About Lukasz Olszewski
Lukasz Olszewski is a Senior Expert in Atos Digital Experts Community. He currently leads Atos Computer Security Incident Response Team in Europe delivering security incident response, forensics, threat hunting and malware analysis services.
Lukasz has a degree in Computer Science and has previously worked as System and Network Administrator in a large Polish IT company working mostly with Linux and Unix systems. After that he joined the Royal Bank of Scotland as Technology Risk Analyst working on information security risk assessments.
In 2013 Lukasz joined Atos as a Security Engineer and later took the role of the Lead Architect in the area of SIEM and security monitoring, detection and analysis.
Lukasz has taken part in many global security projects, multiple proof of concepts and authored multiple security service processes.
Articles posted by Lukasz Olszewski
Proactive Threat Hunting – Practical Use Cases
In my last article, I explained how organizations can redirect attention away from alerts but invest in more fine-grained and proactive threat detection. I put forward an example for a simplified threat hunting process. Today, I’d like to share some practical use cases in establishing proactive threat hunting. Don’t ignore your Anti-Virus (AV) logs Many treat their AV as…
Proactive Threat Hunting – no longer a whim
We are undoubtedly in the era of huge security alert fatigue. This has been caused by the vast number of false positive alerts generated every day by countless security products that organizations put in place to improve their defences. Because of this, it’s hard to justify resources who would essentially focus on… Producing even more alerts instead of…
Bad Rabbit: what we know
As the third massive ransomware outbreak of the year, ‘Bad Rabbit’, draws to a close, let’s have a look at the evolution of the recent attacks: Wannacry, NotPetya and Bad Rabbit. Although these attacks are the first self-propagating ransomworms that can both encrypt a system & spread automatically by exploiting vulnerabilities in network and system devices, still, they all follow the line…