• China-Nexus Actors Weaponize ‘Nezha’ Open Source Tool darkreadingNate Nelson, Contributing Writer
    • Calling All Influencers: Spear-Phishers Dangle Tesla, Red Bull Jobs darkreadingElizabeth Montalbano, Contributing Writer
    • LockBit, Qilin, and DragonForce Join Forces to Dominate the Ransomware Ecosystem The Hacker [email protected] (The Hacker News)
    • Step Into the Password Graveyard… If You Dare (and Join the Live Session) The Hacker [email protected] (The Hacker News)
    • Severe Figma MCP Vulnerability Lets Hackers Execute Code Remotely — Patch Now The Hacker [email protected] (The Hacker News)
    • The Beginner’s Guide to Using AI: 5 Easy Ways to Get Started (Without Accidentally Summoning Skynet)
      by Tech Jacks
      March 29, 2025
    • Tips and Tricks to Enhance Your Incident Response Procedures
      by Tech Jacks
      March 17, 2025
    • Building a Security Roadmap for Your Company: Strategic Precision for Modern Enterprises 
      by Tech Jacks
      March 10, 2025
    • The Power of Policy: How Creating Strong Standard Operating Procedures Expedites Security Initiatives
      by Tech Jacks
      March 6, 2025
    • Building a Future-Proof SOC: Strategies for CISOs and Infosec Leaders 
      by Tech Jacks
      March 3, 2025
    • Security Gate Keeping – Annoying – Unhelpful
      by Tech Jacks
      November 13, 2024

  • Home
  • Blog & Observations
  • Articles
    • Guest Author
      • Peter Ramadan
        • SOC IT to ME
        • The Power of Policy
        • CISO Elite
  • In The News
  • Podcast & Vlogs
    • Podcast Videos
    • Security Unfiltered Podcast Information
  • Training & Videos
    • AI
      • AI Governance
    • Cloud
      • AWS
      • Azure
      • Google Cloud
    • Networking
    • Scripting
    • Security
      • Application Security
      • Cloud Security
      • Incident Response
      • Pentesting Information
      • Risk Management
      • Security Policy
    • Servers
    • Microsoft SCCM
    • ISC2
  • Services
The Beginner’s Guide to Using AI: 5 Easy Ways to Get Started (Without Accidentally Summoning Skynet)
March 29, 2025

Hello aspiring AI whisperer! So, you've finally caved into peer pressure (or maybe your job straight-up told you it's on and poppin') and decided it is time to dip your …


Tips and Tricks to Enhance Your Incident Response Procedures
March 17, 2025

Written by Peter Ramadan. Incident response (IR) is the backbone of any organization’s cybersecurity defense. For CIOs, CISOs, and Directors of Information Security, your IR procedures are well-established—but how efficient and …


Building a Security Roadmap for Your Company: Strategic Precision for Modern Enterprises 
March 10, 2025

Written by Peter RamadanRunning a successful security program isn’t some pleasant game of hopscotch—it’s a war, and the battlefield’s shifting under your feet every damn day. Long-term risk? That’s not …


The Power of Policy: How Creating Strong Standard Operating Procedures Expedites Security Initiatives
March 6, 2025

Written by Peter Ramadan. CISSP Policy is the invisible thread that binds an organization together—a web of rules, subtle yet ironclad, dictating the commotion of the enterprises endeavors into some resembling …


Building a Future-Proof SOC: Strategies for CISOs and Infosec Leaders 
March 3, 2025

Written by Peter RamadanWelcome to the first in a series of articles on giving your Security Operation Center (SOC) a serious path to success. The responsibility of leading a SOC …


Building a Security Program Primer – Article #1
October 26, 2024

  Building From The Ground Up The idea of creating a security program from scratch crossed my mind many times before I had the chance to do it. When I landed into …


China-Nexus Actors Weaponize ‘Nezha’ Open Source Tool darkreadingNate Nelson, Contributing Writer
October 8, 2025

