+91-9820096678
·
[email protected]
Mon - Sat 09:00-22:00
·
Mumbai
Chennai
Trusted By
10,000+ Clients
Free consultant

Month

June 2025
In a groundbreaking ruling, the Bombay High Court has reaffirmed that a woman’s mental health, personal autonomy, and social circumstances are valid grounds for abortion even beyond the statutory 24-week period under the Medical Termination of Pregnancy Act, 1971. In ABC v. State of Maharashtra & Ors. [Writ Petition No. 7491 of 2025], the Court...
Read More
The Transfer of Property Act, 1882 (TPA), is a central statute governing the transfer of immovable property in India. Among its key provisions is Section 44, which enables a co-owner of a property to transfer their share. This has given rise to an important legal question: can a co-owner sell their undivided share in the...
Read More
The evolving landscape of gender identity in India continues to challenge entrenched norms in law and society. A critical question now being addressed by Indian courts is: can a transgender woman, legally recognised as female, invoke provisions under Section 498A of the Indian Penal Code (IPC), [now Section 84 of the Bharatiya Nyaya Sanhita (BNS)] against her...
Read More
The Bharatiya Nyaya Sanhita, 2023 (BNSS) includes several crucial chapters, among which the provisions on Offences Affecting Public Health, Safety, Convenience, Decency, and Morals stand out for their role in safeguarding collective well-being. These offences underscore the State’s duty to uphold public order and maintain societal norms. These provisions are designed to regulate behaviours that...
Read More
Cybersecurity researchers have disclosed a critical vulnerability in the Open VSX Registry (“open-vsx[.]org”) that, if successfully exploited, could have enabled attackers to take control of the entire Visual Studio Code extensions marketplace, posing a severe supply chain risk. “This vulnerability provides attackers full control over the entire extensions marketplace, and in turn, full control
Read More
Cisco has released updates to address two maximum-severity security flaws in Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) that could permit an unauthenticated attacker to execute arbitrary commands as the root user. The vulnerabilities, assigned the CVE identifiers CVE-2025-20281 and CVE-2025-20282, carry a CVSS score of 10.0 each. A description of the...
Read More
The ClickFix social engineering tactic as an initial access vector using fake CAPTCHA verifications increased by 517% between the second half of 2024 and the first half of this year, according to data from ESET. “The list of threats that ClickFix attacks lead to is growing by the day, including infostealers, ransomware, remote access trojans,...
Read More
SaaS Adoption is Skyrocketing, Resilience Hasn’t Kept Pace SaaS platforms have revolutionized how businesses operate. They simplify collaboration, accelerate deployment, and reduce the overhead of managing infrastructure. But with their rise comes a subtle, dangerous assumption: that the convenience of SaaS extends to resilience. It doesn’t. These platforms weren’t built with full-scale data
Read More
An Iranian state-sponsored hacking group associated with the Islamic Revolutionary Guard Corps (IRGC) has been linked to a spear-phishing campaign targeting journalists, high-profile cyber security experts, and computer science professors in Israel. “In some of those campaigns, Israeli technology and cyber security professionals were approached by attackers who posed as fictitious assistants to
Read More
Cybersecurity researchers are calling attention to a series of cyber attacks targeting financial organizations across Africa since at least July 2023 using a mix of open-source and publicly available tools to maintain access. Palo Alto Networks Unit 42 is tracking the activity under the moniker CL-CRI-1014, where “CL” refers to “cluster” and “CRI” stands for...
Read More
1 2 3 15