• Attackers Exploit Critical Trend Micro Apex One Zero-Day Flaw darkreadingElizabeth Montalbano, Contributing Writer
    • What CMMC 3.0 Really Means for Government Contractors darkreadingKyle Dewar
    • Phishers Abuse Microsoft 365 to Spoof Internal Users darkreadingJai Vijayan, Contributing Writer
    • Who Got Arrested in the Raid on the XSS Crime Forum? Krebs on SecurityBrianKrebs
    • CISA Releases Malware Analysis Report Associated with Microsoft SharePoint Vulnerabilities AlertsCISA
    • The Beginner’s Guide to Using AI: 5 Easy Ways to Get Started (Without Accidentally Summoning Skynet)
      by Tech Jacks
      March 29, 2025
    • Tips and Tricks to Enhance Your Incident Response Procedures
      by Tech Jacks
      March 17, 2025
    • Building a Security Roadmap for Your Company: Strategic Precision for Modern Enterprises 
      by Tech Jacks
      March 10, 2025
    • The Power of Policy: How Creating Strong Standard Operating Procedures Expedites Security Initiatives
      by Tech Jacks
      March 6, 2025
    • Building a Future-Proof SOC: Strategies for CISOs and Infosec Leaders 
      by Tech Jacks
      March 3, 2025
    • Security Gate Keeping – Annoying – Unhelpful
      by Tech Jacks
      November 13, 2024

  • Home
  • Blog & Observations
  • Articles
    • Guest Author
      • Peter Ramadan
        • SOC IT to ME
        • The Power of Policy
        • CISO Elite
  • In The News
  • Podcast & Vlogs
    • Podcast Videos
    • Security Unfiltered Podcast Information
  • Training & Videos
    • AI
      • AI Governance
    • Cloud
      • AWS
      • Azure
      • Google Cloud
    • Networking
    • Scripting
    • Security
      • Application Security
      • Cloud Security
      • Incident Response
      • Pentesting Information
      • Risk Management
      • Security Policy
    • Servers
    • Microsoft SCCM
    • ISC2
  • Services
CISA Adds Four Known Exploited Vulnerabilities to Catalog AlertsCISA
July 22, 2025

CISA has added four new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2025-54309 CrushFTP Unprotected Alternate Channel Vulnerability CVE-2025-6558 Google Chromium ANGLE and GPU Improper Input …


CISA Adds Two Known Exploited Vulnerabilities to Catalog AlertsCISA
July 22, 2025

CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2025-49704 Microsoft SharePoint Code Injection Vulnerability CVE-2025-49706 Microsoft SharePoint Improper Authentication Vulnerability These types of …


CISA Releases Nine Industrial Control Systems Advisories AlertsCISA
July 22, 2025

CISA released nine Industrial Control Systems (ICS) advisories on July 22, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-25-203-01 DuraComm DP-10iN-100-MU ICSA-25-203-02 Lantronix Provisioning …


Joint Advisory Issued on Protecting Against Interlock Ransomware AlertsCISA
July 22, 2025

CISA, in partnership with the Federal Bureau of Investigation (FBI), the Department of Health and Human Services, and the Multi-State Information Sharing and Analysis Center issued a joint Cybersecurity Advisory …


How to Advance from SOC Manager to CISO? The Hacker [email protected] (The Hacker News)
July 22, 2025

Making the move from managing a security operations center (SOC) to being a chief information security officer (CISO) is a significant career leap. Not only do you need a solid …


China-Backed APT41 Cyberattack Surfaces in Africa darkreadingJai Vijayan, Contributing Writer
July 22, 2025

Up to now, the prolific China-sponsored cyber-espionage group has been mostly absent from the region, but a sophisticated and highly targeted attack on an African IT company shows Beijing is …


Hackers Exploit SharePoint Zero-Day Since July 7 to Steal Keys, Maintain Persistent Access The Hacker [email protected] (The Hacker News)
July 22, 2025

The recently disclosed critical Microsoft SharePoint vulnerability has been under exploitation as early as July 7, 2025, according to findings from Check Point Research. The cybersecurity company said it observed first …


WinRAR MoTW Propagation Privacy, (Tue, Jul 22nd) SANS Internet Storm Center, InfoCON: green
July 21, 2025

Since WinRAR 7.10, not all Mark-of-The-Web data (stored in the Zone.Identifier Alternate Data Stream) is propagated when you extract a file from an archive.  Since WinRAR 7.10, not all Mark-of-The-Web data …


Wireshark 4.4.8 Released, (Tue, Jul 22nd) SANS Internet Storm Center, InfoCON: green
July 21, 2025

Wireshark release 4.4.8 fixes 9 bugs.  Wireshark release 4.4.8 fixes 9 bugs. Didier Stevens Senior handler blog.DidierStevens.com (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.  ​Read More


ISC Stormcast For Tuesday, July 22nd, 2025 https://isc.sans.edu/podcastdetail/9536, (Tue, Jul 22nd) SANS Internet Storm Center, InfoCON: green
July 21, 2025

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License. (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.  ​Read More


Newer Posts Older Posts

    • Home
    • Blog & Observations
    • Articles
      • Guest Author
        • Peter Ramadan
          • SOC IT to ME
          • The Power of Policy
          • CISO Elite
    • In The News
    • Podcast & Vlogs
      • Podcast Videos
      • Security Unfiltered Podcast Information
    • Training & Videos
      • AI
        • AI Governance
      • Cloud
        • AWS
        • Azure
        • Google Cloud
      • Networking
      • Scripting
      • Security
        • Application Security
        • Cloud Security
        • Incident Response
        • Pentesting Information
        • Risk Management
        • Security Policy
      • Servers
      • Microsoft SCCM
      • ISC2
    • Services


  • About TechJacks
  • Privacy Policy
  • Gaming Kaiju
© Copyright Tech Jacks Solutions 2025