• Chinese Hackers Allegedly Pose as US Lawmaker darkreadingAlexander Culafi
    • Chinese APT Deploys EggStreme Fileless Malware to Breach Philippine Military Systems The Hacker [email protected] (The Hacker News)
    • BASE64 Over DNS, (Wed, Sep 10th) SANS Internet Storm Center, InfoCON: green
    • The Quiet Revolution in Kubernetes Security darkreadingNigel Douglas
    • CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems The Hacker [email protected] (The Hacker News)
    • The Beginner’s Guide to Using AI: 5 Easy Ways to Get Started (Without Accidentally Summoning Skynet)
      by Tech Jacks
      March 29, 2025
    • Tips and Tricks to Enhance Your Incident Response Procedures
      by Tech Jacks
      March 17, 2025
    • Building a Security Roadmap for Your Company: Strategic Precision for Modern Enterprises 
      by Tech Jacks
      March 10, 2025
    • The Power of Policy: How Creating Strong Standard Operating Procedures Expedites Security Initiatives
      by Tech Jacks
      March 6, 2025
    • Building a Future-Proof SOC: Strategies for CISOs and Infosec Leaders 
      by Tech Jacks
      March 3, 2025
    • Security Gate Keeping – Annoying – Unhelpful
      by Tech Jacks
      November 13, 2024

  • Home
  • Blog & Observations
  • Articles
    • Guest Author
      • Peter Ramadan
        • SOC IT to ME
        • The Power of Policy
        • CISO Elite
  • In The News
  • Podcast & Vlogs
    • Podcast Videos
    • Security Unfiltered Podcast Information
  • Training & Videos
    • AI
      • AI Governance
    • Cloud
      • AWS
      • Azure
      • Google Cloud
    • Networking
    • Scripting
    • Security
      • Application Security
      • Cloud Security
      • Incident Response
      • Pentesting Information
      • Risk Management
      • Security Policy
    • Servers
    • Microsoft SCCM
    • ISC2
  • Services
JSON Config File Leaks Azure ActiveDirectory Credentials darkreadingElizabeth Montalbano, Contributing Writer
September 2, 2025

In this type of misconfiguration, cyberattackers could use exposed secrets to authenticate directly via Microsoft’s OAuth 2.0 endpoints and infiltrate Azure cloud environments. In this type of misconfiguration, cyberattackers could use …


Shadow AI Discovery: A Critical Part of Enterprise AI Governance The Hacker [email protected] (The Hacker News)
September 2, 2025

The Harsh Truths of AI Adoption MITs State of AI in Business report revealed that while 40% of organizations have purchased enterprise LLM subscriptions, over 90% of employees are actively using …


Ukrainian Network FDN3 Launches Massive Brute-Force Attacks on SSL VPN and RDP Devices The Hacker [email protected] (The Hacker News)
September 2, 2025

Cybersecurity researchers have flagged a Ukrainian IP network for engaging in massive brute-force and password spraying campaigns targeting SSL VPN and RDP devices between June and July 2025. The activity originated …


Silver Fox Exploits Microsoft-Signed WatchDog Driver to Deploy ValleyRAT Malware The Hacker [email protected] (The Hacker News)
September 2, 2025

The threat actor known as Silver Fox has been attributed to abuse of a previously unknown vulnerable driver associated with WatchDog Anti-malware as part of a Bring Your Own Vulnerable …


A quick look at sextortion at scale: 1,900 messages and 205 Bitcoin addresses spanning four years, (Tue, Sep 2nd) SANS Internet Storm Center, InfoCON: green
September 1, 2025

What can almost 2,000 sextortion messages tell us about how threat actors operate and whether they are successful? Let's find out.  What can almost 2,000 sextortion messages tell us about how …


Malicious npm Package nodejs-smtp Mimics Nodemailer, Targets Atomic and Exodus Wallets The Hacker [email protected] (The Hacker News)
September 1, 2025

Cybersecurity researchers have discovered a malicious npm package that comes with stealthy features to inject malicious code into desktop apps for cryptocurrency wallets like Atomic and Exodus on Windows systems. The …


ISC Stormcast For Tuesday, September 2nd, 2025 https://isc.sans.edu/podcastdetail/9594, (Tue, Sep 2nd) SANS Internet Storm Center, InfoCON: green
September 1, 2025

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License. (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.  ​Read More


The Ongoing Fallout from a Breach at AI Chatbot Maker Salesloft Krebs on SecurityBrianKrebs
September 1, 2025

The recent mass-theft of authentication tokens from Salesloft, whose AI chatbot is used by a broad swath of corporate America to convert customer interaction into Salesforce leads, has left many …


Android Droppers Now Deliver SMS Stealers and Spyware, Not Just Banking Trojans The Hacker [email protected] (The Hacker News)
September 1, 2025

Cybersecurity researchers are calling attention to a new shift in the Android malware landscape where dropper apps, which are typically used to deliver banking trojans, to also distribute simpler malware …


⚡ Weekly Recap: WhatsApp 0-Day, Docker Bug, Salesforce Breach, Fake CAPTCHAs, Spyware App & More The Hacker [email protected] (The Hacker News)
September 1, 2025

Cybersecurity today is less about single attacks and more about chains of small weaknesses that connect into big risks. One overlooked update, one misused account, or one hidden tool in …


Newer Posts Older Posts

    • Home
    • Blog & Observations
    • Articles
      • Guest Author
        • Peter Ramadan
          • SOC IT to ME
          • The Power of Policy
          • CISO Elite
    • In The News
    • Podcast & Vlogs
      • Podcast Videos
      • Security Unfiltered Podcast Information
    • Training & Videos
      • AI
        • AI Governance
      • Cloud
        • AWS
        • Azure
        • Google Cloud
      • Networking
      • Scripting
      • Security
        • Application Security
        • Cloud Security
        • Incident Response
        • Pentesting Information
        • Risk Management
        • Security Policy
      • Servers
      • Microsoft SCCM
      • ISC2
    • Services


  • About TechJacks
  • Privacy Policy
  • Gaming Kaiju
© Copyright Tech Jacks Solutions 2025