• xorsearch.py: Python Functions, (Sat, May 17th) SANS Internet Storm Center, InfoCON: green
    • Coinbase Extorted, Offers $20M for Info on Its Hackers darkreadingNate Nelson, Contributing Writer
    • Australian Human Rights Commission Leaks Docs in Data Breach darkreadingKristina Beek, Associate Editor, Dark Reading
    • Dynamic DNS Emerges as Go-to Cyberattack Facilitator darkreadingRob Wright
    • Attacker Specialization Puts Threat Modeling on Defensive darkreadingRobert Lemos, Contributing Writer
    • The Beginner’s Guide to Using AI: 5 Easy Ways to Get Started (Without Accidentally Summoning Skynet)
      by Tech Jacks
      March 29, 2025
    • Tips and Tricks to Enhance Your Incident Response Procedures
      by Tech Jacks
      March 17, 2025
    • Building a Security Roadmap for Your Company: Strategic Precision for Modern Enterprises 
      by Tech Jacks
      March 10, 2025
    • The Power of Policy: How Creating Strong Standard Operating Procedures Expedites Security Initiatives
      by Tech Jacks
      March 6, 2025
    • Building a Future-Proof SOC: Strategies for CISOs and Infosec Leaders 
      by Tech Jacks
      March 3, 2025
    • Security Gate Keeping – Annoying – Unhelpful
      by Tech Jacks
      November 13, 2024

  • Home
  • Blog & Observations
  • Articles
    • Guest Author
      • Peter Ramadan
        • SOC IT to ME
        • The Power of Policy
        • CISO Elite
  • In The News
  • Podcast & Vlogs
    • Podcast Videos
    • Security Unfiltered Podcast Information
  • Training & Videos
    • AI
      • AI Governance
    • Cloud
      • AWS
      • Azure
      • Google Cloud
    • Networking
    • Scripting
    • Security
      • Application Security
      • Cloud Security
      • Incident Response
      • Pentesting Information
      • Risk Management
      • Security Policy
    • Servers
    • Microsoft SCCM
    • ISC2
  • Services
The Beginner’s Guide to Using AI: 5 Easy Ways to Get Started (Without Accidentally Summoning Skynet)
March 29, 2025

Hello aspiring AI whisperer! So, you've finally caved into peer pressure (or maybe your job straight-up told you it's on and poppin') and decided it is time to dip your …


Tips and Tricks to Enhance Your Incident Response Procedures
March 17, 2025

Written by Peter Ramadan. Incident response (IR) is the backbone of any organization’s cybersecurity defense. For CIOs, CISOs, and Directors of Information Security, your IR procedures are well-established—but how efficient and …


Building a Security Roadmap for Your Company: Strategic Precision for Modern Enterprises 
March 10, 2025

Written by Peter RamadanRunning a successful security program isn’t some pleasant game of hopscotch—it’s a war, and the battlefield’s shifting under your feet every damn day. Long-term risk? That’s not …


The Power of Policy: How Creating Strong Standard Operating Procedures Expedites Security Initiatives
March 6, 2025

Written by Peter Ramadan. CISSP Policy is the invisible thread that binds an organization together—a web of rules, subtle yet ironclad, dictating the commotion of the enterprises endeavors into some resembling …


Building a Future-Proof SOC: Strategies for CISOs and Infosec Leaders 
March 3, 2025

Written by Peter RamadanWelcome to the first in a series of articles on giving your Security Operation Center (SOC) a serious path to success. The responsibility of leading a SOC …


Building a Security Program Primer – Article #1
October 26, 2024

  Building From The Ground Up The idea of creating a security program from scratch crossed my mind many times before I had the chance to do it. When I landed into …


xorsearch.py: Python Functions, (Sat, May 17th) SANS Internet Storm Center, InfoCON: green
May 17, 2025

A couple years ago I published tool xorsearch.py for this diary entry: "Small Challenge: A Simple Word Maldoc - Part 4".  A couple years ago I published tool xorsearch.py for this …


Coinbase Extorted, Offers $20M for Info on Its Hackers darkreadingNate Nelson, Contributing Writer
May 16, 2025

Coinbase is going Liam Neeson on its attackers, potentially setting a new precedent for incident response in the wake of crypto- and blockchain-targeting cyberattacks. Coinbase is going Liam Neeson on its …


Australian Human Rights Commission Leaks Docs in Data Breach darkreadingKristina Beek, Associate Editor, Dark Reading
May 16, 2025

An internal error led to public disclosure of reams of sensitive data that could be co-opted for follow-on cyberattacks. An internal error led to public disclosure of reams of sensitive data …


Dynamic DNS Emerges as Go-to Cyberattack Facilitator darkreadingRob Wright
May 16, 2025

Scattered Spider and other phishers and hacking groups are using rentable subdomains from dynamic DNS providers to obfuscate their activity and impersonate well-known brands. Scattered Spider and other phishers and hacking …


Attacker Specialization Puts Threat Modeling on Defensive darkreadingRobert Lemos, Contributing Writer
May 16, 2025

Specialization among threat groups poses challenges for defenders, who now must distinguish between different actors responsible for different facets of an attack. Specialization among threat groups poses challenges for defenders, who …


How to Develop and Communicate Metrics for CSIRPs darkreadingCraig Porter
May 16, 2025

A well-documented cybersecurity incident response program (CSIRP) provides the transparency needed for informed decision-making, protecting the organization in a constantly changing threat environment. A well-documented cybersecurity incident response program (CSIRP) provides …


New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors The Hacker [email protected] (The Hacker News)
May 16, 2025

Cybersecurity researchers are calling attention to a new botnet malware called HTTPBot that has been used to primarily single out the gaming industry, as well as technology companies and educational …


Top 10 Best Practices for Effective Data Protection The Hacker [email protected] (The Hacker News)
May 16, 2025

Data is the lifeblood of productivity, and protecting sensitive data is more critical than ever. With cyber threats evolving rapidly and data privacy regulations tightening, organizations must stay vigilant and …


Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks The Hacker [email protected] (The Hacker News)
May 16, 2025

Researchers at ETH Zürich have discovered yet another security flaw that they say impacts all modern Intel CPUs and causes them to leak sensitive data from memory, showing that the …


Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks The Hacker [email protected] (The Hacker News)
May 16, 2025

Cybersecurity researchers have shed light on a new malware campaign that makes use of a PowerShell-based shellcode loader to deploy a remote access trojan called Remcos RAT. "Threat actors delivered malicious …


Older Posts

    • Home
    • Blog & Observations
    • Articles
      • Guest Author
        • Peter Ramadan
          • SOC IT to ME
          • The Power of Policy
          • CISO Elite
    • In The News
    • Podcast & Vlogs
      • Podcast Videos
      • Security Unfiltered Podcast Information
    • Training & Videos
      • AI
        • AI Governance
      • Cloud
        • AWS
        • Azure
        • Google Cloud
      • Networking
      • Scripting
      • Security
        • Application Security
        • Cloud Security
        • Incident Response
        • Pentesting Information
        • Risk Management
        • Security Policy
      • Servers
      • Microsoft SCCM
      • ISC2
    • Services


  • About TechJacks
  • Privacy Policy
  • Gaming Kaiju
© Copyright Tech Jacks Solutions 2025