Nwokedi Chukwuebuka

286 posts

Nwokedi Chukwuebuka

Nwokedi Chukwuebuka

@Deep2times1

Introverted.Blockchain Tech,Defi,NFT and Metaverse person,Junior Cybersecurity Analyst,Penetration Tester....

Katılım Şubat 2022
111 Takip Edilen11 Takipçiler
Nwokedi Chukwuebuka
Nwokedi Chukwuebuka@Deep2times1·
@HellsHarlot402 @CyberRacheal From the definition, where does a white hat and a grey hat belong? If the keyword is authorization then a grey hat can not be a pentester but can be an ethical hacker.
English
0
0
0
11
Jayne
Jayne@HellsHarlot402·
@CyberRacheal Pen testing is the deliberate authorised act of breaking into a system to find vulnerabilities. Whereas ethical hacking isn’t authorised specifically by the owner of the system. My dad was a pen tester.
English
2
0
4
176
Cyber_Racheal
Cyber_Racheal@CyberRacheal·
Be real, Did you know Pen-testing is different from Ethical hacking? 🤔 If yes, how different are they?
English
21
12
74
6.7K
Nwokedi Chukwuebuka
Nwokedi Chukwuebuka@Deep2times1·
@predict_addict No idea is original to anyone, knowledge belongs to nature. If others claim China copied from them should Africa also claim every other people also copied from them since civilization started in Africa like history taught.
English
0
0
0
75
Valeriy M., PhD, MBA, CQF
Valeriy M., PhD, MBA, CQF@predict_addict·
So apparently there are claims that DeepSeek “distilled” Western AI. Let’s set the record straight. At this point in time, China 🇨🇳 has distilled European trains, Russian fighter jets and other military technologies, Soviet math to turbo‑charge its STEM development. Likewise, Germany distilled the entire Industrial Revolution from the UK. And the USA has been distilling for over a century—starting with European math and science, the Manhattan Project, the complete distillation of Nazi Germany’s rocket program into NASA, Russian Sikorsky helicopters, and even the Kalman filter distilled from a USSR AI conference. Distillation is just what rising powers do. Call it borrowing, call it inspiration, call it standing on the shoulders of giants—but don’t pretend it’s a scandal when the shoes fit everyone.
Valeriy M., PhD, MBA, CQF tweet media
English
44
150
889
44.5K
Ahmedkhan
Ahmedkhan@Ahmed___khaan·
About 75% of the skills needed to build a tech ompany are not tech skills.
English
2
0
10
492
Nwokedi Chukwuebuka retweetledi
The ICIR
The ICIR@TheICIR·
The heartbreaking story of Eno Offordum serves as a grim reminder of the human cost behind Nigeria’s rising insecurity. In February 2026, her husband, John Offordum, was gunned down by kidnappers at their home in Akure North. The attack didn't just claim one life; it claimed the community's peace. A fellow resident, Mama Christianah, also lost her life after a hospital strike delayed critical care, while a local school proprietress was forced to flee to Lagos after paying a ₦15 million ransom. A widow’s pain from kidnappers’ strikes: icirnigeria.org/terrorists-inc…
The ICIR tweet media
The ICIR@TheICIR

🚨 Terror fears spread to South-West as Akure North residents panic Residents of Akure North in Ondo State are raising alarm over increasing terrorist and bandit attacks, with many fearing the South-West is becoming a new hotspot for violent groups. Read: icirnigeria.org/terrorists-inc…

