+91-9820096678
·
[email protected]
Mon - Sat 09:00-22:00
·
Mumbai
Chennai
Trusted By
10,000+ Clients
Free consultant

Month

May 2025
Cybersecurity researchers have shed light on a new malware campaign that makes use of a PowerShell-based shellcode loader to deploy a remote access trojan called Remcos RAT. “Threat actors delivered malicious LNK files embedded within ZIP archives, often disguised as Office documents,” Qualys security researcher Akshay Thorve said in a technical report. “The attack chain...
Read More
Modern apps move fast—faster than most security teams can keep up. As businesses rush to build in the cloud, security often lags behind. Teams scan code in isolation, react late to cloud threats, and monitor SOC alerts only after damage is done. Attackers don’t wait. They exploit vulnerabilities within hours. Yet most organizations take days...
Read More
Austrian privacy non-profit noyb (none of your business) has sent Meta’s Irish headquarters a cease-and-desist letter, threatening the company with a class action lawsuit if it proceeds with its plans to train users’ data for training its artificial intelligence (AI) models without an explicit opt-in. The move comes weeks after the social media behemoth announced...
Read More
Cryptocurrency exchange Coinbase has disclosed that unknown cyber actors broke into its systems and stole account data for a small subset of its customers. “Criminals targeted our customer support agents overseas,” the company said in a statement. “They used cash offers to convince a small group of insiders to copy data in our customer support...
Read More
In a progressive and constitutionally significant verdict, the Madras High Court in K.V. Venugopal v. State of Tamil Nadu & Ors. [W.P. No. 15257 of 2025] categorically dismissed a caste-based claim for temple trusteeship. Delivered by Justice D. Bharatha Chakravarthy, the ruling struck down an attempt to restrict temple administration solely to members of a...
Read More
The law of limitation is founded on public policy and is intended to ensure that parties do not sleep on their rights. However, courts have discretionary powers to condone delays in filing legal proceedings if “sufficient cause” is shown. This article delves into the requirement of a “genuine cause” for condonation of delay, drawing from...
Read More
Interlocutory orders are temporary directions issued during the pendency of a suit, often concerning matters such as injunctions, maintenance, custody, etc. These orders are not final decisions on the merits but are intended to preserve the status quo or protect rights until the matter is fully adjudicated. A crucial question that arises in the appellate...
Read More
Imagine this: Your organization completed its annual penetration test in January, earning high marks for security compliance. In February, your development team deployed a routine software update. By April, attackers had already exploited a vulnerability introduced in that February update, gaining access to customer data weeks before being finally detected. This situation isn’t theoretical: it
Read More
The Bar Council of India (BCI) has officially notified the final set of rules regulating the registration and regulation of foreign lawyers and foreign law firms in India, as per the Gazette of India dated 13 May 2025. These rules are introduced by amending the Bar Council of India Rules, 2022, and shall come into...
Read More
The Goods and Services Tax (GST) regime, introduced in India on July 1, 2017, revolutionised the indirect taxation system by subsuming a myriad of Central and State taxes. One of the most crucial aspects of this tax regime is the levy of tax and the exemptions granted under specific circumstances. These two components define the...
Read More
1 11 12 13 14 15 28