DevAhmadz🖥️

6.3K posts

DevAhmadz🖥️ banner
DevAhmadz🖥️

DevAhmadz🖥️

@DevAhmadz

IT Support Specialist ⚙️ | DevOps Trainee 🧪 | Python Automation 🐍 Built an Offline AI Support Bot 🤖 | Bash, Streamlit, GitHub Novelist in progress ✍️ | Docs

Federal Capital Territory, Nig Beigetreten Aralık 2014
1.5K Folgt434 Follower
Angehefteter Tweet
DevAhmadz🖥️
DevAhmadz🖥️@DevAhmadz·
1/ Just dropped an AI IT Support Chatbot built with Python + OpenAI 🤖 But here's how I actually built it (in Gitpod, start to finish) — and what I'm planning next 👇
English
1
1
6
936
Wes
Wes@phishfinding·
Would y’all be interested in sec+ vouchers that come with retake attempts?
English
63
13
251
10.8K
Mobilisingnigerians™
Mobilisingnigerians™@mobilisingniger·
When I said ISWAP does not have sponsors this morning, alot of people came for my head. Many people will believe this fund is as a result of kidnapping proceeds but this is false, this fund is from Zakat (Taxes), the taxes they generate from locals to offer them protection in isolated controlled areas. If you want to do any trade as it is, you will pay this tax, ISWAP has a tax collector who receives the tax on their behalf, after you make your profit you will also share your profit proceed with them. Again, ISWAP does not have a financial sponsor as many Nigerians think, lots of Nigerians finance their operations knowingly and unknowingly.
PATRIOTIC SOJA ($TSIR-MUNCHAN)@Pressman2040

TROOPS INTERCEPT N37 MILLION TERRORIST FUNDS In a significant blow to terrorist financing networks, troops of Operation HADIN KAI have intercepted N37 million at a checkpoint along the Maiduguri–Gubio Road in Borno State. The cash was concealed in bags inside a suspicious vehicle. Five suspects were arrested. Mobile phones linked to terrorist coordination activities were also recovered. This is not the first such interception. In February, troops intercepted N37 million at another checkpoint. The pattern is clear: despite military pressure, terrorist logistics networks remain operational and well funded. "The interception represents a significant breakthrough in dismantling financial conduits suspected to support terrorist logistics and coordination activities," military sources said. The suspects are in custody, and investigations are ongoing to uncover the full network behind the financing. The question is no longer whether terrorist groups have access to funds. They do. The question is: who is funding them and how do we stop the pipeline?

