+91-9820096678
·
[email protected]
Mon - Sat 09:00-22:00
·
Mumbai
Chennai
Trusted By
10,000+ Clients
Free consultant

By

adminuser
Threat actors are exploiting a nearly two-year-old security flaw in Apache ActiveMQ to gain persistent access to cloud Linux systems and deploy malware called DripDropper. But in an unusual twist, the unknown attackers have been observed patching the exploited vulnerability after securing initial access to prevent further exploitation by other adversaries and evade detection, Red...
Read More
Financial institutions like trading and brokerage firms are the target of a new campaign that delivers a previously unreported remote access trojan called GodRAT. The malicious activity involves the “distribution of malicious .SCR (screen saver) files disguised as financial documents via Skype messenger,” Kaspersky researcher Saurabh Sharma said in a technical analysis published today. The
Read More
A new exploit combining two critical, now-patched security flaws in SAP NetWeaver has emerged in the wild, putting organizations at risk of system compromise and data theft. The exploit in question chains together CVE-2025-31324 and CVE-2025-42999 to bypass authentication and achieve remote code execution, SAP security company Onapsis said. CVE-2025-31324 (CVSS score: 10.0) – Missing
Read More
This case concerns a dispute over the ownership and recovery of cinema equipment installed in a touring talkies, as well as whether the plaintiff’s suit for possession (or for recovery of the value) of such equipment was barred by limitation. The crucial legal question revolved around whether the cinema projector, diesel oil engine, and their...
Read More
In a significant ruling, the Supreme Court has clarified that non-signatories to an arbitration agreement have no right to attend arbitration proceedings and that courts become functus officio once an arbitrator is appointed under Section 11(6) of the Arbitration and Conciliation Act, 1996. The decision, arising from a family property dispute, sets aside a Delhi...
Read More
The Goods and Services Tax (GST) regime, implemented through the Central Goods and Services Tax Act, 2017 (CGST Act) and corresponding State GST laws, was designed to eliminate multiple layers of indirect taxation, simplify compliance, and ensure a uniform national market. One of its central administrative objectives is the single interface principle — ensuring that...
Read More
International economic sanctions have been a mainstay of foreign policy for a long time, used frequently to put pressure on without using military might. International economic sanctions may be applied to whole countries, particular entities, or individuals and are usually undertaken to persuade policy adjustments, punish breaches of global law, or promote international stability. Whereas...
Read More
The Hindu law is credited to be the most ancient law system (approximately 6000 years old). The entirety of the Hindu law is said to be derived from two major sources: Ancient or original sources: Shruti (the 4 Vedas – Rigveda, Yajurveda, Samveda, Atharvaveda), Smriti, digests and commentaries, customs and usages. Modern Sources: Equity, justice...
Read More
Gujarat Maritime University (GMU), in collaboration with the World Maritime University (WMU), U S Naval War College, World Maritime University – Sasakawa Global Ocean Institute (WMU-GOI), Ankara National Center for the Sea and Maritime Law (DEHUKAM), Japan Institute of International Affairs (JIIA), Centre for Climate Change Law and Governance (CLIMA) at the University of Copenhagen,...
Read More
In 1977, Odisha taxed bamboo and standing trees agreed to be severed at 10%, impacting bamboo supply and timber felling contracts. Contractors and mills filed 209 writ petitions, arguing these were immovable property or works contracts, not sales of goods. Case Title: State of Orissa & Others v. Titaghur Paper Mills Company Ltd. & Another...
Read More
1 37 38 39 40 41 127