Doug Olenick SC Media

Doug Olenick

Online Editor

Most recent articles by Doug Olenick

Microsoft, oracle, cybersecurity

Microsoft, Oracle release security updates

Microsoft and Oracle issued security updates with Redmond, Wash., company patching a single issue in Windows Defender Application Control while Oracle’s update covered over 100 products and dozens of vulnerabilities. The issue with Windows Defender, CVE-2019-1167, if exploited would allow an attacker to circumvent PowerShell Core Constrained Language Mode on the machine. However, Microsoft noted…

Three reasons why moving target defense needs to be a priority in any cybersecurity ctrategy

The vicious cycle of imbalance between cyber attackers and defenders seems never-ending. Defenders continue to develop and implement new tools to prevent, detect, monitor and remediate cyber threats while attackers simultaneously develop new attack techniques to thwart defenses, which for all intents and purposes gives them the upper hand. But a new concept, originally conceived…

Malicious actor Sweed puts new spins on its attacks

A threat actor named Sweed who has been active for more than two years using spearphishing emails with malicious attachments to spread Formbook, Lokibot and Agent Tesla has been given a detailed examination by Cisco Talos. Cisco Talos researcher Edmund Brumaghin said for the most part Agent Tesla is the group’s favorite flavor of malware,…

La Porte County pays $130,000 ransom to regain access

After attempting to recover from a ransomware attack for about a week, the La Porte County Board of Commissioners opted to pay the $130,000 ransom in order to regain access to their network. Local news reports have the county paying the ransom after negotiating with the attackers and noting that insurance will cover about $100,000…

How to operationalize threat intelligence

Security practitioners face so many trials and tribulations as they protect and defend their organizations. In order to seek the best possible protection, they need to have an understanding of the threats which pose the greatest risk and how to address them proactively. This will enable a quicker and more cohesive response to incidents. The…

Train your SOC team – Now!

I don’t need to tell you that it’s a tough time to be a cyber-defender. Attacks are growing increasingly sophisticated, as are the tools needed to detect them. Multi-vector threats that move laterally from IT to OT and IoT networks can cause substantial physical damage. Time sensitive malware like ransomware or fileless attacks crank the…

Next post in Executive Insight