English
27
288
783
688.9K
Nwokedi Chukwuebuka
Nwokedi Chukwuebuka@Deep2times1·
Firefox patched 271 security vulnerability using Anthropic's Mythros preview. This is concerning for Ethical Hackers and a good news for black hats(Attackers).
English
0
0
0
9
Elorm Daniel
Elorm Daniel@elormkdaniel·
Save this, it might come in handy. 1. ChatGPT = solve any problem 2. PicWish = remove backgrounds 3. Descript = edit podcasts 4. Perplexity = research anything 5. ElevenLabs = clone voices 6. Gamma = design documents 7. Runway = edit videos 8. Canva = design graphics 9. RecCloud = summarize YouTube 10. Grammarly = perfect writing
English
1
9
16
1K
Nwokedi Chukwuebuka
Nwokedi Chukwuebuka@Deep2times1·
@Ahmed___khaan Email security is not just an IT concern—it is a critical requirement for maintaining a secure and private digital existence.
English
0
0
0
7
Ahmedkhan
Ahmedkhan@Ahmed___khaan·
Email security is the foundation of your entire digital presence. If your email is compromised, your security across every other platform is at risk. This is because you use your email for almost everything. Take note!
English
3
5
19
586
Nwokedi Chukwuebuka
Nwokedi Chukwuebuka@Deep2times1·
@OfficialSamkayz Who provides the security for on-prem? Type of cloud service you subscribe to is dependent on the security architecture provided
English
0
0
0
17
Olaonipekun BSc, MSc, PhD in-view 👐
I keep understanding why Nigerian banks prefer on-prem over cloud services every day. We dont have the infrastructure to counter the series of attacks that will hit the country financial systems if we go cloud. Let's just maintain our on-prem abeg 😁
English
15
7
91
7.8K
Nwokedi Chukwuebuka
Nwokedi Chukwuebuka@Deep2times1·
The researchers(Scientists) say that when time is in superposition, a single clock measures how it ticks faster and slower at the same time. Time is now a quantum variable rather than a fixed container.
English
0
0
0
5
Nwokedi Chukwuebuka
Nwokedi Chukwuebuka@Deep2times1·
@Ahmed___khaan Bro! I try hardest to understand your point but opportunity is a survival(success) Tool. One can be in China or Singapore with a changed mindset and still be...... for lack of opportunities.
English
1
0
1
12
Ahmedkhan
Ahmedkhan@Ahmed___khaan·
70% of the reasons you're still broke is your location! Me: When you change location, also change your mindset too otherwise you'd be broke too in China, too.
English
1
3
11
278
Nwokedi Chukwuebuka
Nwokedi Chukwuebuka@Deep2times1·
@Ahmed___khaan Wow! The Pictorial representation of these ideas is amazing but I fear it will be understandable by cybersecurity folks easily if not alone.
English
1
0
1
13
Ahmedkhan
Ahmedkhan@Ahmed___khaan·
Sometimes visual is more understandable than plain texts
Ahmedkhan tweet media
English
2
5
38
929
Nwokedi Chukwuebuka
Nwokedi Chukwuebuka@Deep2times1·
@Ahmed___khaan Awareness campaign for social engineering is key to mitigating cyberthreats. It should be available at all times especially to less educated(informed) people like Market women/men, teenagers, elderly etc. It should be made compulsory by the government to ensure cyber safety.
English
0
0
1
155
Ahmedkhan
Ahmedkhan@Ahmed___khaan·
How Smartphone Can Be Hacked in Minutes. It’s simpler and scarier than most people think. A typical attacker doesn’t need expensive gear: • They grab a cheap second-hand laptop • Install Kali Linux (a powerful hacking toolkit) • Connect to public Wi-Fi (airport, bus stop, café…) From there, it gets dangerous fast Using tools like Metasploit, they can: • Generate ready-made malware (payloads) • Hide it inside files (PDFs, images, apps) • Blast it out to thousands via bulk messages or emails This entire setup can take less than 5 minutes. Once you click that file: • Your phone could be silently infected • Messages (including OTPs) can be accessed • Attackers can bypass your security This type of attack is known as a RAT (Remote Access Trojan). Stay Safe: • Avoid clicking unknown links/files • Don’t trust random downloads • Be cautious on public Wi-Fi • Use 2FA apps instead of SMS when possible Cybersecurity isn’t optional anymore it’s survival.
English
2
15
52
2.2K
Nwokedi Chukwuebuka
Nwokedi Chukwuebuka@Deep2times1·
In Aug 1999, Hotmail experienced one of the most widespread web security breaches of its time. A flaw in its login script allowed anyone to log into any account by entering “eh” as the password. The exploit, publicized by a hacker group called Hackers Unite. It's a historic event
English
0
0
0
39
Nwokedi Chukwuebuka
Nwokedi Chukwuebuka@Deep2times1·
Back-button hijacking is a trick some website employs to manipulate users from navigating to previous page and some even redirects your to a new page or ads as you try to navigate back. Google intends to penalize sites with such scripts on its site come June 15th
English
0
0
0
10
Ahmedkhan
Ahmedkhan@Ahmed___khaan·
Cybersecurity careers grow faster when you build in public. Silently studying for years often delays opportunities.
English
10
3
75
3.5K
Nwokedi Chukwuebuka
Nwokedi Chukwuebuka@Deep2times1·
@Ahmed___khaan Passkey instead of password is the way to go for all modern website and apps. They are more secured. They are also resistance to phising attacks. I recommend all website and apps to make it compulsory for all users to authenticate with a passkey.
English
1
0
1
15
Ahmedkhan
Ahmedkhan@Ahmed___khaan·
Do You Know the Risks of Reusing the Same Passwords? Credential stuffing is the name of an automated attack that takes the compromised credentials from one leak/site and uses them to break into user accounts from other services/sites that use the same username and password. A credential stuffing attack can make hundreds of attempts on dozens of websites in a matter of minutes. Passwords are typically obtained by cybercriminals through data breaches and phishing. Say I use the same password to sign up on website A and on website B because it’s easier for me to remember. Then, say a week later, my credentials for website B are compromised. Well, website A isn’t any safer than website B. And if my attacker is smart, they’ll try my credentials on website A and several other sites. Worse, even if I’m eventually notified from website B that my credentials are compromised (I may never be notified), there’s a good chance I won’t think about website A, or C, or D, etc. even though they’re all compromised.
