Nwokedi Chukwuebuka

287 posts

Nwokedi Chukwuebuka

Nwokedi Chukwuebuka

@Deep2times1

Introverted.Blockchain Tech,Defi,NFT and Metaverse person,Junior Cybersecurity Analyst,Penetration Tester....

가입일 Şubat 2022
111 팔로잉11 팔로워
Abdulkadir | Cybersec
Abdulkadir | Cybersec@cyber__razz·
POV: The penetration tester sends his report and your name is in it
Abdulkadir | Cybersec tweet media
English
15
22
276
11.1K
Nwokedi Chukwuebuka
Nwokedi Chukwuebuka@Deep2times1·
@HellsHarlot402 @CyberRacheal From the definition, where does a white hat and a grey hat belong? If the keyword is authorization then a grey hat can not be a pentester but can be an ethical hacker.
English
0
0
0
11
Jayne
Jayne@HellsHarlot402·
@CyberRacheal Pen testing is the deliberate authorised act of breaking into a system to find vulnerabilities. Whereas ethical hacking isn’t authorised specifically by the owner of the system. My dad was a pen tester.
English
2
0
4
178
Cyber_Racheal
Cyber_Racheal@CyberRacheal·
Be real, Did you know Pen-testing is different from Ethical hacking? 🤔 If yes, how different are they?
English
22
12
73
6.8K
Nwokedi Chukwuebuka
Nwokedi Chukwuebuka@Deep2times1·
@predict_addict No idea is original to anyone, knowledge belongs to nature. If others claim China copied from them should Africa also claim every other people also copied from them since civilization started in Africa like history taught.
English
0
0
0
75
Valeriy M., PhD, MBA, CQF
Valeriy M., PhD, MBA, CQF@predict_addict·
So apparently there are claims that DeepSeek “distilled” Western AI. Let’s set the record straight. At this point in time, China 🇨🇳 has distilled European trains, Russian fighter jets and other military technologies, Soviet math to turbo‑charge its STEM development. Likewise, Germany distilled the entire Industrial Revolution from the UK. And the USA has been distilling for over a century—starting with European math and science, the Manhattan Project, the complete distillation of Nazi Germany’s rocket program into NASA, Russian Sikorsky helicopters, and even the Kalman filter distilled from a USSR AI conference. Distillation is just what rising powers do. Call it borrowing, call it inspiration, call it standing on the shoulders of giants—but don’t pretend it’s a scandal when the shoes fit everyone.
Valeriy M., PhD, MBA, CQF tweet media
English
44
150
888
44.6K
Ahmedkhan
Ahmedkhan@Ahmed___khaan·
About 75% of the skills needed to build a tech ompany are not tech skills.
English
2
0
10
495
Nwokedi Chukwuebuka 리트윗함
The ICIR
The ICIR@TheICIR·
The heartbreaking story of Eno Offordum serves as a grim reminder of the human cost behind Nigeria’s rising insecurity. In February 2026, her husband, John Offordum, was gunned down by kidnappers at their home in Akure North. The attack didn't just claim one life; it claimed the community's peace. A fellow resident, Mama Christianah, also lost her life after a hospital strike delayed critical care, while a local school proprietress was forced to flee to Lagos after paying a ₦15 million ransom. A widow’s pain from kidnappers’ strikes: icirnigeria.org/terrorists-inc…
The ICIR tweet media
The ICIR@TheICIR

🚨 Terror fears spread to South-West as Akure North residents panic Residents of Akure North in Ondo State are raising alarm over increasing terrorist and bandit attacks, with many fearing the South-West is becoming a new hotspot for violent groups. Read: icirnigeria.org/terrorists-inc…

