IT KART
Nearby computer & electronics services
Sector
Sector
Sector-14 Gurgaon
Dlf Infinity Tower 8 B 3rd Floor
You may also like
IT KART, based in India, is a prominent provider of cybersecurity and cloud security consulting and solutions.
IT KART: India's cybersecurity leader of expertise, offering tailored solutions and cutting-edge services to defend businesses against digital threats and ensure data integrity. The business, established with the primary goal of bringing affordable executive leadership and security engineering expertise to organizations of all sizes, specializes in cyber security, cyber security consulting, and cy
*🚀 Empower Your Future with Our Tech Franchise! 🚀*
Are you ready to revolutionize the tech industry and join a community of successful entrepreneurs? Our tech franchise offers unparalleled benefits that pave the way for your success:
*Unlock unlimited potential and transform your future with our tech franchise!*
*📞 Contact us today +91 848484 4986 to learn more and start your journey to success!*
An analysis of the newly emerged ransomware strain, RansomHub, reveals it to be an updated and rebranded version of Knight ransomware, which itself is an evolution of the earlier Cyclops ransomware.
Knight, also known as Cyclops 2.0, first appeared in May 2023. It utilizes double extortion tactics, stealing and encrypting victims’ data for financial gain. This ransomware is capable of operating across various platforms, including Windows, Linux, macOS, ESXi, and Android.
Marketed and sold on the RAMP cybercrime forum, Knight ransomware attacks have been found to employ phishing and spear-phishing campaigns as their primary distribution method, using malicious attachments.
The ransomware-as-a-service (RaaS) operation associated with Knight ceased operations in late February 2024. At that time, its source code was put up for sale, suggesting it might have been acquired by a different actor. This new actor likely updated and relaunched the ransomware under the RansomHub brand.
RansomHub, which announced its first victim in February 2024, has since been implicated in several recent ransomware attacks, including those on Change Healthcare, Christie’s, and Frontier Communications. The group behind RansomHub has declared that it will not target entities in Commonwealth of Independent States (CIS) countries, Cuba, North Korea, and China.
"Credit Card Data Theft: Exploitation of WordPress Plugin Dessky Snippets in E-commerce Sites."
On May 11, 2024, Sucuri identified a cyber campaign exploiting the WordPress plugin Dessky Snippets, which is used to add custom PHP code, to steal credit card data from e-commerce sites. With over 200 active installations, the plugin is being abused to insert server-side PHP malware into compromised sites, altering the WooCommerce checkout process to capture sensitive financial information.
The malicious code disables autocomplete, making the fake fields appear legitimate and necessary. Site owners are advised to keep their plugins updated, use strong passwords, and regularly audit their sites for unauthorized changes to prevent such attacks.
"Experts Uncover Major Security Flaw in Replicate AI Service, Exposing Customer Models and Data."
Cybersecurity firm Wiz has identified a critical flaw in Replicate's AI-as-a-service platform, potentially allowing unauthorized access to customers' proprietary AI models and sensitive data. The vulnerability, linked to the use of the Cog tool for containerizing machine learning models, enabled remote code ex*****on and cross-tenant attacks.
Though responsibly disclosed and now patched, the flaw posed significant risks to the integrity and reliability of AI outputs, highlighting the dangers of running AI models from untrusted sources.
"Navigating the DevOps Dilemma: Empowering CISOs to Regain Control in the Age of Speed."
In the wake of seismic cybersecurity breaches such as the Colonial Pipeline ransomware attack and the SolarWinds supply chain compromise, Chief Information Security Officers (CISOs) face an unprecedented challenge: balancing the need for robust security with the rapid pace of DevOps innovation.
This comprehensive guide explores how CISOs can reclaim their influence and ensure cloud security through strategic collaboration with DevOps teams and IT leadership. We delve into real-world case studies, the evolving role of the CISO, and actionable strategies to foster a security-first mindset without hindering innovation.
