+91-9820096678
·
[email protected]
Mon - Sat 09:00-22:00
·
Mumbai
Chennai
Trusted By
10,000+ Clients
Free consultant

Day

February 20, 2025
The Society For Constitutional Law Discussion (TSCLD) is hosting an online National Seminar on Constitutionalism in the Age of AI: Navigating the Algorithmic Maze, open for submissions until March 25th, 2025. About The Society For Constitutional Law Discussion In order to develop the culture of legal writing and discussion, some of the students of the Chanakya...
Read More
Freelance software developers are the target of an ongoing campaign that leverages job interview-themed lures to deliver cross-platform malware families known as BeaverTail and InvisibleFerret. The activity, linked to North Korea, has been codenamed DeceptiveDevelopment, which overlaps with clusters tracked under the names Contagious Interview (aka CL-STA-0240), DEV#POPPER, Famous Chollima,
Read More
A previously unknown threat activity cluster targeted European organizations, particularly those in the healthcare sector, to deploy PlugX and its successor, ShadowPad, with the intrusions ultimately leading to deployment of a ransomware called NailaoLocker in some cases. The campaign, codenamed Green Nailao by Orange Cyberdefense CERT, involved the exploitation of a new-patched security flaw
Read More
The payment card industry has set a critical deadline for businesses handling cardholder data or processing payments- by March 31, 2025, DMARC implementation will be mandatory! This requirement highlights the importance of preventative measures against email fraud, domain spoofing, and phishing in the financial space. This is not an optional requirement as non-compliance may result...
Read More
A malware campaign distributing the XLoader malware has been observed using the DLL side-loading technique by making use of a legitimate application associated with the Eclipse Foundation. “The legitimate application used in the attack, jarsigner, is a file created during the installation of the IDE package distributed by the Eclipse Foundation,” the AhnLab SEcurity Intelligence...
Read More
For decades, Microsoft Exchange has been the backbone of business communications, powering emailing, scheduling and collaboration for organizations worldwide. Whether deployed on-premises or in hybrid environments, companies of all sizes rely on Exchange for seamless internal and external communication, often integrating it deeply with their workflows, compliance policies and security frameworks
Read More
Citrix has released security updates for a high-severity security flaw impacting NetScaler Console (formerly NetScaler ADM) and NetScaler Agent that could lead to privilege escalation under certain conditions. The vulnerability, tracked as CVE-2024-12284, has been given a CVSS v4 score of 8.8 out of a maximum of 10.0 It has been described as a case...
Read More
Microsoft has released security updates to address two Critical-rated flaws impacting Bing and Power Pages, including one that has come under active exploitation in the wild. The vulnerabilities are listed below – CVE-2025-21355 (CVSS score: 8.6) – Microsoft Bing Remote Code Execution Vulnerability CVE-2025-24989 (CVSS score: 8.2) – Microsoft Power Pages Elevation of Privilege Vulnerability...
Read More
The use of red cards in sports not only serves as a psychological warning but also carries significant legal implications. In many sports, official regulations mandate the use of red cards to indicate serious infractions, ensuring standardized enforcement of rules and maintaining fair play. Historical Connection of Red to Danger Red has always been a...
Read More
Moot Court Society, National Law University Meghalaya is organizing its 2nd NLU Meghalaya National Moot Court Competition 2025-26, scheduled for the 25th and 26th of April 2025. About National Law University Meghalaya Nestled in the picturesque ‘Scotland of the East,’ National Law University Meghalaya (NLU Meg) is a premier institution dedicated to pioneering legal education...
Read More