English
27
288
780
689.2K
Nwokedi Chukwuebuka
Nwokedi Chukwuebuka@Deep2times1·
Firefox patched 271 security vulnerability using Anthropic's Mythros preview. This is concerning for Ethical Hackers and a good news for black hats(Attackers).
English
0
0
0
9
Elorm Daniel
Elorm Daniel@elormkdaniel·
Save this, it might come in handy. 1. ChatGPT = solve any problem 2. PicWish = remove backgrounds 3. Descript = edit podcasts 4. Perplexity = research anything 5. ElevenLabs = clone voices 6. Gamma = design documents 7. Runway = edit videos 8. Canva = design graphics 9. RecCloud = summarize YouTube 10. Grammarly = perfect writing
English
1
9
17
1.1K
Nwokedi Chukwuebuka
Nwokedi Chukwuebuka@Deep2times1·
@Ahmed___khaan Email security is not just an IT concern—it is a critical requirement for maintaining a secure and private digital existence.
English
0
0
0
7
Ahmedkhan
Ahmedkhan@Ahmed___khaan·
Email security is the foundation of your entire digital presence. If your email is compromised, your security across every other platform is at risk. This is because you use your email for almost everything. Take note!
English
3
5
19
591
Nwokedi Chukwuebuka
Nwokedi Chukwuebuka@Deep2times1·
@OfficialSamkayz Who provides the security for on-prem? Type of cloud service you subscribe to is dependent on the security architecture provided
English
0
0
0
17
Olaonipekun BSc, MSc, PhD in-view 👐
I keep understanding why Nigerian banks prefer on-prem over cloud services every day. We dont have the infrastructure to counter the series of attacks that will hit the country financial systems if we go cloud. Let's just maintain our on-prem abeg 😁
English
15
7
91
7.8K
Nwokedi Chukwuebuka
Nwokedi Chukwuebuka@Deep2times1·
The researchers(Scientists) say that when time is in superposition, a single clock measures how it ticks faster and slower at the same time. Time is now a quantum variable rather than a fixed container.
English
0
0
0
5
Nwokedi Chukwuebuka
Nwokedi Chukwuebuka@Deep2times1·
@Ahmed___khaan Bro! I try hardest to understand your point but opportunity is a survival(success) Tool. One can be in China or Singapore with a changed mindset and still be...... for lack of opportunities.
English
1
0
1
12
Ahmedkhan
Ahmedkhan@Ahmed___khaan·
70% of the reasons you're still broke is your location! Me: When you change location, also change your mindset too otherwise you'd be broke too in China, too.
English
1
3
11
279
Nwokedi Chukwuebuka
Nwokedi Chukwuebuka@Deep2times1·
@Ahmed___khaan Wow! The Pictorial representation of these ideas is amazing but I fear it will be understandable by cybersecurity folks easily if not alone.
English
1
0
1
13
Ahmedkhan
Ahmedkhan@Ahmed___khaan·
Sometimes visual is more understandable than plain texts
Ahmedkhan tweet media
English
2
5
37
933
Nwokedi Chukwuebuka
Nwokedi Chukwuebuka@Deep2times1·
@Ahmed___khaan Awareness campaign for social engineering is key to mitigating cyberthreats. It should be available at all times especially to less educated(informed) people like Market women/men, teenagers, elderly etc. It should be made compulsory by the government to ensure cyber safety.
English
0
0
1
156
Ahmedkhan
Ahmedkhan@Ahmed___khaan·
How Smartphone Can Be Hacked in Minutes. It’s simpler and scarier than most people think. A typical attacker doesn’t need expensive gear: • They grab a cheap second-hand laptop • Install Kali Linux (a powerful hacking toolkit) • Connect to public Wi-Fi (airport, bus stop, café…) From there, it gets dangerous fast Using tools like Metasploit, they can: • Generate ready-made malware (payloads) • Hide it inside files (PDFs, images, apps) • Blast it out to thousands via bulk messages or emails This entire setup can take less than 5 minutes. Once you click that file: • Your phone could be silently infected • Messages (including OTPs) can be accessed • Attackers can bypass your security This type of attack is known as a RAT (Remote Access Trojan). Stay Safe: • Avoid clicking unknown links/files • Don’t trust random downloads • Be cautious on public Wi-Fi • Use 2FA apps instead of SMS when possible Cybersecurity isn’t optional anymore it’s survival.
