• ISC Stormcast For Wednesday, July 9th, 2025 https://isc.sans.edu/podcastdetail/9518, (Wed, Jul 9th) SANS Internet Storm Center, InfoCON: green
    • South Korean Government Imposes Penalties on SK Telecom for Breach darkreadingRobert Lemos, Contributing Writer
    • Microsoft Patch Tuesday, July 2025 Edition Krebs on SecurityBrianKrebs
    • Microsoft Patches 137 CVEs in July, But No Zero-Days darkreadingJai Vijayan, Contributing Writer
    • Malicious Open Source Packages Spike 188% YoY darkreadingAlexander Culafi
    • The Beginner’s Guide to Using AI: 5 Easy Ways to Get Started (Without Accidentally Summoning Skynet)
      by Tech Jacks
      March 29, 2025
    • Tips and Tricks to Enhance Your Incident Response Procedures
      by Tech Jacks
      March 17, 2025
    • Building a Security Roadmap for Your Company: Strategic Precision for Modern Enterprises 
      by Tech Jacks
      March 10, 2025
    • The Power of Policy: How Creating Strong Standard Operating Procedures Expedites Security Initiatives
      by Tech Jacks
      March 6, 2025
    • Building a Future-Proof SOC: Strategies for CISOs and Infosec Leaders 
      by Tech Jacks
      March 3, 2025
    • Security Gate Keeping – Annoying – Unhelpful
      by Tech Jacks
      November 13, 2024

  • Home
  • Blog & Observations
  • Articles
    • Guest Author
      • Peter Ramadan
        • SOC IT to ME
        • The Power of Policy
        • CISO Elite
  • In The News
  • Podcast & Vlogs
    • Podcast Videos
    • Security Unfiltered Podcast Information
  • Training & Videos
    • AI
      • AI Governance
    • Cloud
      • AWS
      • Azure
      • Google Cloud
    • Networking
    • Scripting
    • Security
      • Application Security
      • Cloud Security
      • Incident Response
      • Pentesting Information
      • Risk Management
      • Security Policy
    • Servers
    • Microsoft SCCM
    • ISC2
  • Services
The Beginner’s Guide to Using AI: 5 Easy Ways to Get Started (Without Accidentally Summoning Skynet)
March 29, 2025

Hello aspiring AI whisperer! So, you've finally caved into peer pressure (or maybe your job straight-up told you it's on and poppin') and decided it is time to dip your …


Tips and Tricks to Enhance Your Incident Response Procedures
March 17, 2025

Written by Peter Ramadan. Incident response (IR) is the backbone of any organization’s cybersecurity defense. For CIOs, CISOs, and Directors of Information Security, your IR procedures are well-established—but how efficient and …


Building a Security Roadmap for Your Company: Strategic Precision for Modern Enterprises 
March 10, 2025

Written by Peter RamadanRunning a successful security program isn’t some pleasant game of hopscotch—it’s a war, and the battlefield’s shifting under your feet every damn day. Long-term risk? That’s not …


The Power of Policy: How Creating Strong Standard Operating Procedures Expedites Security Initiatives
March 6, 2025

Written by Peter Ramadan. CISSP Policy is the invisible thread that binds an organization together—a web of rules, subtle yet ironclad, dictating the commotion of the enterprises endeavors into some resembling …


Building a Future-Proof SOC: Strategies for CISOs and Infosec Leaders 
March 3, 2025

Written by Peter RamadanWelcome to the first in a series of articles on giving your Security Operation Center (SOC) a serious path to success. The responsibility of leading a SOC …


Building a Security Program Primer – Article #1
October 26, 2024

  Building From The Ground Up The idea of creating a security program from scratch crossed my mind many times before I had the chance to do it. When I landed into …


ISC Stormcast For Wednesday, July 9th, 2025 https://isc.sans.edu/podcastdetail/9518, (Wed, Jul 9th) SANS Internet Storm Center, InfoCON: green
July 8, 2025