English
34
49
146
28.6K
DevAhmadz🖥️
DevAhmadz🖥️@DevAhmadz·
@dokitawaa So why do I have serious stomach pain when I don't have sex or release
English
0
0
1
489
PATRIOTIC SOJA ($TSIR-MUNCHAN)
🇳🇬🇺🇸The US has 200 troops on Nigerian soil, flying Reaper drones from Bauchi to hunt terrorists alongside our military. Yet at the same time, they are evacuating non-essential embassy staff from Abuja and warning their citizens to stay away from 14 states. Let that sink in. They trust our soil enough to deploy their military assets and personnel for joint operations. But they do not trust our security enough to keep their diplomats and non-essential staff in place. They will fight with us. But they will not stay with us. This is not partnership. This is selective risk. You cannot claim to be building Nigeria's security capacity while simultaneously telling the world that large parts of the country are too dangerous for your own people. Either the security situation is under control enough for boots on the ground or it isn't. You cannot have it both ways. The contradiction is glaring. And Nigerians are watching.
PATRIOTIC SOJA ($TSIR-MUNCHAN) tweet mediaPATRIOTIC SOJA ($TSIR-MUNCHAN) tweet media
English
309
468
1.2K
91.9K
Koupon
Koupon@Shabosec·
There invoice 🧾 😂😂😂 I know what to do 😂😂😂
Koupon tweet media
English
3
0
17
11.1K
Koupon
Koupon@Shabosec·
Wonder shall Never End in this Self Hosted Program 😂😂😂 I found 23GB customer database using Y-Dork and some database in DuckDuckGo and they said is Out of scope Guess what They Fixed the directory but they don’t know I have download all the complete database F**CK THEM😂😂
English
12
1
52
6K
DevAhmadz🖥️
DevAhmadz🖥️@DevAhmadz·
@teflonjaz @larrizy @Pressman2040 who do you think tells the Government to re-instate them into the society, u are calling the same people for help.. u people should start doing proper research and know the kind of the stupid negotiation ur president has with U.S
English
1
0
0
12
Ọládélé 🇳🇬👑
Ọládélé 🇳🇬👑@Theoladeledada·
I refuse to believe there is no life out there outside earth. We don’t exist alone
English
156
233
1.9K
135.7K
DevAhmadz🖥️
DevAhmadz🖥️@DevAhmadz·
@teflonjaz @larrizy @Pressman2040 Bro Government are not innocent who do u hink the U.S uses.. or u think the Government is not involved.. why do u think there is silence.. there are negotiation going on offline, see ehn u can't have gas explosion in your house and you are using fuel to quench it
English
1
0
0
20
Mazi Teflon Rozay
Mazi Teflon Rozay@teflonjaz·
@DevAhmadz @larrizy @Pressman2040 Omo large population of Nigeria are so daft gosh! 😅 you not blaming your govt but you’re blaming the white man who came to help you out in the monster that your own evil govt ve breed all the years?
English
2
0
4
25
DevAhmadz🖥️
DevAhmadz🖥️@DevAhmadz·
@don_of_lagos1 @larrizy @Pressman2040 Bro stop saying nonsense and do the maths.. US came to Bauchi killings increased.. now they evacuating citizen common man... Na person wey dey inside go tell you wetin go happen before it happen
English
3
0
0
39
Lawry
Lawry@larrizy·
You speak like an illiterate. If you don't have what to tweet just close the app. A Brig Gen just died. The other day you were dragging Alex Babir for the Jos killings. Today you are dragging US for evacuating their citizens. What kind of hypocrite are you? I can almost guess your tribe.
English
8
4
70
1.7K
Cyber Pastey
Cyber Pastey@ayo__laolu·
Omo This is getting crazy😂 I was discussing with someone that it's only financial organizations in Nigeria that takes security half-seriously. You'll hardly ever find a CISO, or even security engineers in a hospital group, or a hotel/hospitalilty group or like even energy companies and other organizations like that. Most of them think their head of IT support and IT team is enough. Interestingly, these organizations suffer breaches EVERYTIME. Especially those hotels and hospitals, they don't care about PII and data leaks. We have a long way to go in Nigeria if we will have a base level security culture. Well, maybe if the NDPC starts to crack down on these leaks, some of these companies will take security infrastructure and data protection seriously.
Hackmanac@H4ckmanac

🚨Cyber Alert ‼️ 🇳🇬Nigeria - 𝗡𝗡𝗣𝗖 𝗛𝗲𝗮𝗹𝘁𝗵 𝗠𝗮𝗶𝗻𝘁𝗲𝗻𝗮𝗻𝗰𝗲 𝗢𝗿𝗴𝗮𝗻𝗶𝘀𝗮𝘁𝗶𝗼𝗻 XP95 hacking group claims to have breached NNPC Health Maintenance Organisation. Threat actor: XP95 Sector: Financial / Insurance Data exposure (claimed): 200,000 user records Data type: Personal data Observed: Apr 08, 2026 Status: Pending verification ESIX©: 5.73 Full details and impact assessment on HackRisk.io