English
2
15
52
2.2K
Nwokedi Chukwuebuka
Nwokedi Chukwuebuka@Deep2times1·
In Aug 1999, Hotmail experienced one of the most widespread web security breaches of its time. A flaw in its login script allowed anyone to log into any account by entering “eh” as the password. The exploit, publicized by a hacker group called Hackers Unite. It's a historic event
English
0
0
0
40
Nwokedi Chukwuebuka
Nwokedi Chukwuebuka@Deep2times1·
Back-button hijacking is a trick some website employs to manipulate users from navigating to previous page and some even redirects your to a new page or ads as you try to navigate back. Google intends to penalize sites with such scripts on its site come June 15th
English
0
0
0
10
Ahmedkhan
Ahmedkhan@Ahmed___khaan·
Cybersecurity careers grow faster when you build in public. Silently studying for years often delays opportunities.
English
10
3
75
3.5K
Nwokedi Chukwuebuka
Nwokedi Chukwuebuka@Deep2times1·
@Ahmed___khaan Passkey instead of password is the way to go for all modern website and apps. They are more secured. They are also resistance to phising attacks. I recommend all website and apps to make it compulsory for all users to authenticate with a passkey.
English
1
0
1
15
Ahmedkhan
Ahmedkhan@Ahmed___khaan·
Do You Know the Risks of Reusing the Same Passwords? Credential stuffing is the name of an automated attack that takes the compromised credentials from one leak/site and uses them to break into user accounts from other services/sites that use the same username and password. A credential stuffing attack can make hundreds of attempts on dozens of websites in a matter of minutes. Passwords are typically obtained by cybercriminals through data breaches and phishing. Say I use the same password to sign up on website A and on website B because it’s easier for me to remember. Then, say a week later, my credentials for website B are compromised. Well, website A isn’t any safer than website B. And if my attacker is smart, they’ll try my credentials on website A and several other sites. Worse, even if I’m eventually notified from website B that my credentials are compromised (I may never be notified), there’s a good chance I won’t think about website A, or C, or D, etc. even though they’re all compromised.
English
1
3
11
526
Nwokedi Chukwuebuka
Nwokedi Chukwuebuka@Deep2times1·
@Ahmed___khaan Most organisations in Nigeria think cybercrime around Africa is still in its baby stage hence they do not pay attention to cyber security. The idea of having so many cybersecurity personnel without a job or even an internship space is a threat on its own. Very vulnerable a thing
English
1
0
1
126
Ahmedkhan
Ahmedkhan@Ahmed___khaan·
🚫🇳🇬 New week new Data breach for Nigeria. CAC got hacked by same threat Actors (BytToBreach). Total Documents exfiltrated 25 million, Free Download 750 GB of Data. The threat actor provided 7 proof screenshots documenting the attack stages: ▪️ 1_BREAKTHROUGH ▪️ 2_ESCALATION ▪️ 3_TAKEOVER ▪️ 4_PORTALS ▪️ 5_FULL_ACCESS ▪️ 6_GOV_BETRAYAL ▪️ 7_EXFIL_TIME Around 25% of the files are described as simple corporate signatures, leaving more than 15 million documents of substance. The actor states they tried to upload as much as possible for free but server instability limited the free portion to 750 GB. I keep on saying that everything about this country is vulnerable. Yall think it’s a joke.
Ahmedkhan tweet mediaAhmedkhan tweet media
English
6
1
23
2.1K
Nwokedi Chukwuebuka
Nwokedi Chukwuebuka@Deep2times1·
@Ahmed___khaan Sure AI do not have those attribute but they can simulate them. On the issue of life update it is OK to provide them personal context I think it helps them perform better, although it is important to understand privacy limitations.
English
1
0
1
4
Ahmedkhan
Ahmedkhan@Ahmed___khaan·
Stop giving AI life updates!!! AI is just a Computer... AI systems have no emotions, empathy, or consciousness, it's functioning entirely on data, algorithms, and pattern recognition.
English
2
2
9
351