+91-9820096678
·
[email protected]
Mon - Sat 09:00-22:00
·
Mumbai
Chennai
Trusted By
10,000+ Clients
Free consultant

Month

April 2025
North Korea-linked threat actors behind the Contagious Interview have set up front companies as a way to distribute malware during the fake hiring process. “In this new campaign, the threat actor group is using three front companies in the cryptocurrency consulting industry—BlockNovas LLC (blocknovas[.] com), Angeloper Agency (angeloper[.]com), and SoftGlide LLC (softglide[.]co)—to spread
Read More
Since smartphones became more affordable over the past decade in India, the number of internet users has surged. As of early 2025, India has over 800 million internet users, accounting for approximately 55–58% of the population. Indians now spend an average of over six hours online daily, highlighting both increased connectivity and growing exposure to...
Read More
Threat actors are likely exploiting a new vulnerability in SAP NetWeaver to upload JSP web shells with the goal of facilitating unauthorized file uploads and code execution.  “The exploitation is likely tied to either a previously disclosed vulnerability like CVE-2017-9844 or an unreported remote file inclusion (RFI) issue,” ReliaQuest said in a report published this...
Read More
When we talk about identity in cybersecurity, most people think of usernames, passwords, and the occasional MFA prompt. But lurking beneath the surface is a growing threat that does not involve human credentials at all, as we witness the exponential growth of Non-Human Identities (NHIs).  At the top of mind when NHIs are mentioned, most...
Read More
Cybersecurity researchers have disclosed three security flaws in the Rack Ruby web server interface that, if successfully exploited, could enable attackers to gain unauthorized access to files, inject malicious data, and tamper with logs under certain conditions. The vulnerabilities, flagged by cybersecurity vendor OPSWAT, are listed below – CVE-2025-27610 (CVSS score: 7.5) – A path...
Read More
Cybersecurity researchers are warning about a new malware called DslogdRAT that’s installed following the exploitation of a now-patched security flaw in Ivanti Connect Secure (ICS). The malware, along with a web shell, were “installed by exploiting a zero-day vulnerability at that time, CVE-2025-0282, during attacks against organizations in Japan around December 2024,” JPCERT/CC researcher Yuma
Read More
If you’re a law student drowning in case law, legislation and journal articles, well, welcome to the club. Legal reading is not only time-consuming; it’s brutal. Between balancing lectures and assignments, and perhaps even a part-time job, finding the hours to read every single page of every single case? Yeah, not happening. But here’s the silver lining: You...
Read More
At least six organizations in South Korea have been targeted by the prolific North Korea-linked Lazarus Group as part of a campaign dubbed Operation SyncHole. The activity targeted South Korea’s software, IT, financial, semiconductor manufacturing, and telecommunications industries, according to a report from Kaspersky published today. The earliest evidence of compromise was first detected in
Read More
Prof. (Dr.) Usha Tandon delivers Insightful Keynote on BRICS and Climate Commitments; Leaders from Brazil, Russia, India, China, South Africa, Egypt, and Ethiopia Participate The BRICS Law Schools Consortium marked its academic debut on 25 April 2025 with an inaugural lecture by Sr. Prof. (Dr.) Usha Tandon, Hon’ble Vice Chancellor of Dr. Rajendra Prasad National...
Read More
As many as 159 CVE identifiers have been flagged as exploited in the wild in the first quarter of 2025, up from 151 in Q4 2024. “We continue to see vulnerabilities being exploited at a fast pace with 28.3% of vulnerabilities being exploited within 1-day of their CVE disclosure,” VulnCheck said in a report shared...
Read More
1 4 5 6 7 8 19