A threat actor is putting a spin on classic remote monitoring and management (RMM) attacks, using a Chinese open source tool instead. A threat actor is putting a spin on classic …


Calling All Influencers: Spear-Phishers Dangle Tesla, Red Bull Jobs darkreadingElizabeth Montalbano, Contributing Writer
October 8, 2025

Wanna work for a hot brand? Cyberattackers continue to evolve lures for job seekers in an impersonation campaign aimed at stealing resumes from social media pros. Wanna work for a hot …


LockBit, Qilin, and DragonForce Join Forces to Dominate the Ransomware Ecosystem The Hacker [email protected] (The Hacker News)
October 8, 2025

Three prominent ransomware groups DragonForce, LockBit, and Qilin have announced a new strategic ransomware alliance, once underscoring continued shifts in the cyber threat landscape. The coalition is seen as an attempt …


Step Into the Password Graveyard… If You Dare (and Join the Live Session) The Hacker [email protected] (The Hacker News)
October 8, 2025

Every year, weak passwords lead to millions in losses — and many of those breaches could have been stopped. Attackers don’t need advanced tools; they just need one careless login. For IT …


Severe Figma MCP Vulnerability Lets Hackers Execute Code Remotely — Patch Now The Hacker [email protected] (The Hacker News)
October 8, 2025

Cybersecurity researchers have disclosed details of a now-patched vulnerability in the popular figma-developer-mcp Model Context Protocol (MCP) server that could allow attackers to achieve code execution. The vulnerability, tracked as CVE-2025-53967 …


Polymorphic Python Malware, (Wed, Oct 8th) SANS Internet Storm Center, InfoCON: green
October 8, 2025

Today, I spoted on VirusTotal an interesting Python RAT. They are tons of them but this one attracted my attention based on some function names present in the code: self_modifying_wrapper(), …


OpenAI Disrupts Russian, North Korean, and Chinese Hackers Misusing ChatGPT for Cyberattacks The Hacker [email protected] (The Hacker News)
October 8, 2025

OpenAI on Tuesday said it disrupted three activity clusters for misusing its ChatGPT artificial intelligence (AI) tool to facilitate malware development. This includes a Russian‑language threat actor, who is said to …


ISC Stormcast For Wednesday, October 8th, 2025 https://isc.sans.edu/podcastdetail/9646, (Wed, Oct 8th) SANS Internet Storm Center, InfoCON: green
October 7, 2025

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License. (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.  ​Read More


Cyberattack Leads to Beer Shortage as Asahi Recovers darkreadingRobert Lemos, Contributing Writer
October 7, 2025

A ransomware last week left the Asahi brewery in Japan struggling to take orders and deliver its products domestically, as manufacturers become a favored target. A ransomware last week left the …


ShinyHunters Wage Broad Corporate Extortion Spree Krebs on SecurityBrianKrebs
October 7, 2025

A cybercriminal group that used voice phishing attacks to siphon more than a billion records from Salesforce customers earlier this year has launched a website that threatens to publish data …


Older Posts

    • Home
    • Blog & Observations
    • Articles
      • Guest Author
        • Peter Ramadan
          • SOC IT to ME
          • The Power of Policy
          • CISO Elite
    • In The News
    • Podcast & Vlogs
      • Podcast Videos
      • Security Unfiltered Podcast Information
    • Training & Videos
      • AI
        • AI Governance
      • Cloud
        • AWS
        • Azure
        • Google Cloud
      • Networking
      • Scripting
      • Security
        • Application Security
        • Cloud Security
        • Incident Response
        • Pentesting Information
        • Risk Management
        • Security Policy
      • Servers
      • Microsoft SCCM
      • ISC2
    • Services


  • About TechJacks
  • Privacy Policy
  • Gaming Kaiju
© Copyright Tech Jacks Solutions 2025