+91-9820096678
·
[email protected]
Mon - Sat 09:00-22:00
·
Mumbai
Chennai
Trusted By
10,000+ Clients
Free consultant

By

adminuser
Advocate for property transfer  DUE DILIGENCE TO BE DONE WHILE PURCHASING A  PROPERTY First comes in the checklist is the Zone.Check it whether the property comes into the “R” OR “NON-AGRICULTURE” zone because if the the property is in non residential or non agriculture zone like green zone etc.you may not get approvals from authorities...
Read More
Laws Applicable to Co-Operative Society The Cooperative Societies Act, 1912 expanded the sphere of cooperation between its members and provided for supervision by central organization. A cooperative society, which has its object the promotion of the economic interests of its members in accordance with the co-operative principles, may be registered with limited or unlimited liability...
Read More
SOCIETY FORMATION First general body meeting (before registration) In this meeting under Society’s Model Bye-law 3(iii), the Chief Promoter (could be the builder) is primarily selected by the promoters, who are members co-signing the registration application before the Registering Authority, under Bye-law 3(xii). In this meeting, necessary resolutions are passed like opening the account in...
Read More
REGISTRATION OF DEEMED CONVEYANCE On receipt of the Deemed Conveyance Order, the Deemed Conveyance between the Competent Authority & the Society is prepared. The Competent Authority appears in the Deed on behalf of the defaulting Land Owners & Property Developers. The Deemed Conveyance is submitted to the Office of Competent Authority for Approval & their...
Read More
What is Deemed Conveyance? The Promoter (Builder/ Developer) is legally required to convey the land and the building within 4 months of formation to the society or any legal body of the flat purchasers. However, it has been the experience that many promoters (Builders/Developers) have not conveyed the land and building to the legal bodies....
Read More
Cybersecurity researchers have disclosed details of an active malware campaign called Stealit that has leveraged Node.js’ Single Executable Application (SEA) feature as a way to distribute its payloads. According to Fortinet FortiGuard Labs, select iterations have also employed the open-source Electron framework to deliver the malware. It’s assessed that the malware is being propagated through
Read More
A threat actor known as Storm-2657 has been observed hijacking employee accounts with the end goal of diverting salary payments to attacker-controlled accounts. “Storm-2657 is actively targeting a range of U.S.-based organizations, particularly employees in sectors like higher education, to gain access to third-party human resources (HR) software as a service (SaaS) platforms like Workday,”...
Read More
Fortra on Thursday revealed the results of its investigation into CVE-2025-10035, a critical security flaw in GoAnywhere Managed File Transfer (MFT) that’s assessed to have come under active exploitation since at least September 11, 2025. The company said it began its investigation on September 11 following a “potential vulnerability” reported by a customer, uncovering “potentially...
Read More
The SOC of 2026 will no longer be a human-only battlefield. As organizations scale and threats evolve in sophistication and velocity, a new generation of AI-powered agents is reshaping how Security Operations Centers (SOCs) detect, respond, and adapt. But not all AI SOC platforms are created equal. From prompt-dependent copilots to autonomous, multi-agent systems, the...
Read More
Cybersecurity researchers have flagged a new set of 175 malicious packages on the npm registry that have been used to facilitate credential harvesting attacks as part of an unusual campaign. The packages have been collectively downloaded 26,000 times, acting as an infrastructure for a widespread phishing campaign codenamed Beamglea targeting more than 135 industrial, technology,...
Read More
1 11 12 13 14 15 126