Discover how Managed Detection and Response (MDR) services act as a force multiplier, empowering CISOs to proactively safeguard their organizations and drive secure, agile development practices.
"Ivanti Patches Critical RCE Vulnerabilities in Endpoint Manager and Other Products."
Ivanti has released patches addressing multiple critical security flaws in Endpoint Manager (EPM), which could allow remote code ex*****on. Six SQL injection vulnerabilities (CVE-2024-29822 through CVE-2024-29827, CVSS scores: 9.6) permit unauthenticated network attackers to execute arbitrary code, while four others (CVE-2024-29828 to CVE-2024-29830, CVE-2024-29846, CVSS scores: 8.4) require authentication.
A high-severity flaw in Avalanche (CVE-2024-29848, CVSS score: 7.2) and additional vulnerabilities in Neurons for ITSM, Connect Secure, and Secure Access client have also been fixed. Meanwhile, a critical path traversal flaw in Netflix's Genie (CVE-2024-4701, CVSS score: 9.9) potentially allows remote code ex*****on. These vulnerabilities highlight the ongoing risks and the importance of secure software design to prevent exploitation.
"Windows 11 to Deprecate NTLM, Introduce AI-Powered App Controls and Enhanced Security Features."
Microsoft has announced plans to deprecate NT LAN Manager (NTLM) in Windows 11 by the second half of 2024, moving towards Kerberos for stronger user authentication. The update also includes new security measures such as enabling Local Security Authority (LSA) protection by default, utilizing virtualization-based security (VBS) for Windows Hello, and enhancing Smart App Control with AI to block untrusted applications.
Additional features include Win32 app isolation, stricter admin privilege controls, and the introduction of Zero Trust Domain Name System (ZTDNS). These changes aim to address vulnerabilities and enhance overall security in response to recent breaches and criticism of Microsoft's security practices.
"Latrodectus Malware Loader Emerges as IcedID's Successor in Phishing Campaigns."
Cybersecurity researchers have identified a surge in email phishing campaigns since early March 2024, deploying Latrodectus, a new malware loader considered to be the successor to IcedID. The infection chain typically involves oversized JavaScript files leveraging WMI and msiexec.exe to install a remotely hosted MSI file. Latrodectus, designed to deploy additional payloads such as QakBot and DarkGate, includes advanced anti-analysis techniques, persistence mechanisms, and extensive enumeration capabilities.
It connects to a C2 server over HTTPS for executing various commands. Research indicates a developmental link between Latrodectus and IcedID. Concurrently, other phishing campaigns are delivering DarkGate via QuickBooks-themed emails and leveraging a revamped Tycoon PhaaS platform to bypass MFA protections. Additionally, Google ads impersonating legitimate services are spreading the D3F@ck Loader to deploy Raccoon Stealer and DanaBot.
"Kinsing Hacker Group Exploits New Vulnerabilities to Expand Cryptojacking Botnet."
The Kinsing hacker group, known for its persistent cryptojacking campaigns, continues to evolve by swiftly integrating newly disclosed vulnerabilities into its exploit arsenal. Active since 2019, Kinsing targets Linux and Windows systems, leveraging flaws in popular software and misconfigurations in cloud services to expand its botnet for illicit cryptocurrency mining. Recent findings by Aqua Security reveal Kinsing's use of sophisticated scripts and binaries to disable security defenses, eliminate competition, and control compromised systems. The group's operations are further characterized by targeting open-source applications and employing diverse tools across different operating systems.
"Cybercriminals Exploit Microsoft's Quick Assist for Ransomware Attacks: Storm-1811's Tactics Revealed."
cybercriminal group Storm-1811 is leveraging Microsoft's Quick Assist in sophisticated ransomware campaigns, as revealed by the Microsoft Threat Intelligence team. Explore the attack chain, including voice phishing tactics and the deployment of QakBot and Cobalt Strike, leading to Black Basta ransomware. Discover Microsoft's response and crucial recommendations for organizations to mitigate these evolving threats.
