Doug Olenick SC Media | Page 2 of 203

Doug Olenick

Online Editor

Most recent articles by Doug Olenick

Cyber leaders must take ownership of cyber skills gap

We’ve all heard about the cyber skills gap by now. As cyber adversaries grow more advanced and organizations struggle to manage these evolving threats, cybersecurity jobs are getting harder to fill. There are an estimated 2.9 million unfilled openings worldwide, with half a million in North America alone. Meanwhile, 60% of organizations say it takes…

Intel rolls out security updates for seven products

Intel has released a series of security updates crossing seven product lines with three rated high and four carrying a medium severity rating. The three high-rated issues cover Intel’s NUC (CVE-2019-11140), Processor Identification Utility for Windows (CVE-2019-11163) and Computing Improvement Program (CVE-2019-11162). The NUC vulnerability is due to an insufficient session validation in system firmware…

Creating a next-gen cybersecurity roadmap

As many of today’s enterprises are struggling to get their arms around cybersecurity, our world has seen an explosion in the number of solutions, providers and recommended steps to take to secure a company’s environment and protect it against cyber incidents.  With so many options and no standardized solution, it is difficult to know where…

Adapting the classical art of penetration testing to the cubist world of cloud

Many technical practitioners may believe that, at the end of the day, penetration testing is penetration testing. Proper penetration testing, however, is an art that must adapt over time. As an artist’s tools, materials, and media evolve, art evolves. With this evolution in “technology, techniques and approaches must change as well. Our “IT medium” has…

Mirai, Neko and Bashlite variants unleashed

Starting in mid-July new variants of Mirai, Bashlite and Neko began appearing in honeypots, all of which are designed to assemble botnets capable of launching DDoS attacks. Trend Micro came across the first variant, based on Neko, on July 22 capable of brute forcing weak credentials and then unleashing a very capable set of malware…

700,000 Choice Hotels customer records compromised

Cybercriminals took advantage of an open MongoDB database containing data from Choice Hotels and stole 700,000 customer records and then demanded a $3,800 ransom payment for their return. The unsecured third-party database was first uncovered by Comparitech and security researcher Bob Diachenko, but despite quick action on their part informing Choice of the problem, malicious…

Microsoft-certified software drivers found to be security risks

More than 40 Microsoft-certified software drivers from 20 high-profile vendors have been found to contain vulnerabilities that can be exploited by an attacker, a new report revealed. Researchers at Eclypsium said the drivers were found on a variety of devices, including products from Toshiba, ASUS, NVIDIA, and Intel and has led Eclypsium to ask Microsoft…

Symantec sells off enterprise business for $10.7 billion

Symantec sold off its enterprise security business to chipmaker Broadcom for $10.7 billion, but will retain consumer cyber safety business. The deal, which includes the Symantec brand name, was approved by Symantec’s board of directors and is expected to close before the end of the year, but still must pass standard regulatory approvals. Symantec will…

Next post in cyberattack