+91-9820096678
·
[email protected]
Mon - Sat 09:00-22:00
·
Mumbai
Chennai
Trusted By
10,000+ Clients
Free consultant

Day

April 21, 2025
Cybersecurity researchers have flagged a new malicious campaign related to the North Korean state-sponsored threat actor known as Kimsuky that exploits a now-patched vulnerability impacting Microsoft Remote Desktop Services to gain initial access. The activity has been named Larva-24005 by the AhnLab Security Intelligence Center (ASEC). “In some systems, initial access was gained through
Read More
There was a time when stepping into a courtroom inspired awe and respect. The black robe symbolized authority—not of force, but of justice; not of fear, but of fairness. Today, that very sanctity is being trampled upon, not just by hardened criminals, but by a rising breed of audacious minds who believe that intimidation can...
Read More
A new Android malware-as-a-service (MaaS) platform named SuperCard X can facilitate near-field communication (NFC) relay attacks, enabling cybercriminals to conduct fraudulent cashouts. The active campaign is targeting customers of banking institutions and card issuers in Italy with an aim to compromise payment card data, fraud prevention firm Cleafy said in an analysis. There is evidence...
Read More
The Indian Income Tax Act, 1961, classifies taxable income under five heads—one of the most significant being ‘Income from Salaries’. As the salaried class forms a substantial portion of India’s taxpayer base, understanding the legal framework surrounding this head of income is essential. The provisions for computation, exemptions, deductions, and tax treatment of salary are...
Read More
Dowry deaths remain a grim reality in India despite several legislative safeguards. With the enactment of the Bharatiya Sakshya Adhiniyam, 2023 (BSA), which replaces the Indian Evidence Act, 1872, the evidentiary presumptions surrounding dowry deaths have been preserved and updated to suit contemporary legal needs. This article delves into the presumption as to dowry death...
Read More
Territorial jurisdiction is a foundational principle in civil litigation. It ensures that a lawsuit is filed in a court that has a real and proximate connection to the dispute. In Intellectual Property (IP) matters, this often gets complicated when the plaintiff, typically a company with a widespread business presence, chooses to file a suit in...
Read More
Armed conflicts have devastating consequences for all civilians, but none more so than children. Their vulnerability—both physical and psychological—makes them disproportionately affected by the horrors of war. International Humanitarian Law (IHL), also known as the law of armed conflict, seeks to protect children in both international and non-international armed conflicts. Despite legal safeguards, violations against...
Read More
The problem is simple: all breaches start with initial access, and initial access comes down to two primary attack vectors – credentials and devices. This is not news; every report you can find on the threat landscape depicts the same picture.  The solution is more complex. For this article, we’ll focus on the device threat...
Read More
Jabalpur, April 20 – The curtains came down on REVA 2025, Dharmashastra National Law University’s much-anticipated academic-cum-cultural fest, with a vibrant finale marked by laughter, applause, and celebration. Held over three dynamic days, REVA emerged as a spirited confluence of legal intellect, youth innovation, and creative expression. Organised under the able leadership of Prof. (Dr.)...
Read More
Can a harmless click really lead to a full-blown cyberattack? Surprisingly, yes — and that’s exactly what we saw in last week’s activity. Hackers are getting better at hiding inside everyday actions: opening a file, running a project, or logging in like normal. No loud alerts. No obvious red flags. Just quiet entry through small...
Read More
1 2