+91-9820096678
·
[email protected]
Mon - Sat 09:00-22:00
·
Mumbai
Chennai
Trusted By
10,000+ Clients
Free consultant

Day

May 15, 2025
In a progressive and constitutionally significant verdict, the Madras High Court in K.V. Venugopal v. State of Tamil Nadu & Ors. [W.P. No. 15257 of 2025] categorically dismissed a caste-based claim for temple trusteeship. Delivered by Justice D. Bharatha Chakravarthy, the ruling struck down an attempt to restrict temple administration solely to members of a...
Read More
The law of limitation is founded on public policy and is intended to ensure that parties do not sleep on their rights. However, courts have discretionary powers to condone delays in filing legal proceedings if “sufficient cause” is shown. This article delves into the requirement of a “genuine cause” for condonation of delay, drawing from...
Read More
Interlocutory orders are temporary directions issued during the pendency of a suit, often concerning matters such as injunctions, maintenance, custody, etc. These orders are not final decisions on the merits but are intended to preserve the status quo or protect rights until the matter is fully adjudicated. A crucial question that arises in the appellate...
Read More
Imagine this: Your organization completed its annual penetration test in January, earning high marks for security compliance. In February, your development team deployed a routine software update. By April, attackers had already exploited a vulnerability introduced in that February update, gaining access to customer data weeks before being finally detected. This situation isn’t theoretical: it
Read More
The Bar Council of India (BCI) has officially notified the final set of rules regulating the registration and regulation of foreign lawyers and foreign law firms in India, as per the Gazette of India dated 13 May 2025. These rules are introduced by amending the Bar Council of India Rules, 2022, and shall come into...
Read More
The Goods and Services Tax (GST) regime, introduced in India on July 1, 2017, revolutionised the indirect taxation system by subsuming a myriad of Central and State taxes. One of the most crucial aspects of this tax regime is the levy of tax and the exemptions granted under specific circumstances. These two components define the...
Read More
Ransomware has evolved into a deceptive, highly coordinated and dangerously sophisticated threat capable of crippling organizations of any size. Cybercriminals now exploit even legitimate IT tools to infiltrate networks and launch ransomware attacks. In a chilling example, Microsoft recently disclosed how threat actors misused its Quick Assist remote assistance tool to deploy the destructive
Read More
A Russia-linked threat actor has been attributed to a cyber espionage operation targeting webmail servers such as Roundcube, Horde, MDaemon, and Zimbra via cross-site scripting (XSS) vulnerabilities, including a then-zero-day in MDaemon, according to new findings from ESET. The activity, which commenced in 2023, has been codenamed Operation RoundPress by the Slovak cybersecurity company. It...
Read More
Cybersecurity researchers have discovered a malicious package named “os-info-checker-es6” that disguises itself as an operating system information utility to stealthily drop a next-stage payload onto compromised systems. “This campaign employs clever Unicode-based steganography to hide its initial malicious code and utilizes a Google Calendar event short link as a dynamic dropper for its final
Read More
Google on Wednesday released updates to address four security issues in its Chrome web browser, including one for which it said there exists an exploit in the wild. The high-severity vulnerability, tracked as CVE-2025-4664 (CVSS score: 4.3), has been characterized as a case of insufficient policy enforcement in a component called Loader. “Insufficient policy enforcement...
Read More