Cyber awareness

IntruceptLabs & Amrita Vishwa Vidyapeetham Signed MoU to Promote Cybersecurity Skilling & Innovation

On May 20, 2025 to promote Cybersecurity Education & Innovation, Intrucept Pvt Ltd & Amrita Vishwa Vidyapeetham signed MoU to promote Cybersecurity Education & Innovation.

The Memorandum of Understanding between Amrita Vishwa Vidyapeetham and Intrucept Private Limited aims to build a strong foundation in cybersecurity among the next gen of talent willing to join the industry.

The two entities will work together to create an educational environment conducive to the development of a wide range of cybersecurity-related competencies. This will create an effective system that beckons young talents for the training and development of the next generation of security professionals.

This partnership, facilitated by the Chennai Campus, will be applicable across all nine campuses of Amrita Vishwa Vidyapeetham. It underscores the commitment of Amrita’s TIFAC-CORE in Cyber Security to nurture the next generation of cybersecurity leaders.

Key Initiatives:

Align Programs with Industry Needs: Explore and implement measures to ensure academic programs meet the comprehensive requirements for data security in the industry.

Collaborative Research: Joint research projects will focus on developing cutting-edge cybersecurity solutions. 

Internships & Placements: Students will gain practical experience and career pathways through internships and placements offered by Intrucept. 

Industry Experts: Intrucept will contribute by hosting guest lectures and workshops on topics like cyber forensics, keeping students and faculty up-to-date with industry best practices. 

Curriculum Alignment: The collaboration will ensure that Amrita’s academic programs meet the evolving cybersecurity needs of the industry. 

Faculty Development: Intrucept will support training and certification programs to enhance the skills of Amrita’s faculty in cybersecurity. 

As the cybersecurity market in India expands, there is a growing need for qualified and highly skilled cybersecurity professionals.

This collaboration aims to empower students with in-demand cybersecurity skills, industry-recognized training, and hands-on experience with real-world cyber threats and protection strategies.

Special thanks and gratitude to representative who facilitated this initiative :

The MoU was formally inked by Shri C Parameswaran, Principal Director, Corporate & Industry Relations, Amrita Vishwa Vidyapeetham, and Shri Satish Krishna, Chief Operating Officer & Co-founder of Intrucept Pvt Ltd. The signing ceremony held at Intrucept, Bangalore was attended by key representatives including Dr. K Venkatesan, Assistant Professor (Cybersecurity); Ms. Bhanumathi KS, Principal Security Advisor, Intrucept; and Mr. Nitin S, Principal Consultant Cybersecurity, Intrucept.

7Zip Mark-Of-The-Web Vulnerability

A high severity vulnerability in 7-Zip is exploiting in the wild. This vulnerability, identified as a Mark-of-the-Web (MoTW) bypass, allows attackers to craft a double archive file that, when extracted, bypasses MoTW protections.

OEM7Zip
SeverityHigh
CVSS7.0
CVEsCVE-2025-0411
Exploited in WildYes
Patch/Remediation AvailableYes
Advisory Version1.0

Overview

The vulnerability enables threat actors to create archives containing malicious scripts or executables, which, due to the flaw, will not receive the usual MoTW protection.

This exposes Windows users to potential attacks and has recently been added to the CISA Known Exploited Vulnerabilities Catalog. Furthermore, a Proof of Concept (PoC) for this vulnerability has been publicly released, increasing the risk of exploitation.

7-Zip vulnerability allows attackers to bypass the Mark of the Web (MotW) Windows security feature and was exploited by Russian hackers as a zero-day since September 2024.

Vulnerability NameCVE IDProduct AffectedSeverity
  MOTW Bypass vulnerability  CVE-2025-0411  7zip  High

Technical Summary

This vulnerability bypasses the Mark-of-the-Web (MoTW) feature, a security measure in Windows operating systems that flags files originating from the internet as potentially untrusted. MoTW is typically applied to files like downloaded documents, images, or executable files, which prompts a warning when opened. However, this vulnerability occurs when 7-Zip fails to properly propagate MoTW protections to files inside double-encapsulated archives.

An attacker can craft an archive containing another archive (a “double archive”), and 7-Zip did not properly propagate MoTW protections to the content to the inner archive.

This flaw allows any malicious content in the inner archive to be executed without triggering any security warnings. Consequently, this exposes Windows users to the risk of remote code execution and other malicious activities.

CVE IDSystem AffectedVulnerability DetailsImpact
CVE-2025-04117Zip Prior to v24.09    This flaw allows attackers to execute arbitrary code through double-encapsulated archives that bypass MoTW protections.Arbitrary remote code injection, potential system compromise

Remediation:

Update 7zip to v24.09 or the latest version. Installing the latest version will ensure that vulnerability is addressed, protecting systems from potential exploitation.

Generic Recommendations

  • Exercise Caution with File Extraction: Always verify the source before extracting files, especially from unfamiliar or untrusted sources.
  • Enhance User Awareness: Educate users on identifying phishing attempts and avoiding clicks on suspicious links or attachments.
  • Monitor for Anomalies: Continuously monitor systems for signs of exploitation, unusual file extraction behaviors, or unauthorized access attempts.

Conclusion

The MoTW bypass vulnerability in 7-Zip represents a serious security concern for Windows users, as it allows attackers to circumvent protective measures and execute malicious code. Updating to the latest version of 7-Zip is the recommended action to ensure systems are protected against this vulnerability.

References:

#CyberSecurity #7Zip #SecurityAdvisory #VulnerabilityManagement #CISO #CXO #PatchManagement #Intrucept

Scroll to top