Exciting news! IT KART's top-notch cybersecurity services are now available in Germany. Stay ahead of cyber threats with our tailored solutions. Contact us today! https://itkart.de
"Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Day Vulnerabilities."
Microsoft's Patch Tuesday updates for May 2024 address a total of 61 security flaws across its software ecosystem, with two zero-day vulnerabilities actively exploited in the wild. Learn about the critical CVE-2024-30040 affecting the Windows MSHTML Platform and CVE-2024-30051 impacting the Windows Desktop Window Manager, both presenting severe risks of code ex*****on and privilege escalation.
Explore the implications of these vulnerabilities, the tactics employed by threat actors, and the urgent need for organizations to apply the latest fixes to safeguard their systems.
"Apple and Google Introduce Cross-Platform Solution to Detect Unwanted Bluetooth Tracking Devices."
Apple and Google have joined forces to introduce a groundbreaking cross-platform feature aimed at alerting users to the presence of Bluetooth tracking devices used for unauthorized surveillance. Named "Detecting Unwanted Location Trackers" (DULT), this feature notifies users across both iOS and Android platforms if a Bluetooth tracker is being employed to monitor them without consent.
The collaboration, initiated a year ago, aims to address privacy and safety concerns arising from the misuse of tracking technology. The announcement follows reports of malicious use of devices like AirTags, particularly in cases of domestic abuse. Users will receive alerts and instructions to manage detected trackers, enhancing their control over personal privacy and security.
Additionally, Apple addresses critical security vulnerabilities, including CVE-2024-23296, through updates to older iOS, iPadOS, and macOS versions, underscoring its commitment to safeguarding user data and device integrity.
"Apple Nears Deal with OpenAI to Integrate ChatGPT into iPhone iOS 18."
Apple is on the brink of finalizing an agreement with OpenAI to incorporate ChatGPT features into its upcoming iPhone operating system, iOS 18. This move is part of Apple's broader strategy to infuse artificial intelligence capabilities into its devices, enhancing user experience and functionality. Discussions with Google for licensing its Gemini chatbot are also underway, though no agreement has been reached yet. The integration of ChatGPT into iOS 18 will introduce a popular chatbot to Apple's ecosystem, complementing a range of new AI features expected to be unveiled at the company's annual Worldwide Developers Conference in June. Apple CEO Tim Cook has expressed confidence in the transformative potential of AI, emphasizing Apple's unique advantage in seamless hardware, software, and services integration.
"Unveiling LLMjacking: A New Threat Targeting Cloud-Hosted AI Models."
Explore the emerging cybersecurity threat dubbed LLMjacking, which involves exploiting stolen cloud credentials to access and monetize cloud-hosted large language models (LLMs). Learn about the intrusion pathway, tools used, and the potential financial and operational impacts on victim organizations. Discover expert recommendations for mitigating risks and fortifying defenses against this novel attack vector.
"Red Hat Defines AI Strategy; CEO Highlights Impact of Open Source in Accelerating AI Momentum."
At the Red Hat Summit, CEO Matt Hicks outlined Red Hat's AI strategy, emphasizing the significant role of open source in driving AI innovation. Hicks predicts that AI development won't be monopolized by a single vendor, but rather characterized by diverse choices and flexibility. Red Hat's latest initiatives, including the launch of Red Hat Enterprise Linux AI (RHEL AI) and collaborations with Intel, signify a bold push towards integrating AI into their open source ecosystem, aiming to democratize AI development and deployment across hybrid cloud infrastructures.
"WordPress Under Siege: Critical LiteSpeed Cache Bug Exploited by Hackers"
A critical vulnerability (CVE-2023-40000) in the popular LiteSpeed Cache plugin for WordPress is being actively exploited by hackers, allowing them to create unauthorized admin accounts and gain full control over vulnerable websites. WPScan reports that threat actors are leveraging this flaw to set up rogue admin users, posing a severe risk to website security. With over 5 million active installations, many websites remain susceptible to this exploit, despite a fix being available since October 2023.
