Beware!! 5.8 Million Times Downloaded Android App Steals Facebook Passwords

From gbhackers.com

Android App Steals Facebook Passwords

It seems that the drastic wave of cyberattacks has not yet properly able to teach the users to develop their security habits. As there are many users who still use the common and compromised credentials on several services and apps.

Now many of you might be thinking, Why? It’s convenient to use the same credentials on multiple apps and services, as in this case you don’t have to remember different credentials for different services and apps.

Read more…

MVI – MICROSOFT VIRUS INITIATIVE

From endpoint-cybersecurity.com

Microsoft requires certain things from companies developing security products.

If you’re serious in selling an AV product on Windows, you need certain APIs which are related to Windows Security Center / Action Center. You can get this API only if you are a member in the Microsoft Virus Initiative (MVI).

The Microsoft Virus Initiative (MVI) helps organizations to get their products working and integrated with Windows.

Read more…

Coop supermarket closes hundreds of stores after Kaseya supply chain ransomware attack

From securityaffairs.co

The supermarket chain Coop shut down approximately 500 stores as a result of the supply chain ransomware attack that hit the provider Kaseya.

The REvil ransomware operators initially compromised the Kaseya VSA’s infrastructure, then pushed out malicious updates for VSA on-premise servers to deploy ransomware on enterprise networks.

“We first noticed problems in a small number of stores on Friday evening around 6:30pm so we closed those stores early. Then overnight we realised it was much bigger and we took the decision not to open most of our stores this morning so that our teams could work out how to fix it.” a spokeswoman for Coop Sweden told the BBC.

Read more…

10 Best Vulnerability Scanning Tools For Penetration Testing – 2021

From gbhackers.com

10 Best Vulnerability Scanning Tools

A Vulnerability Scanning Tools is one of the essential tools in IT departments Since vulnerabilities pop up every day and thus leaving a loophole for the organization.

The Vulnerability scanning tools helps in detecting security loopholes with the application, operating systems, hardware and network systems.

Hackers are actively looking for these loopholes to use them for their advantage. Vulnerabilities inside a network need to be identified and fixed immediately to leave your attackers at bay.

Read more…

Understanding & Detecting C2 Frameworks — DarkFinger-C2

From malware.news

Understanding & Detecting C2 Frameworks — DarkFinger-C2

Hello and welcome to part 5 of “Understanding & Detecting C2 Frameworks”. You can read the previous blog posts below

Today we’re going to analyze the C2 PoC “DarkFinger”

Read more…