English
1
3
11
526
Nwokedi Chukwuebuka
Nwokedi Chukwuebuka@Deep2times1·
@Ahmed___khaan Most organisations in Nigeria think cybercrime around Africa is still in its baby stage hence they do not pay attention to cyber security. The idea of having so many cybersecurity personnel without a job or even an internship space is a threat on its own. Very vulnerable a thing
English
1
0
1
126
Ahmedkhan
Ahmedkhan@Ahmed___khaan·
🚫🇳🇬 New week new Data breach for Nigeria. CAC got hacked by same threat Actors (BytToBreach). Total Documents exfiltrated 25 million, Free Download 750 GB of Data. The threat actor provided 7 proof screenshots documenting the attack stages: ▪️ 1_BREAKTHROUGH ▪️ 2_ESCALATION ▪️ 3_TAKEOVER ▪️ 4_PORTALS ▪️ 5_FULL_ACCESS ▪️ 6_GOV_BETRAYAL ▪️ 7_EXFIL_TIME Around 25% of the files are described as simple corporate signatures, leaving more than 15 million documents of substance. The actor states they tried to upload as much as possible for free but server instability limited the free portion to 750 GB. I keep on saying that everything about this country is vulnerable. Yall think it’s a joke.
Ahmedkhan tweet mediaAhmedkhan tweet media
English
6
1
23
2.1K
Nwokedi Chukwuebuka
Nwokedi Chukwuebuka@Deep2times1·
@Ahmed___khaan Sure AI do not have those attribute but they can simulate them. On the issue of life update it is OK to provide them personal context I think it helps them perform better, although it is important to understand privacy limitations.
English
1
0
1
4
Ahmedkhan
Ahmedkhan@Ahmed___khaan·
Stop giving AI life updates!!! AI is just a Computer... AI systems have no emotions, empathy, or consciousness, it's functioning entirely on data, algorithms, and pattern recognition.
English
2
2
9
351
Nwokedi Chukwuebuka
Nwokedi Chukwuebuka@Deep2times1·
@shanaka86 Hope there is a strong security mitigation around it since one can exploit the vulnerabity with it and cause massive organisational damage. Single point of failure can be its greatest challenge.
English
0
0
0
41
Shanaka Anslem Perera ⚡
Shanaka Anslem Perera ⚡@shanaka86·
Meta is building a photorealistic AI version of Mark Zuckerberg, trained on his mannerisms, tone, voice, and recent strategic thinking, to interact with employees on his behalf. Everyone is calling it creepy. No one is seeing the structural play underneath. Every corporation in history has been limited by one constraint: the CEO cannot be in every room. The entire management hierarchy exists to solve one problem. The founder has intent. That intent must propagate through an organization. Each human layer between the CEO and the individual contributor introduces drift. By the time the founder’s vision reaches the engineer, it has been filtered through six layers of interpretation, each optimizing for their own incentives. This is the principal-agent problem, the oldest unsolved equation in organizational theory. Zuckerberg is not building an AI avatar. He is attempting to eliminate the management layer by making the principal infinitely replicable. If the AI works as described, 79,000 employees can interact directly with a system that represents the founder’s strategic intent without the lossy compression of human intermediaries. No more “what would Mark want?” filtered through a director who has not spoken to Mark in three months. The AI speaks as Mark, trained on Mark, tested by Mark. This is why Meta has been flattening its org structure and elevating individual contributors for two years. The avatar is not a gimmick bolted onto the hierarchy. It is the replacement for the hierarchy. The management layer was always a biological bottleneck, a necessary inefficiency because human attention does not scale. Artificial attention does. But here is what the FT report reveals without realizing it. The avatar is trained on Zuckerberg’s “mannerisms, tone, publicly available statements, and his recent thinking on company strategy.” Not on his private reasoning. Not on the information asymmetries he holds as CEO. Not on the board discussions or the conversations with Jassy or Pichai or Altman that shape his actual decisions. The system will replicate what Zuckerberg says he thinks. Not what he actually thinks. Every CEO’s public strategic narrative diverges from their private decision architecture. The gap between the two is the entire alpha of corporate governance, the space where real leadership happens, in the contradictions between stated vision and operational reality. If you train an AI on the narrative and deploy it as the leadership interface, you create a system that optimizes for coherence with the founder’s self-image rather than adaptation to ground truth. Employees receiving guidance from this avatar will interact with Zuckerberg’s ego model, not his cognition model. The distinction matters enormously when the next strategic pivot requires the CEO to contradict everything the avatar has been saying for months. Meta is spending between $115 and $135 billion on AI capital expenditure in 2026. Zuckerberg personally spends five to ten hours a week writing code for AI projects. The Superintelligence Labs division is handling the avatar. This is not a side experiment. It is the logical terminus of the “AI-native company” thesis: a corporation where the founder’s intent propagates at the speed of inference rather than the speed of meetings. The question is not whether this works. It is what happens to every Fortune 500 company if it does. The management layer is the largest cost center in corporate America. Zuckerberg just announced he is building its replacement. The market has not priced this.
Shanaka Anslem Perera ⚡ tweet media
English
18
54
131
25.6K