Z2U data breach finds users’ selling illicit accounts online; Over half a million records expose buyer photos, passports and financial info

Cybersecurity researchers at vpnMentor have stumbled upon a highly sensitive
non-password-protected database containing over 600,000 records, including
images of users holding their credit cards or other identifying documents.

According to a report published April 4, the unsecured database belongs to Z2U,
a well-known online gaming marketplace where users can trade and sell In-Game
Items, games currency and gaming accounts.

Access to the publicly open database was closed less than a week after

Seized Genesis Market Data is Now Searchable in Have I Been Pwned, Courtesy of the FBI and “Operation Cookie Monster”

Presently sponsored by: Kolide ensures only secure devices can access your cloud apps. It’s Zero Trust tailor-made for Okta. Book a demo today. A quick summary first before the details: This week, the FBI in cooperation with international law enforcement partners took down a notorious marketplace trading in stolen identity data in an effort they’ve … Read more

Obsidian launches new SaaS security and compliance tools

Cybersecurity firm Obsidian has launched its SaaS security posture management (SSPM) solution with new security and compliance tools to help organizations manage third-party SaaS integrations.

The SaaS-based deployment will feature three primary modules including Obsidian Compliance Posture Management (CPM), Obsidian Integration Risk Management, and Obsidian Extend.

“Obsidian not only provides posture hardening and third-party SaaS integration risk management, but also offers threat mitigation for SaaS,” said Glenn Chisholm, chief product officer and co-founder of Obsidian. “It remains the only company in the SaaS security industry to deliver a unified solution that covers all aspects of SaaS security comprehensively.”

To read this article in full, please click here

How to Prevent Malware Attacks: 8 Tips for 2023

Malware is one of the most common cyber security threats that organisations and individuals face. Whenever someone talks about their computer being infected, encountering =bots or even falling victim to a scam email, malware is normally involved. It’s why anti-malware software is usually considered a top priority for staying safe online. However, those tools are not flawless. For example, they can only spot known types of malware, and according to the AV-Test Institute, almost half a million new types of malware are detected each day. But how exactly does malware work? In this blog, we explain everything you need to

The post How to Prevent Malware Attacks: 8 Tips for 2023 appeared first on IT Governance UK Blog.

Hackers Using Self-Extracting Archives Exploit for Stealthy Backdoor Attacks

An unknown threat actor used a malicious self-extracting archive (SFX) file in an attempt to establish persistent backdoor access to a victim’s environment, new findings from CrowdStrike show.
SFX files are capable of extracting the data contained within them without the need for dedicated software to display the file contents. It achieves this by including a decompressor stub, a piece of code

Google TAG Warns of North Korean-linked ARCHIPELAGO Cyberattacks

A North Korean government-backed threat actor has been linked to attacks targeting government and military personnel, think tanks, policy makers, academics, and researchers in South Korea and the U.S.
Google’s Threat Analysis Group (TAG) is tracking the cluster under the name ARCHIPELAGO, which it said is a subset of another threat group tracked by Mandiant under the name APT43.
The tech giant