• Noisy Bear Targets Kazakhstan Energy Sector With BarrelFire Phishing Campaign The Hacker [email protected] (The Hacker News)
    • Malicious npm Packages Impersonate Flashbots, Steal Ethereum Wallet Keys The Hacker [email protected] (The Hacker News)
    • GOP Cries Censorship Over Spam Filters That Work Krebs on SecurityBrianKrebs
    • How Has IoT Security Changed Over the Past 5 Years? darkreadingArielle Waldman
    • Critical SAP S/4HANA Vulnerability Under Attack, Patch Now darkreadingRob Wright
    • The Beginner’s Guide to Using AI: 5 Easy Ways to Get Started (Without Accidentally Summoning Skynet)
      by Tech Jacks
      March 29, 2025
    • Tips and Tricks to Enhance Your Incident Response Procedures
      by Tech Jacks
      March 17, 2025
    • Building a Security Roadmap for Your Company: Strategic Precision for Modern Enterprises 
      by Tech Jacks
      March 10, 2025
    • The Power of Policy: How Creating Strong Standard Operating Procedures Expedites Security Initiatives
      by Tech Jacks
      March 6, 2025
    • Building a Future-Proof SOC: Strategies for CISOs and Infosec Leaders 
      by Tech Jacks
      March 3, 2025
    • Security Gate Keeping – Annoying – Unhelpful
      by Tech Jacks
      November 13, 2024

  • Home
  • Blog & Observations
  • Articles
    • Guest Author
      • Peter Ramadan
        • SOC IT to ME
        • The Power of Policy
        • CISO Elite
  • In The News
  • Podcast & Vlogs
    • Podcast Videos
    • Security Unfiltered Podcast Information
  • Training & Videos
    • AI
      • AI Governance
    • Cloud
      • AWS
      • Azure
      • Google Cloud
    • Networking
    • Scripting
    • Security
      • Application Security
      • Cloud Security
      • Incident Response
      • Pentesting Information
      • Risk Management
      • Security Policy
    • Servers
    • Microsoft SCCM
    • ISC2
  • Services
The Beginner’s Guide to Using AI: 5 Easy Ways to Get Started (Without Accidentally Summoning Skynet)
March 29, 2025

Hello aspiring AI whisperer! So, you've finally caved into peer pressure (or maybe your job straight-up told you it's on and poppin') and decided it is time to dip your …


Tips and Tricks to Enhance Your Incident Response Procedures
March 17, 2025

Written by Peter Ramadan. Incident response (IR) is the backbone of any organization’s cybersecurity defense. For CIOs, CISOs, and Directors of Information Security, your IR procedures are well-established—but how efficient and …


Building a Security Roadmap for Your Company: Strategic Precision for Modern Enterprises 
March 10, 2025

Written by Peter RamadanRunning a successful security program isn’t some pleasant game of hopscotch—it’s a war, and the battlefield’s shifting under your feet every damn day. Long-term risk? That’s not …


The Power of Policy: How Creating Strong Standard Operating Procedures Expedites Security Initiatives
March 6, 2025

Written by Peter Ramadan. CISSP Policy is the invisible thread that binds an organization together—a web of rules, subtle yet ironclad, dictating the commotion of the enterprises endeavors into some resembling …


Building a Future-Proof SOC: Strategies for CISOs and Infosec Leaders 
March 3, 2025

Written by Peter RamadanWelcome to the first in a series of articles on giving your Security Operation Center (SOC) a serious path to success. The responsibility of leading a SOC …


Building a Security Program Primer – Article #1
October 26, 2024

  Building From The Ground Up The idea of creating a security program from scratch crossed my mind many times before I had the chance to do it. When I landed into …


Noisy Bear Targets Kazakhstan Energy Sector With BarrelFire Phishing Campaign The Hacker [email protected] (The Hacker News)
September 6, 2025

A threat actor possibly of Russian origin has been attributed to a new set of attacks targeting the energy sector in Kazakhstan. The activity, codenamed Operation BarrelFire, is tied to a …


Malicious npm Packages Impersonate Flashbots, Steal Ethereum Wallet Keys The Hacker [email protected] (The Hacker News)
September 5, 2025

A new set of four malicious packages have been discovered in the npm package registry with capabilities to steal cryptocurrency wallet credentials from Ethereum developers. "The packages masquerade as legitimate cryptographic …


GOP Cries Censorship Over Spam Filters That Work Krebs on SecurityBrianKrebs
September 5, 2025

The chairman of the Federal Trade Commission (FTC) last week sent a letter to Google's CEO demanding to know why Gmail was blocking messages from Republican senders while allegedly failing …


How Has IoT Security Changed Over the Past 5 Years? darkreadingArielle Waldman
September 5, 2025

Experts agree there have been subtle improvements, with new laws and applied best practices, but there is still a long way to go. Experts agree there have been subtle improvements, with …


Critical SAP S/4HANA Vulnerability Under Attack, Patch Now darkreadingRob Wright
September 5, 2025

Exploitation of CVE-2025-42957 requires "minimal effort" and can result in a complete compromise of the SAP system and host OS, according to researchers. Exploitation of CVE-2025-42957 requires "minimal effort" and can …


Anyone Using Agentic AI Needs to Understand Toxic Flows darkreadingEricka Chickowski, Contributing Writer
September 5, 2025

The biggest vulnerabilities may lie at the boundaries of where the AI agent connects with the enterprise system. The biggest vulnerabilities may lie at the boundaries of where the AI agent …


Secretive MaaS Group ‘TAG-150’ Develops Novel ‘CastleRAT’ darkreadingNate Nelson, Contributing Writer
September 5, 2025

TAG-150 is running a multifaceted and relatively successful malware-as-a-service operation, without advertising itself on the Dark Web. TAG-150 is running a multifaceted and relatively successful malware-as-a-service operation, without advertising itself on …


CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation The Hacker [email protected] (The Hacker News)
September 5, 2025

Federal Civilian Executive Branch (FCEB) agencies are being advised to update their Sitecore instances by September 25, 2025, following the discovery of a security flaw that has come under active …


Scammers Are Using Grok to Spread Malicious Links on X darkreadingNate Nelson, Contributing Writer
September 5, 2025

It's called "grokking," and gives spammers a way to skirt X's ban on links in promoted posts and reach larger audiences than ever before. It's called "grokking," and gives spammers a …


TAG-150 Develops CastleRAT in Python and C, Expanding CastleLoader Malware Operations The Hacker [email protected] (The Hacker News)
September 5, 2025

The threat actor behind the malware-as-a-service (MaaS) framework and loader called CastleLoader has also developed a remote access trojan known as CastleRAT. "Available in both Python and C variants, CastleRAT's core …


Older Posts

    • Home
    • Blog & Observations
    • Articles
      • Guest Author
        • Peter Ramadan
          • SOC IT to ME
          • The Power of Policy
          • CISO Elite
    • In The News
    • Podcast & Vlogs
      • Podcast Videos
      • Security Unfiltered Podcast Information
    • Training & Videos
      • AI
        • AI Governance
      • Cloud
        • AWS
        • Azure
        • Google Cloud
      • Networking
      • Scripting
      • Security
        • Application Security
        • Cloud Security
        • Incident Response
        • Pentesting Information
        • Risk Management
        • Security Policy
      • Servers
      • Microsoft SCCM
      • ISC2
    • Services


  • About TechJacks
  • Privacy Policy
  • Gaming Kaiju
© Copyright Tech Jacks Solutions 2025