+91-9820096678
·
[email protected]
Mon - Sat 09:00-22:00
·
Mumbai
Chennai
Trusted By
10,000+ Clients
Free consultant

By

adminuser
Modern businesses face a rapidly evolving and expanding threat landscape, but what does this mean for your business? It means a growing number of risks, along with an increase in their frequency, variety, complexity, severity, and potential business impact. The real question is, “How do you tackle these rising threats?” The answer lies in having...
Read More
North Korean threat actors have been attributed to a coordinated cyber espionage campaign targeting diplomatic missions in their southern counterpart between March and July 2025. The activity manifested in the form of at least 19 spear-phishing emails that impersonated trusted diplomatic contacts with the goal of luring embassy staff and foreign ministry personnel with convincing...
Read More
A 22-year-old man from the U.S. state of Oregon has been charged with allegedly developing and overseeing a distributed denial-of-service (DDoS)-for-hire botnet called RapperBot. Ethan Foltz of Eugene, Oregon, has been identified as the administrator of the service, the U.S. Department of Justice (DoJ) said. The botnet has been used to carry out large-scale DDoS-for-hire...
Read More
Prayagraj, August 19, 2025 — Dr. Rajendra Prasad National Law University, Prayagraj has announced an open invitation for the composition of its University Anthem (Kulgeet). The initiative is aimed at fostering the institution’s cultural identity and honoring its academic and historical significance. Call for Original Compositions The University is inviting original, self-composed works in Hindi...
Read More
Threat actors are exploiting a nearly two-year-old security flaw in Apache ActiveMQ to gain persistent access to cloud Linux systems and deploy malware called DripDropper. But in an unusual twist, the unknown attackers have been observed patching the exploited vulnerability after securing initial access to prevent further exploitation by other adversaries and evade detection, Red...
Read More
Financial institutions like trading and brokerage firms are the target of a new campaign that delivers a previously unreported remote access trojan called GodRAT. The malicious activity involves the “distribution of malicious .SCR (screen saver) files disguised as financial documents via Skype messenger,” Kaspersky researcher Saurabh Sharma said in a technical analysis published today. The
Read More
A new exploit combining two critical, now-patched security flaws in SAP NetWeaver has emerged in the wild, putting organizations at risk of system compromise and data theft. The exploit in question chains together CVE-2025-31324 and CVE-2025-42999 to bypass authentication and achieve remote code execution, SAP security company Onapsis said. CVE-2025-31324 (CVSS score: 10.0) – Missing
Read More
The Goods and Services Tax (GST) regime, implemented through the Central Goods and Services Tax Act, 2017 (CGST Act) and corresponding State GST laws, was designed to eliminate multiple layers of indirect taxation, simplify compliance, and ensure a uniform national market. One of its central administrative objectives is the single interface principle — ensuring that...
Read More
In a significant ruling, the Supreme Court has clarified that non-signatories to an arbitration agreement have no right to attend arbitration proceedings and that courts become functus officio once an arbitrator is appointed under Section 11(6) of the Arbitration and Conciliation Act, 1996. The decision, arising from a family property dispute, sets aside a Delhi...
Read More
This case concerns a dispute over the ownership and recovery of cinema equipment installed in a touring talkies, as well as whether the plaintiff’s suit for possession (or for recovery of the value) of such equipment was barred by limitation. The crucial legal question revolved around whether the cinema projector, diesel oil engine, and their...
Read More
1 9 10 11 12 13 99