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License. (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.  ​Read More


South Korean Government Imposes Penalties on SK Telecom for Breach darkreadingRobert Lemos, Contributing Writer
July 8, 2025

Following a breach at the country's top mobile provider that exposed 27 million records, the South Korean government imposed a small monetary penalty but stiff regulatory requirements. Following a breach at …


Microsoft Patch Tuesday, July 2025 Edition Krebs on SecurityBrianKrebs
July 8, 2025

Microsoft today released updates to fix at least 137 security vulnerabilities in its Windows operating systems and supported software. None of the weaknesses addressed this month are known to be …


Microsoft Patches 137 CVEs in July, But No Zero-Days darkreadingJai Vijayan, Contributing Writer
July 8, 2025

Some 17 of the bugs are at high risk for exploits, including multiple remote code execution bugs in Office and SharePoint. Some 17 of the bugs are at high risk for …


Malicious Open Source Packages Spike 188% YoY darkreadingAlexander Culafi
July 8, 2025

Data exfiltration was the most common malware in Sonatype report, with more than 4,400 packages designed to steal secrets, personally identifiable information, credentials, and API tokens. Data exfiltration was the most …


Suspected Hacker Linked to Silk Typhoon Arrested in Milan darkreadingKristina Beek
July 8, 2025

The alleged Chinese state-sponsored hacker faces multiple charges, including wire fraud, aggravated identity theft, and unauthorized access to protected computers. The alleged Chinese state-sponsored hacker faces multiple charges, including wire fraud, …


Microsoft Patch Tuesday, July 2025, (Tue, Jul 8th) SANS Internet Storm Center, InfoCON: green
July 8, 2025

Today, Microsoft released patches for 130 Microsoft vulnerabilities and 9&#;x26;#;xc2;&#;x26;#;xa0;additional&#;x26;#;xc2;&#;x26;#;xa0;vulnerabilities not part of Microsoft&#;x26;#;39;s portfolio but distributed by Microsoft. 14 of these are rated critical. Only one of the vulnerabilities …


Hackers Use Leaked Shellter Tool License to Spread Lumma Stealer and SectopRAT Malware The Hacker [email protected] (The Hacker News)
July 8, 2025

In yet another instance of threat actors repurposing legitimate tools for malicious purposes, it has been discovered that hackers are exploiting a popular red teaming tool called Shellter to distribute …


Anatsa Android Banking Trojan Hits 90,000 Users with Fake PDF App on Google Play The Hacker [email protected] (The Hacker News)
July 8, 2025

Cybersecurity researchers have discovered an Android banking malware campaign that has leveraged a trojan named Anatsa to target users in North America using malicious apps published on Google's official app …


Hackers ‘Shellter’ Various Stealers in Red Team Tool to Evade Detection darkreadingElizabeth Montalbano, Contributing Writer
July 8, 2025

Researchers have uncovered multiple campaigns spreading Lumma, Arechclient2, and Rhadamanthys malware by leveraging key features of the AV/EDR evasion framework. Researchers have uncovered multiple campaigns spreading Lumma, Arechclient2, and Rhadamanthys malware …


Older Posts

    • Home
    • Blog & Observations
    • Articles
      • Guest Author
        • Peter Ramadan
          • SOC IT to ME
          • The Power of Policy
          • CISO Elite
    • In The News
    • Podcast & Vlogs
      • Podcast Videos
      • Security Unfiltered Podcast Information
    • Training & Videos
      • AI
        • AI Governance
      • Cloud
        • AWS
        • Azure
        • Google Cloud
      • Networking
      • Scripting
      • Security
        • Application Security
        • Cloud Security
        • Incident Response
        • Pentesting Information
        • Risk Management
        • Security Policy
      • Servers
      • Microsoft SCCM
      • ISC2
    • Services


  • About TechJacks
  • Privacy Policy
  • Gaming Kaiju
© Copyright Tech Jacks Solutions 2025