Users are urged to update their plugin to the latest version (6.2.0.1 as of April 25, 2024), review installed plugins for any suspicious activity, and delete unauthorized files and folders. Additionally, precautions such as scanning databases for malicious strings and enabling automatic updates for WordPress core files, plugins, and themes are recommended to mitigate potential threats.
"Google Streamlines 2-Factor Authentication Setup: Enhancing Security for Personal and Workspace Accounts."
Google has introduced streamlined processes for enabling two-factor authentication (2FA), also known as 2-Step Verification (2SV), across personal and Workspace accounts. This update aims to bolster account security by simplifying the setup process, emphasizing more secure methods like authenticator apps and hardware keys over SMS-based authentication. Additionally, Google highlights advancements in passwordless authentication with over 400 million accounts using passkeys.
However, recent research underscores potential vulnerabilities, such as adversary-in-the-middle (AitM) attacks, prompting the need for ongoing vigilance and the adoption of techniques like token binding to fortify authentication protocols.
"Unveiling Cuckoo: New Persistent macOS Spyware Targeting Intel and Arm Macs"
Cybersecurity researchers have uncovered a new strain of spyware named "Cuckoo," designed to infiltrate both Intel and Arm-based Mac systems. This persistent malware, distributed through various websites, employs deceptive tactics, including fake password prompts, to gain access to sensitive information such as iCloud Keychain data, crypto wallets, and messaging apps.
"Cuttlefish Malware Emerges: Router Hijacking and Cloud Credential Theft."
A new strain of malware, dubbed Cuttlefish, has surfaced with a primary focus on infiltrating small office and home office (SOHO) routers. This sophisticated malware aims to stealthily intercept all network traffic passing through the compromised routers, particularly targeting HTTP GET and POST requests to extract authentication data. Developed as a modular threat, Cuttlefish demonstrates advanced capabilities including DNS and HTTP hijacking within private IP spaces.
Though exhibiting similarities to the HiatusRAT, Cuttlefish operates independently, actively infecting routers since July 2023, with a recent surge observed from October 2023 to April 2024, predominantly affecting networks associated with Turkish telecom providers. While the precise method of initial access remains undisclosed, once inside a network, Cuttlefish executes a bash script to gather crucial host information and deploy its payload tailored to the router's architecture.
Notably, the malware employs an extended Berkeley Packet Filter (eBPF) to specifically target authentication data linked to major cloud service providers like Alicloud, AWS, Digital Ocean, CloudFlare, and BitBucket. By commandeering traffic destined for private IPs or activating a sniffer for public IPs under specific conditions, Cuttlefish efficiently pilfers credentials. Moreover, it can act as a proxy or VPN to transmit stolen data, enabling threat actors to access targeted cloud resources.
This multi-faceted approach underscores Cuttlefish's status as a cutting-edge threat in the realm of passive eavesdropping malware, posing significant risks to network security and cloud ecosystems alike.
"Former NSA Employee Sentenced to 22 Years for Attempting to Sell U.S. Secrets to Russia"
A former employee of the U.S. National Security Agency (NSA) has been sentenced to nearly 22 years in prison for his involvement in attempting to transfer classified documents to Russia. Jareh Sebastian Dalke, 32, of Colorado Springs, worked briefly as an Information Systems Security Designer at the NSA, during which time he accessed sensitive information. Dalke made contact with someone he believed to be a Russian agent, but who was an undercover FBI agent, and attempted to sell top-secret National Defense Information (NDI) for $85,000.
He emailed snippets of classified documents and later transferred files to the undercover agent before his arrest in 2022. Dalke pleaded guilty to the charges, admitting to willfully transmitting files with the intent to harm the United States and benefit Russia.
