article thumbnail

IDIQ Names Industry Veteran Damian Bushnell Chief Product Officer

Identity IQ

Most recently, Bushnell helped oversee the company’s partnership with Bitdefender® Total Security with Premium VPN to add award-winning internet security software to the IdentityIQ suite of benefits. For more than two decades, Bushnell has been a technology and product leader in the consumer credit and identity theft protection industry.

article thumbnail

IDIQ Names Industry Veteran Damian Bushnell Chief Product Officer

Identity IQ

Most recently, Bushnell helped oversee the company’s partnership with Bitdefender® Total Security with Premium VPN to add award-winning internet security software to the IdentityIQ suite of benefits. For more than two decades, Bushnell has been a technology and product leader in the consumer credit and identity theft protection industry.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Original APT: Advanced Persistent Teenagers

Krebs on Security

Since surfacing in late 2021, LAPSUS$ has gained access to the networks or contractors for some of the world’s largest technology companies, including Microsoft , NVIDIA , Okta and Samsung. “They were calling up consumer service and tech support personnel, instructing them to reset their passwords.

article thumbnail

Selecting the Right Cloud SSO Solution for Your Organization

Thales Cloud Protection & Licensing

Of those surveyed, 20% of respondents indicated that they have deferred on-premises technology spend. The traditional IAM model has been to extend remote employees to access applications to employees from VPN and add multifactor authentication (MFA) to add layers of security to the VPN connection. Short term vs. long term.

article thumbnail

Evolution of JSWorm ransomware

SecureList

Energy and Utilities (10%), Finance (10%), Professional and Consumer Services (10%), Transportation (7%), and Healthcare (7%) were also at the top of their list. Make sure commercial VPN solutions and other server-side software are always up to date as exploitation of this type of software is a common infection vector for ransomware.

article thumbnail

Ransomware by the numbers: Reassessing the threat’s global impact

SecureList

In certain cases, they used spear-phishing campaigns to install Cobalt Strike RAT, while other attacks involved exploiting a vulnerable internet-facing service (e.g., Citrix ADC/NetScaler or Pulse Secure VPN) or weak RDP credentials to breach the network. Maze primarily targeted businesses and large organizations. Conclusion.