+91-9820096678
·
[email protected]
Mon - Sat 09:00-22:00
·
Mumbai
Chennai
Trusted By
10,000+ Clients
Free consultant

By

adminuser
The expanding contours of sexual harassment law in India have provided crucial safeguards to victims, especially women and children. However, with this expansion comes the responsibility to delineate what kind of conduct legally constitutes sexual harassment or assault. In a landmark judgment delivered on 30 June 2025, the Bombay High Court’s Nagpur Bench examined whether...
Read More
Delhi Journal of Contemporary Law, Law Centre II, Faculty of Law, University of Delhi, invites submissions of well-researched articles, case comments, and other scholarly contributions for its forthcoming issue..  About the Journal Delhi Journal of Contemporary Law (e-ISSN 2582-4570) is an Online Journal of Law Centre II, Faculty of Law, University of Delhi. It is...
Read More
Maharashtra National Law University, Chhatrapati Sambhajinagar, is organising its 1st CCI-MNLUCS National Antitrust Moot Court Competition 2025 scheduled to be held on 6th–7th and 28th September 2025. About the University The Maharashtra National Law University, Chhatrapati Sambhajinagar, has been established under the Maharashtra National Law University Act, 2014, and is recognized by the BCI. It...
Read More
NVIDIA is urging customers to enable System-level Error Correction Codes (ECC) as a defense against a variant of a RowHammer attack demonstrated against its graphics processing units (GPUs). “Risk of successful exploitation from RowHammer attacks varies based on DRAM device, platform, design specification, and system settings,” the GPU maker said in an advisory released this...
Read More
Cybersecurity researchers have discovered a serious security issue that allows leaked Laravel APP_KEYs to be weaponized to gain remote code execution capabilities on hundreds of applications. “Laravel’s APP_KEY, essential for encrypting sensitive data, is often leaked publicly (e.g., on GitHub),” GitGuardian said. “If attackers get access to this key, they can exploit a deserialization flaw...
Read More
Fortinet has released fixes for a critical security flaw impacting FortiWeb that could enable an unauthenticated attacker to run arbitrary database commands on susceptible instances. Tracked as CVE-2025-25257, the vulnerability carries a CVSS score of 9.6 out of a maximum of 10.0. “An improper neutralization of special elements used in an SQL command (‘SQL Injection’)...
Read More
Cybersecurity researchers have discovered a set of four security flaws in OpenSynergy’s BlueSDK Bluetooth stack that, if successfully exploited, could allow remote code execution on millions of transport vehicles from different vendors. The vulnerabilities, dubbed PerfektBlue, can be fashioned together as an exploit chain to run arbitrary code on cars from at least three major...
Read More
The 2025 Data Risk Report: Enterprises face potentially serious data loss risks from AI-fueled tools. Adopting a unified, AI-driven approach to data security can help. As businesses increasingly rely on cloud-driven platforms and AI-powered tools to accelerate digital transformation, the stakes for safeguarding sensitive enterprise data have reached unprecedented levels. The Zscaler ThreatLabz
Read More
A recently disclosed maximum-severity security flaw impacting the Wing FTP Server has come under active exploitation in the wild, according to Huntress. The vulnerability, tracked as CVE-2025-47812 (CVSS score: 10.0), is a case of improper handling of null (”) bytes in the server’s web interface, which allows for remote code execution. It has been addressed...
Read More
An Iranian-backed ransomware-as-a-service (RaaS) named Pay2Key has resurfaced in the wake of the Israel-Iran-U.S. conflict last month, offering bigger payouts to cybercriminals who launch attacks against Israel and the U.S. The financially motivated scheme, now operating under the moniker Pay2Key.I2P, is assessed to be linked to a hacking group tracked as Fox Kitten (aka Lemon...
Read More
1 2 3 4 5 6 79