• Google Patches Chrome Zero-Day CVE-2025-10585 as Active V8 Exploit Threatens Millions The Hacker [email protected] (The Hacker News)
    • ISC Stormcast For Thursday, September 18th, 2025 https://isc.sans.edu/podcastdetail/9618, (Thu, Sep 18th) SANS Internet Storm Center, InfoCON: green
    • Exploring Uploads in a Dshield Honeypot Environment [Guest Diary], (Thu, Sep 18th) SANS Internet Storm Center, InfoCON: green
    • Microsoft Disrupts ‘RaccoonO365’ Phishing Service darkreadingAlexander Culafi
    • ‘Scattered Lapsus$ Hunters,’ Others Announce End of Hacking Spree darkreadingKristina Beek
    • The Beginner’s Guide to Using AI: 5 Easy Ways to Get Started (Without Accidentally Summoning Skynet)
      by Tech Jacks
      March 29, 2025
    • Tips and Tricks to Enhance Your Incident Response Procedures
      by Tech Jacks
      March 17, 2025
    • Building a Security Roadmap for Your Company: Strategic Precision for Modern Enterprises 
      by Tech Jacks
      March 10, 2025
    • The Power of Policy: How Creating Strong Standard Operating Procedures Expedites Security Initiatives
      by Tech Jacks
      March 6, 2025
    • Building a Future-Proof SOC: Strategies for CISOs and Infosec Leaders 
      by Tech Jacks
      March 3, 2025
    • Security Gate Keeping – Annoying – Unhelpful
      by Tech Jacks
      November 13, 2024

  • Home
  • Blog & Observations
  • Articles
    • Guest Author
      • Peter Ramadan
        • SOC IT to ME
        • The Power of Policy
        • CISO Elite
  • In The News
  • Podcast & Vlogs
    • Podcast Videos
    • Security Unfiltered Podcast Information
  • Training & Videos
    • AI
      • AI Governance
    • Cloud
      • AWS
      • Azure
      • Google Cloud
    • Networking
    • Scripting
    • Security
      • Application Security
      • Cloud Security
      • Incident Response
      • Pentesting Information
      • Risk Management
      • Security Policy
    • Servers
    • Microsoft SCCM
    • ISC2
  • Services
The Beginner’s Guide to Using AI: 5 Easy Ways to Get Started (Without Accidentally Summoning Skynet)
March 29, 2025

Hello aspiring AI whisperer! So, you've finally caved into peer pressure (or maybe your job straight-up told you it's on and poppin') and decided it is time to dip your …


Tips and Tricks to Enhance Your Incident Response Procedures
March 17, 2025

Written by Peter Ramadan. Incident response (IR) is the backbone of any organization’s cybersecurity defense. For CIOs, CISOs, and Directors of Information Security, your IR procedures are well-established—but how efficient and …


Building a Security Roadmap for Your Company: Strategic Precision for Modern Enterprises 
March 10, 2025

Written by Peter RamadanRunning a successful security program isn’t some pleasant game of hopscotch—it’s a war, and the battlefield’s shifting under your feet every damn day. Long-term risk? That’s not …


The Power of Policy: How Creating Strong Standard Operating Procedures Expedites Security Initiatives
March 6, 2025

Written by Peter Ramadan. CISSP Policy is the invisible thread that binds an organization together—a web of rules, subtle yet ironclad, dictating the commotion of the enterprises endeavors into some resembling …


Building a Future-Proof SOC: Strategies for CISOs and Infosec Leaders 
March 3, 2025

Written by Peter RamadanWelcome to the first in a series of articles on giving your Security Operation Center (SOC) a serious path to success. The responsibility of leading a SOC …


Building a Security Program Primer – Article #1
October 26, 2024

  Building From The Ground Up The idea of creating a security program from scratch crossed my mind many times before I had the chance to do it. When I landed into …


