+91-9820096678
·
[email protected]
Mon - Sat 09:00-22:00
·
Mumbai
Chennai
Trusted By
10,000+ Clients
Free consultant

Day

April 24, 2025
If you’re a law student drowning in case law, legislation and journal articles, well, welcome to the club. Legal reading is not only time-consuming; it’s brutal. Between balancing lectures and assignments, and perhaps even a part-time job, finding the hours to read every single page of every single case? Yeah, not happening. But here’s the silver lining: You...
Read More
At least six organizations in South Korea have been targeted by the prolific North Korea-linked Lazarus Group as part of a campaign dubbed Operation SyncHole. The activity targeted South Korea’s software, IT, financial, semiconductor manufacturing, and telecommunications industries, according to a report from Kaspersky published today. The earliest evidence of compromise was first detected in
Read More
Prof. (Dr.) Usha Tandon delivers Insightful Keynote on BRICS and Climate Commitments; Leaders from Brazil, Russia, India, China, South Africa, Egypt, and Ethiopia Participate The BRICS Law Schools Consortium marked its academic debut on 25 April 2025 with an inaugural lecture by Sr. Prof. (Dr.) Usha Tandon, Hon’ble Vice Chancellor of Dr. Rajendra Prasad National...
Read More
As many as 159 CVE identifiers have been flagged as exploited in the wild in the first quarter of 2025, up from 151 in Q4 2024. “We continue to see vulnerabilities being exploited at a fast pace with 28.3% of vulnerabilities being exploited within 1-day of their CVE disclosure,” VulnCheck said in a report shared...
Read More
Cybersecurity researchers have demonstrated a proof-of-concept (PoC) rootkit dubbed Curing that leverages a Linux asynchronous I/O mechanism called io_uring to bypass traditional system call monitoring. This causes a “major blind spot in Linux runtime security tools,” ARMO said. “This mechanism allows a user application to perform various actions without using system calls,” the company said...
Read More
The threat actors behind the Darcula phishing-as-a-service (PhaaS) platform have released new updates to their cybercrime suite with generative artificial intelligence (GenAI) capabilities. “This addition lowers the technical barrier for creating phishing pages, enabling less tech-savvy criminals to deploy customized scams in minutes,” Netcraft said in a new report shared with The Hacker News. “
Read More
The Evolving Healthcare Cybersecurity Landscape  Healthcare organizations face unprecedented cybersecurity challenges in 2025. With operational technology (OT) environments increasingly targeted and the convergence of IT and medical systems creating an expanded attack surface, traditional security approaches are proving inadequate. According to recent statistics, the healthcare sector
Read More
A critical security flaw has been disclosed in the Commvault Command Center that could allow arbitrary code execution on affected installations. The vulnerability, tracked as CVE-2025-34028, carries a CVSS score of 9.0 out of a maximum of 10.0. “A critical security vulnerability has been identified in the Command Center installation, allowing remote attackers to execute...
Read More
The discourse on the legality of different forms of divorce under Muslim personal law in India gained renewed attention following the landmark Supreme Court judgment in Shayara Bano v. Union of India (2017), which declared instant triple talaq or Talaq-e-Biddat unconstitutional. However, confusion persists regarding other forms of Talaq, particularly Talaq-e-Ahsan, a more traditional and...
Read More
On April 24, 2025, Dharmashastra National Law University (DNLU) in Jabalpur convened a solemn condolence meeting to honor the victims of the recent Pahalgam terror attack in Jammu and Kashmir. The university community, led by Vice-hancellor Prof. (Dr.) Manoj Kumar Sinha and Registrar Dr. Praveen Tripathi, gathered to express grief and solidarity with the families...
Read More
1 2