+91-9820096678
·
[email protected]
Mon - Sat 09:00-22:00
·
Mumbai
Chennai
Trusted By
10,000+ Clients
Free consultant

Day

April 23, 2025
Multiple threat activity clusters with ties to North Korea (aka Democratic People’s Republic of Korea or DPRK) have been linked to attacks targeting organizations and individuals in the Web3 and cryptocurrency space. “The focus on Web3 and cryptocurrency appears to be primarily financially motivated due to the heavy sanctions that have been placed on North...
Read More
The Iran-nexus threat actor known as UNC2428 has been observed delivering a backdoor known as MURKYTOUR as part of a job-themed social engineering campaign aimed at Israel in October 2024. Google-owned Mandiant described UNC2428 as a threat actor aligned with Iran that engages in cyber espionage-related operations. The intrusion set is said to have distributed...
Read More
Cybersecurity researchers have revealed that Russian military personnel are the target of a new malicious campaign that distributes Android spyware under the guise of the Alpine Quest mapping software. “The attackers hide this trojan inside modified Alpine Quest mapping software and distribute it in various ways, including through one of the Russian Android app catalogs,”...
Read More
Phishing attacks remain a huge challenge for organizations in 2025. In fact, with attackers increasingly leveraging identity-based techniques over software exploits, phishing arguably poses a bigger threat than ever before.  Attackers are increasingly leveraging identity-based techniques over software exploits, with phishing and stolen credentials (a byproduct of phishing) now the primary
Read More
Multiple suspected Russia-linked threat actors are “aggressively” targeting individuals and organizations with ties to Ukraine and human rights with an aim to gain unauthorized access to Microsoft 365 accounts since early March 2025. The highly targeted social engineering operations, per Volexity, are a shift from previously documented attacks that leveraged a technique known as device...
Read More
The enactment of the Bharatiya Nyaya Sanhita, 2023 (BNS), marks a significant shift in India’s criminal jurisprudence, replacing the colonial-era Indian Penal Code, 1860 (IPC). Among the various reforms introduced, the redefinition and consolidation of offences related to cheating stand out. This article delves into the legal nuances of cheating under the BNS, analysing its...
Read More
The Ripple cryptocurrency npm JavaScript library named xrpl.js has been compromised by unknown threat actors as part of a software supply chain attack designed to harvest and exfiltrate users’ private keys. The malicious activity has been found to affect five different versions of the package: 4.2.1, 4.2.2, 4.2.3, 4.2.4, and 2.14.2. The issue has been...
Read More
Google on Tuesday revealed that it will no longer offer a standalone prompt for third-party cookies in its Chrome browser as part of its Privacy Sandbox initiative. “We’ve made the decision to maintain our current approach to offering users third-party cookie choice in Chrome, and will not be rolling out a new standalone prompt for...
Read More
The Supreme Court’s decision in Samir Agrawal v. Competition Commission of India (2020) addressed pivotal issues under the Competition Act, 2002—primarily concerning the locus standi of informants and the legality of algorithmic pricing by app-based taxi services like Ola and Uber. Title of Case: Samir Agrawal v. Competition Commission of India & Ors. Court: Supreme...
Read More
The Income Tax Act, 1961, classifies income into five heads, one of which is “Income from House Property”. This head pertains to rental income or the notional income derived from owning a property. It applies even when the property is not actually rented out. The rules under this head are unique, as taxation is based...
Read More