Google Patches Chrome Zero-Day CVE-2025-10585 as Active V8 Exploit Threatens Millions The Hacker [email protected] (The Hacker News)
September 17, 2025

Google on Wednesday released security updates for the Chrome web browser to address four vulnerabilities, including one that it said has been exploited in the wild. The zero-day vulnerability in question …


ISC Stormcast For Thursday, September 18th, 2025 https://isc.sans.edu/podcastdetail/9618, (Thu, Sep 18th) SANS Internet Storm Center, InfoCON: green
September 17, 2025

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License. (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.  ​Read More


Exploring Uploads in a Dshield Honeypot Environment [Guest Diary], (Thu, Sep 18th) SANS Internet Storm Center, InfoCON: green
September 17, 2025

[This is a Guest Diary by Nathan Smisson, an ISC intern as part of the SANS.edu BACS program]  [This is a Guest Diary by Nathan Smisson, an ISC intern as part …


Microsoft Disrupts ‘RaccoonO365’ Phishing Service darkreadingAlexander Culafi
September 17, 2025

Phishing-as-a-service (PhaaS) kits have become an increasingly popular way for lower-skill individuals who want to get into cybercrime. Phishing-as-a-service (PhaaS) kits have become an increasingly popular way for lower-skill individuals who …


‘Scattered Lapsus$ Hunters,’ Others Announce End of Hacking Spree darkreadingKristina Beek
September 17, 2025

Though the groups have shared their decision to go dark, threat researchers say there are signs that it's business as usual. Though the groups have shared their decision to go dark, …


TA558 Uses AI-Generated Scripts to Deploy Venom RAT in Brazil Hotel Attacks The Hacker [email protected] (The Hacker News)
September 17, 2025

The threat actor known as TA558 has been attributed to a fresh set of attacks delivering various remote access trojans (RATs) like Venom RAT to breach hotels in Brazil and …


AI-Powered Sign-up Fraud Is Scaling Fast darkreading
September 17, 2025

The AI era means attackers are smarter, faster, and hitting you where you least expect it — your sign-up funnel. The AI era means attackers are smarter, faster, and hitting you …


Chinese TA415 Uses VS Code Remote Tunnels to Spy on U.S. Economic Policy Experts The Hacker [email protected] (The Hacker News)
September 17, 2025

A China-aligned threat actor known as TA415 has been attributed to spear-phishing campaigns targeting the U.S. government, think tanks, and academic organizations utilizing U.S.-China economic-themed lures. "In this activity, the group …


Raven Stealer Scavenges Chromium Data Via Telegram darkreadingElizabeth Montalbano, Contributing Writer
September 17, 2025

The new lightweight stealer, distributed via underground forums and cracked software, demonstrates an important evolution in the stealth of commodity infostealing malware. The new lightweight stealer, distributed via underground forums and …


From Quantum Hacks to AI Defenses – Expert Guide to Building Unbreakable Cyber Resilience The Hacker [email protected] (The Hacker News)
September 17, 2025

Quantum computing and AI working together will bring incredible opportunities. Together, the technologies will help us extend innovation further and faster than ever before. But, imagine the flip side, waking …


Older Posts

    • Home
    • Blog & Observations
    • Articles
      • Guest Author
        • Peter Ramadan
          • SOC IT to ME
          • The Power of Policy
          • CISO Elite
    • In The News
    • Podcast & Vlogs
      • Podcast Videos
      • Security Unfiltered Podcast Information
    • Training & Videos
      • AI
        • AI Governance
      • Cloud
        • AWS
        • Azure
        • Google Cloud
      • Networking
      • Scripting
      • Security
        • Application Security
        • Cloud Security
        • Incident Response
        • Pentesting Information
        • Risk Management
        • Security Policy
      • Servers
      • Microsoft SCCM
      • ISC2
    • Services


  • About TechJacks
  • Privacy Policy
  • Gaming Kaiju
© Copyright Tech Jacks Solutions 2025