+91-9820096678
·
[email protected]
Mon - Sat 09:00-22:00
·
Mumbai
Chennai
Trusted By
10,000+ Clients
Free consultant

Day

August 25, 2025
A China-nexus threat actor known as UNC6384 has been attributed to a set of attacks targeting diplomats in Southeast Asia and other entities across the globe to advance Beijing’s strategic interests. “This multi-stage attack chain leverages advanced social engineering including valid code signing certificates, an adversary-in-the-middle (AitM) attack, and indirect execution techniques to evade
Read More
Docker has released fixes to address a critical security flaw affecting the Docker Desktop app for Windows and macOS that could potentially allow an attacker to break out of the confines of a container. The vulnerability, tracked as CVE-2025-9074, carries a CVSS score of 9.3 out of 10.0. It has been addressed in version 4.44.3....
Read More
Cybersecurity researchers have flagged a new phishing campaign that’s using fake voicemails and purchase orders to deliver a malware loader called UpCrypter. The campaign leverages “carefully crafted emails to deliver malicious URLs linked to convincing phishing pages,” Fortinet FortiGuard Labs researcher Cara Lin said. “These pages are designed to entice recipients into downloading JavaScript
Read More
Cybersecurity today moves at the pace of global politics. A single breach can ripple across supply chains, turn a software flaw into leverage, or shift who holds the upper hand. For leaders, this means defense isn’t just a matter of firewalls and patches—it’s about strategy. The strongest organizations aren’t the ones with the most tools,...
Read More
Security Information and Event Management (SIEM) systems act as the primary tools for detecting suspicious activity in enterprise networks, helping organizations identify and respond to potential attacks in real time. However, the new Picus Blue Report 2025, based on over 160 million real-world attack simulations, revealed that organizations are only detecting 1 out of 7...
Read More
The advanced persistent threat (APT) actor known as Transparent Tribe has been observed targeting both Windows and BOSS (Bharat Operating System Solutions) Linux systems with malicious Desktop shortcut files in attacks targeting Indian Government entities. “Initial access is achieved through spear-phishing emails,” CYFIRMA said. “Linux BOSS environments are targeted via weaponized .desktop
Read More
One of the recurring questions in service jurisprudence is whether an employee who has retired from service can claim promotion with retrospective effect. This issue often arises when the Departmental Promotion Committee (DPC) is not convened in time, or when administrative delays prevent an eligible employee from being promoted before superannuation. While Article 16 of...
Read More
The offence of obstructing a public servant in the discharge of official duties has long been recognised under Indian criminal law. Section 186 of the Indian Penal Code, 1860 (IPC), now re-enacted as Section 221 of the Bharatiya Nyaya Sanhita, 2023 (BNS), criminalises any voluntary obstruction of a public servant in the discharge of their...
Read More
The Supreme Court of India in State Bank of India & Others v. Ramadhar Sao (Arising out of SLP(C) No. 6722 of 2023) delivered on 20 August 2025, examined critical issues concerning judicial interference in departmental inquiries, the scope of natural justice in disciplinary proceedings, and the proportionality of punishments in service jurisprudence. The case...
Read More
Whether you are a small start-up law firm, a large legal practice, or a mid-sized firm offering specialized services, search engine optimization is a must for your organization. In today’s highly digitalized world, everyone is on the internet, so being visible is no longer an option. Clients, including your target audience, are online and start...
Read More
1 2