+91-9820096678
·
[email protected]
Mon - Sat 09:00-22:00
·
Mumbai
Chennai
Trusted By
10,000+ Clients
Free consultant

By

adminuser
A team of academics has devised a novel attack that can be used to downgrade a 5G connection to a lower generation without relying on a rogue base station (gNB). The attack, per the ASSET (Automated Systems SEcuriTy) Research Group at the Singapore University of Technology and Design (SUTD), relies on a new open-source software...
Read More
Cybersecurity researchers are calling attention to a sophisticated social engineering campaign that’s targeting supply chain-critical manufacturing companies with an in-memory malware dubbed MixShell. The activity has been codenamed ZipLine by Check Point Research. “Instead of sending unsolicited phishing emails, attackers initiate contact through a company’s public ‘Contact Us’ form, tricking
Read More
Cyber threats and attacks like ransomware continue to increase in volume and complexity with the endpoint typically being the most sought after and valued target. With the rapid expansion and adoption of AI, it is more critical than ever to ensure the endpoint is adequately secured by a platform capable of not just keeping pace,...
Read More
A new large-scale campaign has been observed exploiting over 100 compromised WordPress sites to direct site visitors to fake CAPTCHA verification pages that employ the ClickFix social engineering tactic to deliver information stealers, ransomware, and cryptocurrency miners. The large-scale cybercrime campaign, first detected in August 2025, has been codenamed ShadowCaptcha by the Israel National
Read More
Cybersecurity researchers have discovered a new variant of an Android banking trojan called HOOK that features ransomware-style overlay screens to display extortion messages. “A prominent characteristic of the latest variant is its capacity to deploy a full-screen ransomware overlay, which aims to coerce the victim into remitting a ransom payment,” Zimperium zLabs researcher Vishnu Pratapagiri
Read More
The appellate process under the Code of Civil Procedure, 1908 (CPC), is designed not merely as a re-hearing of a case but as a structured examination of the correctness of trial court findings. One recurring question in appellate practice is whether parties can introduce new evidence at the appellate stage, a possibility regulated by Order...
Read More
The Consumer Protection Act, 1986 (“1986 Act”) has long been hailed as a landmark social welfare legislation designed to provide speedy and inexpensive remedies to consumers. However, the scheme of enforcement of consumer forum orders has often generated confusion, particularly after the 2002 Amendment substituted Section 25. The controversy centered on whether the expression “interim...
Read More
Family pension is a critical form of post-retirement social security designed to support the dependents of deceased government servants. The underlying purpose of the scheme is to prevent destitution among dependents who rely on the employee’s income. However, questions often arise as to which dependents qualify—especially in cases involving adult children with disabilities.  One particularly...
Read More
The Right to Education (RTE) is a fundamental right under Article 21-A of the Constitution of India, which ensures that every child has access to education as a basic necessity of life. It is not merely about classroom instruction but also about enabling holistic development, fostering equality, and nurturing human dignity. However, in practice, this...
Read More
The Supreme Court of India addressed a pressing issue in this case that has repeatedly plagued the judicial system: inordinate delays in pronouncing judgments after hearings are concluded. The matter stemmed from a criminal appeal that had been pending before the Allahabad High Court since 2008 and, despite being heard and reserved for judgment in...
Read More
1 31 32 33 34 35 127