+91-9820096678
·
[email protected]
Mon - Sat 09:00-22:00
·
Mumbai
Chennai
Trusted By
10,000+ Clients
Free consultant

Month

August 2025
IFIM Law School, Bengaluru, in collaboration with the Karnataka Institute for Law and Parliamentary Reform (KILPAR), is organizing “Mukadama: The Pursuit of Justice” – the IFIM-KILPAR National Trial Advocacy Competition 2025, scheduled to be held from 10th to 12th October 2025. About the Event “Mukadama” – The Pursuit of Justice is IFIM-KILPAR’s Trial Advocacy Competition....
Read More
Asian Centre for International Arbitration and Mediation (ACIAM) and National Law Institute University (NLIU), Bhopal are organising the International Mediation Conference on “Bridging Access to Justice through Techniques, Technology & Institutions”, to be held on 5th September 2025 at Radisson Blu, Visakhapatnam. About ACIAM The Asian Centre for International Arbitration and Mediation (ACIAM) is a...
Read More
The Supreme Court of India in Gajanan Dattatray Gore v. State of Maharashtra & Anr. (2025 INSC 913) delivered a resounding message to courts and litigants alike—undertakings, especially monetary ones, cannot become a gateway to liberty in bail matters. The Supreme Court’s verdict marks a critical intervention in curbing a growing trend wherein accused persons...
Read More
Telecommunications organizations in Southeast Asia have been targeted by a state-sponsored threat actor known as CL-STA-0969 to facilitate remote control over compromised networks. Palo Alto Networks Unit 42 said it observed multiple incidents in the region, including one aimed at critical telecommunications infrastructure between February and November 2024. The attacks are characterized by the
Read More
Cybersecurity researchers have flagged a previously undocumented Linux backdoor dubbed Plague that has managed to evade detection for a year. “The implant is built as a malicious PAM (Pluggable Authentication Module), enabling attackers to silently bypass system authentication and gain persistent SSH access,” Nextron Systems researcher Pierre-Henri Pezier said. Pluggable Authentication Modules
Read More
SonicWall SSL VPN devices have become the target of Akira ransomware attacks as part of a newfound surge in activity observed in late July 2025. “In the intrusions reviewed, multiple pre-ransomware intrusions were observed within a short period of time, each involving VPN access through SonicWall SSL VPNs,” Arctic Wolf Labs researcher Julian Tuin said...
Read More
Cybersecurity researchers have disclosed a now-patched, high-severity security flaw in Cursor, a popular artificial intelligence (AI) code editor, that could result in remote code execution (RCE). The vulnerability, tracked as CVE-2025-54135 (CVSS score: 8.6), has been addressed in version 1.3 released on July 29, 2025. It has been codenamed CurXecute by Aim Labs, which previously disclosed
Read More
Cybersecurity researchers have detailed a new cluster of activity where threat actors are impersonating enterprises with fake Microsoft OAuth applications to facilitate credential harvesting as part of account takeover attacks. “The fake Microsoft 365 applications impersonate various companies, including RingCentral, SharePoint, Adobe, and Docusign,” Proofpoint said in a Thursday report. The
Read More
Cybersecurity researchers have flagged a malicious npm package that was generated using artificial intelligence (AI) and concealed a cryptocurrency wallet drainer. The package, @kodane/patch-manager, claims to offer “advanced license validation and registry optimization utilities for high-performance Node.js applications.” It was uploaded to npm by a user named “Kodane” on July 28, 2025. The
Read More
Just as triathletes know that peak performance requires more than expensive gear, cybersecurity teams are discovering that AI success depends less on the tools they deploy and more on the data that powers them The junk food problem in cybersecurity Imagine a triathlete who spares no expense on equipment—carbon fiber bikes, hydrodynamic wetsuits, precision GPS...
Read More
1 2