The case serves as a reminder of the consequences of betraying national security trust and highlights the efforts of law enforcement to prevent espionage activities.
"Google Blocks 2.28 Million Malicious Apps in 2023, Strengthening Android Security Measures"
In 2023, Google intensified its efforts to protect the Android ecosystem, preventing 2.28 million policy-violating apps from reaching the Play Store. With advanced security features, policy updates, and machine learning, Google also rejected or addressed issues in nearly 200,000 app submissions. Additionally, 333,000 bad accounts were blocked, and developer onboarding processes were enhanced to combat bad actors.
These measures coincide with real-time scanning for malware and initiatives such as the App Defense Alliance. Google's commitment to Android security includes removing outdated apps and taking legal action against fraudsters, highlighting its dedication to user safety.
At ITKART, we're dedicated to fortifying your digital defenses with cutting-edge technologies. Our arsenal includes EDR, DLP, and advanced email security, providing a formidable barrier against real-time threats and data breaches. But our commitment doesn't end there.
We go further, offering comprehensive post-incident management through data recovery services. And because prevention is just one part of the equation, we also provide cloud security and backup solutions, ensuring your IT infrastructure remains resilient in the face of any disaster. With ITKART, your digital assets are not just protected; they're fortified for the challenges of tomorrow.
"CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers."
Explore the ongoing malware campaign orchestrated by the threat actor CoralRaider, leveraging Content Delivery Network (CDN) cache domains to distribute stealers like CryptBot, LummaC2, and Rhadamanthys. Cisco Talos attributes the activity to this Vietnamese-origin group, citing overlaps in tactics with CoralRaider's Rotbot campaign.
Targets span various industries globally, with the attack chain initiated through phishing emails leading to booby-trapped links. The campaign's sophisticated approach involves a modular PowerShell loader script, bypassing User Access Controls (UAC) using the FodHelper technique.
Notably, an updated CryptBot version is deployed, incorporating new anti-analysis measures and expanding data theft capabilities to include password manager and authenticator application information.
"Wells Fargo Data Breach: Employee Termination Follows Customer Information Exposure"
Wells Fargo, the California-based banking giant, confirms a data breach caused by an employee's violation of company policies rather than a cyber-attack. The breach resulted in the exposure of personal and mortgage account information for two customers. The terminated employee had sent sensitive information to a personal account, prompting Wells Fargo to take appropriate actions.
The affected customers have been notified, and the bank is actively monitoring their accounts for any unusual activities.
"North Korean State-Sponsored Cyber Espionage Evolves with AI: Insights and Implications."
Recent reports from Microsoft and other security firms highlight the evolving tactics of North Korean state-sponsored cyber actors, particularly in the realm of artificial intelligence (AI). This article delves into the emergence of AI-fueled cyber espionage by North Korean groups, such as Emerald Sleet and Jade Sleet, shedding light on their utilization of AI-powered tools for spear-phishing, reconnaissance, and technical troubleshooting.
We explore their exploitation of lax DMARC policies, web beacons, and cryptocurrency heists, revealing the multifaceted nature of their operations. Additionally, we discuss the sophistication of groups like Lazarus (Diamond Sleet) and Konni (Vedalia), showcasing their use of intricate methods to bypass security measures and deliver malicious payloads.
Through these insights, we uncover the evolving landscape of cyber threats orchestrated by North Korean entities and the implications for global cybersecurity efforts.
Critical Alert: Zero-Day Exploit Targeting CrushFTP Users Detected
Urgent security advisory warns users of CrushFTP, an enterprise file transfer software, of a zero-day flaw exploited in targeted attacks. The vulnerability, present in CrushFTP v11 versions below 11.1, allows users to escape their Virtual File System (VFS) and download system files. Although users operating within a DMZ environment are partially protected, immediate patching to version 11.1.0 is advised. The flaw, discovered by Simon Garrelou of Airbus CERT, has yet to receive a CVE identifier.
