iifl-logo

News Overview

Invest wise with Expert advice

By continuing, I accept the T&C and agree to receive communication on Whatsapp

Karvy Customer: For activating your account click here.
Download App
image

The power utility completed acquisition of 100% equity share capital of Surya Vidyut (SPV), wholly owned subsidiary of CESC.

image

On 16 March 2022

image

The Reserve Bank of India (RBI) has directed Paytm Payments Bank to stop, with immediate effect, onboarding of new customers.

image

Esquire Money Guarantees will hold a meeting of the Board of Directors of the Company on 8 March 2022

image

Nirmitee Robotics India will hold a meeting of the Board of Directors of the Company on 12 March 2022

image

Adani Ports Special Economic Zone has incorporated a a wholly owned subsidiary company HDC Bulk Terminal on 07 March 2022 The company has been incorporated for carrying out the project ie mechanization of Berth No 2 on Design Build Finance Operate Transfer DBFOT basis at Haldia Dock Complex Syama Prasad Mookerjee Port Kolkata

Download App
Knowledge Center
Logo

Logo IIFL Customer Care Number
(Gold/NCD/NBFC/Insurance/NPS)
1860-267-3000 / 7039-050-000

Logo IIFL Capital Services Support WhatsApp Number
+91 9892691696

Download The App Now

appapp
Loading...

Follow us on

facebooktwitterrssyoutubeinstagramlinkedintelegram

2026, IIFL Capital Services Ltd. All Rights Reserved

ATTENTION INVESTORS

RISK DISCLOSURE ON DERIVATIVES

Copyright © IIFL Capital Services Limited (Formerly known as IIFL Securities Ltd). All rights Reserved.

IIFL Capital Services Limited - Stock Broker SEBI Regn. No: INZ000164132, PMS SEBI Regn. No: INP000002213,IA SEBI Regn. No: INA000000623, SEBI RA Regn. No: INH000000248, DP SEBI Reg. No. IN-DP-185-2016, BSE Enlistment Number (RA): 5016
ARN NO : 47791 (AMFI Registered Mutual Fund & Specialized Investment Fund Distributor), PFRDA Reg. No. PoP 20092018

ISO certification icon
We are ISO/IEC 27001:2022 Certified.

This Certificate Demonstrates That IIFL As An Organization Has Defined And Put In Place Best-Practice Information Security Processes.