conductor, and WAN Assurance Router products that could be exploited to hijack control of susceptible devices. Tracked as CVE-2025-21589, the vulnerability carries a CVSS v3.1 score of 9.8 and a CVS v4 score of 9.3. “An Authentication...
Read More
Is AI really reshaping the cyber threat landscape, or is the constant drumbeat of hype drowning out actual, more tangible, real-world dangers? According to Picus Labs’ Red Report 2025 which analyzed over one million malware samples, there’s been no significant surge, so far, in AI-driven attacks. Yes, adversaries are definitely continuing to innovate, and while...
Read More
The Code of Civil Procedure, 1908 (CPC) provides a well-defined structure for the adjudication of civil disputes. It lays down rules and procedures for the courts to follow while delivering justice. Among the key concepts under CPC are decree, judgment, and order, which form the backbone of civil litigation. Though these terms are often used...
Read More
The China-linked threat actor known as Winnti has been attributed to a new campaign dubbed RevivalStone that targeted Japanese companies in the manufacturing, materials, and energy sectors in March 2024. The activity, detailed by Japanese cybersecurity company LAC, overlaps with a threat cluster tracked by Trend Micro as Earth Freybug, which has been assessed to...
Read More
The case of Lalita v. Vishwanath & Ors., decided by the Supreme Court of India on January 30, 2025, concerns an appeal filed by the mother of the deceased against the acquittal of the accused persons by the High Court. The case involves allegations of abetment to suicide and cruelty under Sections 306 and 498A...
Read More
Prayagraj, February 16, 2025 – The Moot Court Team from Dr. Rajendra Prasad National Law University, Prayagraj (RPNLU) delivered an exceptional performance at the prestigious 3rd Deo Mangal National Moot Court Competition, organized by GNS University, Bihar. The competition, which took place from February 8 to 15, 2025, witnessed participation from 42 esteemed teams from...
Read More
1 2