CrowdStrike reports observed exploitation in the wild, primarily targeting U.S. entities, raising concerns of politically motivated intelligence gathering. Users are urged to monitor the vendor's updates closely and prioritize patching to mitigate risks.
"Malicious Google Ads Exploit Fake IP Scanner Software to Distribute Stealthy Backdoor."
A recent malvertising scheme uncovered by Zscaler ThreatLabz researchers reveals a sophisticated ploy exploiting Google Ads to disseminate a new Windows backdoor named MadMxShell. Threat actors utilized a network of deceptive domains resembling legitimate IP scanner software to lure unsuspecting users.
Upon visiting these sites, users unwittingly trigger the download of a malicious file disguised as a legitimate IP scanner tool. This file, upon ex*****on, deploys a multi-stage infection process, employing DLL side-loading and DNS tunneling for command-and-control communication. The backdoor, aptly named for its utilization of DNS MX queries for C2, allows the threat actor to gather system information, execute commands, and manipulate files on infected systems.
With no clear origin or motive identified for the malware operators, the discovery underscores the evolving tactics of cybercriminals and the critical need for robust security measures to thwart such malicious campaigns.
"Navigating the Security Landscape of AI-Powered Development: Safeguarding Against Vulnerabilities in GitHub Copilot."
Dive into the intricate world of AI-driven software development with Cydrill's thought leadership article. Explore the paradoxical nature of AI's security vulnerabilities and the risks associated with tools like GitHub Copilot. Discover practical strategies and implementation tips to fortify your code against potential exploits while harnessing the productivity benefits of AI assistance.
Stay informed, stay secure, and empower yourself to shape a resilient digital future.
Click here to claim your Sponsored Listing.
Our Story
World's best IT Training's & Certification Provider Company.
Digital Marketing & Cyber Security Service Provider.
Videos (show all)
Category
Contact the business
Telephone
Website
Address
B38, Sunder Singh Marg, Block B, DLF Colony, Sector 14
Gurugram
122001
Weblytical Technologies, Tower B4, 7C, Spaze Itech Park, Sector 49
Gurugram, 122001
Weblytical Technologies is giving the best digital marketing services for running an online business
91 Spring Board Sector 44
Gurugram, 122009
Authorize Channel Partner of Tata Tele Business Services (TTBS), belonging to the prestigious Tata Group of Companies, is the country’s leading enabler of connectivity and communi...
206, Unitech Arcadia, South City 2, Sector 49
Gurugram, 122018
Aspire Innovations Pvt. Ltd. is Gurgaon Based company providing all types of IT solutions
Gurugram, 122002
Hire experts with experience for all your tasks whether you need virtual assistants, web developers, product listing, social media marketing, data scraping, mining, lead generation...
Gurugram, 122015
At MattsenKumar, through interactive business intelligence tools, we design instinctual dashboards that showcase a pictorial representation of their complex data.
Plot No. 1320, Sector/31/32A, Near Jharsa Chowk, Gurugram/
Gurugram, 122001
Tech Wizard was formed in 2015 with a vision to serve over 80% of Delhi NCR customers.
2/62, Sector/11
Gurugram, 122001
Digital platform to share & connect with your network, modern eco-friendly digital experience
Unit 11 & 12, F15, Tower B, Emaar Digital Greens
Gurugram, 122101
Welcome to the world’s first autonomous cloud contact Center that ensures you Never Miss a Customer's Call. We are an #AI platform that responds to queries & makes systems intellig...
SAS Tower, 201A, 2nd Floor
Gurugram, 122002
With Truverse blockchain technology, information about identity is auditable, traceable and verifiab
Gurugram, 122001
DigiPhyNFT is the ultimate bridge between the Physical and the Digital world for your products, easing the implementation of groundbreaking blockchain technology and disrupting the...