English
1
0
2
151
DevAhmadz🖥️
DevAhmadz🖥️@DevAhmadz·
@commando_skiipz The reason i love this is that we will learn the hard, when people like us have experience apply for jobs, they will give a family member that knows nothing, there will be more to, is like somebody told this people that there is money in NIgeria
English
0
0
1
197
DevAhmadz🖥️ retweetet
KB4ThreatLabs
KB4ThreatLabs@Kb4Threatlabs·
🚨 PHISHING ALERT: "Anonymous Feedback" — The HR Trap KnowBe4 ThreatLabs is tracking a highly personalized phishing campaign targeting organizations across all sectors. Attackers are weaponizing the anxiety of "Peer Feedback" to harvest Microsoft 365 credentials through sophisticated social engineering. The Attack Vector This campaign stands out due to its high level of personalization. By using the victim's full name, employer, and location, the attackers create a sense of legitimacy that bypasses traditional skepticism. The Attack Chain The Hook: A "Confidential Feedback" email claiming an anonymous colleague has submitted a report regarding your recent workplace interactions. The Filter: The CTA "View Confidential Feedback" leads to a page protected by Cloudflare Turnstile. This isn't just for security; it’s a psychological trick to make the site appear "safe" and "official." The Payload: Once the CAPTCHA is cleared, the user is presented with a pixel-perfect M365 credential harvesting page. The Goal: Full account takeover to pivot deeper into the corporate network. 🛡️ IOCs TO MONITOR AND BLOCK: Subject Pattern: [Company Name]: Anonymous Peer Feedback Received for [Username] Sender: todd[@]jccmarineexports[.]com URLs: Automatedhrsolutionsfeedback[.]carrd[.]co dashboardhremployeepanelmstcopilot[.]clearbrandmessage[.]de u60904143[.]ct[.]sendgrid[.]net #CyberSecurity #Phishing #M365 #KnowBe4 #ThreatIntel #HumanRisk
KB4ThreatLabs tweet mediaKB4ThreatLabs tweet mediaKB4ThreatLabs tweet mediaKB4ThreatLabs tweet media
English
2
31
86
10.7K
Jeet
Jeet@youraveragejeet·
this is the yahoo yahoo culture displaying itself in real time. when former yahoo yahoo boys are employed in critical infrastructures because they wear suit and have a very impressive qualification. i am wondering if these insiders had any thorough background check done on them before they were employed. expact more stuff like this in the future.
English
2
1
1
1.3K
Sam Ivere
Sam Ivere@hsprafrique·
Nigeria’s EFCC just dropped a bombshell on a sophisticated cyber-financial crime that hit SIX major Nigerian banks at the same time. EFCC Chairman Ola Olukoyede revealed the details while discussing new threats to the country’s banking infrastructure. This wasn’t your usual external hack — it was an insider-enabled hardware backdoor operation that combined corrupt employees with external cybercrime networks. How the fraud actually started The attackers never tried to break in remotely at first. Instead, the operation began inside the banks’ own physical infrastructure. Insiders with authorized access to server rooms and network racks allegedly helped install unauthorized electronic devices directly into the banks’ internal systems. These weren’t random gadgets — they were covert gateways planted right in the heart of the network. What those secret devices actually did Once connected, the devices functioned like: • Rogue remote access tools • Network tunneling devices • Hardware backdoors This gave external criminals full remote control. They could: → Access internal banking applications → Execute transactions → Monitor live account activity → Move funds between accounts Because everything ran through the bank’s own internal network, many fraud detection systems flagged the activity as legitimate internal traffic. Why insiders were the key EFCC investigators were crystal clear: This attack could NOT have happened without insiders. Installing these devices required physical access to restricted areas — server rooms, network racks, IT infrastructure. Only bank employees or contractors with proper privileges could plant them without triggering alarms. What the attackers could do once inside With the hardware backdoor live, outsiders could remotely: • Initiate large transfers • Authorize internal operations • Route funds through multiple accounts to obscure the trail • Mask the true origin of every transaction The system literally thought it was just doing normal bank business. Why this attack was so dangerous Traditional banking security focuses on external threats: malware, phishing, credential theft. This operation completely bypassed all of that. The attackers had a physical entry point inside the perimeter. From that moment, they operated like trusted insiders. Automated systems had almost no way to tell the difference between a real employee and the criminals. The scale of the heist The scheme successfully affected six Nigerian banks (names not all publicly released yet). Investigators say the criminals moved billions of naira before the operation was detected. Funds were laundered through layered accounts across multiple banks to make tracing extremely difficult. The bigger cybersecurity lesson for Nigeria (and the world) The most dangerous threat to financial systems isn’t always some genius hacker in a basement. It’s the deadly mix of: ✅ Insider access ✅ Physical hardware backdoors ✅ Professional external cybercrime networks Once attackers are inside the network, the game changes completely. This case is a loud wake-up call for every bank in Nigeria and beyond: Physical security + insider vetting + strict device control are now just as critical as firewalls and antivirus. What do you think — should banks be doing random device sweeps and stricter background checks on IT staff? Drop your thoughts 👇 #EFCC #CyberFraud #NigerianBanks #InsiderThreat #CyberSecurity (Repost & share to spread awareness — this one is serious)
English
22
67
134
24.1K
DevAhmadz🖥️
DevAhmadz🖥️@DevAhmadz·
@Ibby_6ix @hsprafrique do the so called banks, have IT security and even if they are technical good, most banks employ based on who you know
English
1
0
0
11
Iby Akai ❁
Iby Akai ❁@Ibby_6ix·
@hsprafrique Most of these fraud exist cos the consequences is rather too soft. Banks should do everything possible not to trust even their staff and put all security in double checks always.
English
3
1
2
872
Dr Iretioluwa Akerele
What is that thing you can teach for 30 minutes effortlessly?
English
75
10
95
10.2K