+91-9820096678
·
[email protected]
Mon - Sat 09:00-22:00
·
Mumbai
Chennai
Trusted By
10,000+ Clients
Free consultant

Month

February 2025
Jabalpur, February 12, 2025 – Centre for Advocacy, Practice, and Research on Intellectual Property (CAPRIP) at Dharmashastra National Law University (DNLU) successfully organized a thought-provoking talk session on February 12, 2025. The event featured a keynote address by Dr. Shibashish Giri, a renowned expert in endogenous stem cell research and regenerative therapies. The session was...
Read More
Ever felt like your team is stuck in a constant battle? Developers rush to add new features, while security folks worry about vulnerabilities. What if you could bring both sides together without sacrificing one for the other? We invite you to our upcoming webinar, “Opening the Fast Lane for Secure Deployments.” This isn’t another tech...
Read More
An RA World ransomware attack in November 2024 targeting an unnamed Asian software and services company involved the use of a malicious tool exclusively used by China-based cyber espionage groups, raising the possibility that the threat actor may be moonlighting as a ransomware player in an individual capacity. “During the attack in late 2024, the...
Read More
AI is everywhere now, transforming how businesses operate and how users engage with apps, devices, and services. A lot of applications now have some Artificial Intelligence inside, whether supporting a chat interface, intelligently analyzing data or matching user preferences. No question AI benefits users, but it also brings new security challenges, especially Identity-related security
Read More
The criminal proceedings when in their pre-trial stage entail the framing of charges. This step is taken by the court once it determines that there are sufficient prima facie grounds to believe that the accused may have committed the alleged offence. This step is crucial as it also depicts that the court is now moving...
Read More
Palo Alto Networks has addressed a high-severity security flaw in its PAN-OS software that could result in an authentication bypass. The vulnerability, tracked as CVE-2025-0108, carries a CVSS score of 7.8 out of 10.0. The score, however, drops to 5.1 if access to the management interface is restricted to a jump box. “An authentication bypass...
Read More
Threat hunters have shed light on a new campaign targeting the foreign ministry of an unnamed South American nation with bespoke malware capable of granting remote access to infected hosts. The activity, detected in November 2024, has been attributed by Elastic Security Labs to a threat cluster it tracks as REF7707. Some of the other...
Read More
A subgroup within the infamous Russian state-sponsored hacking group known as Sandworm has been attributed to a multi-year initial access operation dubbed BadPilot that stretched across the globe. “This subgroup has conducted globally diverse compromises of Internet-facing infrastructure to enable Seashell Blizzard to persist on high-value targets and support tailored network operations,” the
Read More
Cybersecurity researchers have discovered a bypass for a now-patched security vulnerability in the NVIDIA Container Toolkit that could be exploited to break out of a container’s isolation protections and gain complete access to the underlying host. The new vulnerability is being tracked as CVE-2025-23359 (CVSS score: 8.3). It affects the following versions – NVIDIA Container...
Read More
In a major policy shift, the University Grants Commission (UGC) has officially discontinued its Consortium for Academic and Research Ethics (CARE) list of approved journals. The decision, aimed at streamlining academic research publications, introduces a decentralized model where Higher Educational Institutions (HEIs) will have the authority to assess and recognize journals independently. The move comes...
Read More
1 15 16 17 18 19 30