+91-9820096678
·
[email protected]
Mon - Sat 09:00-22:00
·
Mumbai
Chennai
Trusted By
10,000+ Clients
Free consultant

By

adminuser
Phishing attacks remain a huge challenge for organizations in 2025. In fact, with attackers increasingly leveraging identity-based techniques over software exploits, phishing arguably poses a bigger threat than ever before.  Attackers are increasingly leveraging identity-based techniques over software exploits, with phishing and stolen credentials (a byproduct of phishing) now the primary
Read More
Multiple suspected Russia-linked threat actors are “aggressively” targeting individuals and organizations with ties to Ukraine and human rights with an aim to gain unauthorized access to Microsoft 365 accounts since early March 2025. The highly targeted social engineering operations, per Volexity, are a shift from previously documented attacks that leveraged a technique known as device...
Read More
The enactment of the Bharatiya Nyaya Sanhita, 2023 (BNS), marks a significant shift in India’s criminal jurisprudence, replacing the colonial-era Indian Penal Code, 1860 (IPC). Among the various reforms introduced, the redefinition and consolidation of offences related to cheating stand out. This article delves into the legal nuances of cheating under the BNS, analysing its...
Read More
The Ripple cryptocurrency npm JavaScript library named xrpl.js has been compromised by unknown threat actors as part of a software supply chain attack designed to harvest and exfiltrate users’ private keys. The malicious activity has been found to affect five different versions of the package: 4.2.1, 4.2.2, 4.2.3, 4.2.4, and 2.14.2. The issue has been...
Read More
Google on Tuesday revealed that it will no longer offer a standalone prompt for third-party cookies in its Chrome browser as part of its Privacy Sandbox initiative. “We’ve made the decision to maintain our current approach to offering users third-party cookie choice in Chrome, and will not be rolling out a new standalone prompt for...
Read More
The Supreme Court’s decision in Samir Agrawal v. Competition Commission of India (2020) addressed pivotal issues under the Competition Act, 2002—primarily concerning the locus standi of informants and the legality of algorithmic pricing by app-based taxi services like Ola and Uber. Title of Case: Samir Agrawal v. Competition Commission of India & Ors. Court: Supreme...
Read More
The Income Tax Act, 1961, classifies income into five heads, one of which is “Income from House Property”. This head pertains to rental income or the notional income derived from owning a property. It applies even when the property is not actually rented out. The rules under this head are unique, as taxation is based...
Read More
Cybersecurity researchers have detailed a malware campaign that’s targeting Docker environments with a previously undocumented technique to mine cryptocurrency. The activity cluster, per Darktrace and Cado Security, represents a shift from other cryptojacking campaigns that directly deploy miners like XMRig to illicitly profit off the compute resources. This involves deploying a malware strain
Read More
Cybersecurity researchers have detailed a now-patched vulnerability in Google Cloud Platform (GCP) that could have enabled an attacker to elevate their privileges in the Cloud Composer workflow orchestration service that’s based on Apache Airflow. “This vulnerability lets attackers with edit permissions in Cloud Composer to escalate their access to the default Cloud Build service account,...
Read More
As SaaS and cloud-native work reshape the enterprise, the web browser has emerged as the new endpoint. However, unlike endpoints, browsers remain mostly unmonitored, despite being responsible for more than 70% of modern malware attacks. Keep Aware’s recent State of Browser Security report highlights major concerns security leaders face with employees using the web browser...
Read More
1 2 3 4 24