@mbatiaranking💫

384 posts

@mbatiaranking💫 banner
@mbatiaranking💫

@mbatiaranking💫

@JosephMbatia8

project manager💫💫 Life is a journey Never mind the past Live the present🤡 Comedian

Nairobi, Kenya Katılım Ocak 2017
1.1K Takip Edilen152 Takipçiler
@mbatiaranking💫 retweetledi
Santos
Santos@Santoss_CFC·
🚨The FA have reportedly identified the clip that led to Mudryk being tested for doping.
English
335
506
25.1K
4.6M
@mbatiaranking💫 retweetledi
International Cyber Digest
International Cyber Digest@IntCyberDigest·
‼️🚨 BREAKING: An AI found a Linux kernel zero-day that roots every distribution since 2017. The exploit fits in 732 bytes of Python. Patch your kernel ASAP. The vulnerability is CVE-2026-31431, nicknamed "Copy Fail," disclosed today by Theori. It has been sitting quietly in the Linux kernel for nine years. Most Linux privilege-escalation bugs are picky. They need a precise timing window (a "race"), or specific kernel addresses leaked from somewhere, or careful tuning per distribution. Copy Fail needs none of that. It is a straight-line logic mistake that works on the first try, every time, on every mainstream Linux box. The attacker just needs a normal user account on the machine. From there, the script asks the kernel to do some encryption work, abuses how that work is wired up, and ends up writing 4 bytes into a memory area called the "page cache" (Linux's high-speed copy of files in RAM). Those 4 bytes can be aimed at any program the system trusts, like /usr/bin/su, the shortcut to becoming root. Result: the next time anyone runs that program, it lets the attacker in as root. What should worry most: the corruption never touches the file on disk. It only exists in Linux's in-memory copy of that file. If you imaged the hard drive afterwards, the on-disk file would match the official package hash exactly. Reboot the machine, or just put it under memory pressure (any normal system load that needs the RAM), and the cached copy reloads fresh from disk. Containers do not help either. The page cache is shared across the whole host, so a process inside a container can use this bug to compromise the underlying server and reach into other tenants. The original sin was a 2017 "in-place optimization" in a kernel crypto module called algif_aead. It was meant to make encryption slightly faster. The change broke a critical safety assumption, and nobody noticed for nine years. That bug then rode every kernel update from 2017 to today. This vulnerability affects the following: 🔴 Shared servers (dev boxes, jump hosts, build servers): any user becomes root 🔴 Kubernetes and container clusters: one compromised pod escapes to the host 🔴 CI runners (GitHub Actions, GitLab, Jenkins): a malicious pull request becomes root on the runner 🔴 Cloud platforms running user code (notebooks, agent sandboxes, serverless functions): a tenant becomes host root Timeline: 🔴 March 23, 2026: reported to the Linux kernel security team 🔴 April 1: patch committed to mainline (commit a664bf3d603d) 🔴 April 22: CVE assigned 🔴 April 29: public disclosure Mitigation: update your kernel to a build that includes mainline commit a664bf3d603d. If you cannot patch immediately, turn off the vulnerable module: echo "install algif_aead /bin/false" > /etc/modprobe.d/disable-algif.conf rmmod algif_aead 2>/dev/null || true For environments that run untrusted code (containers, sandboxes, CI runners), block access to the kernel's AF_ALG crypto interface entirely, even after patching. Almost nothing legitimate needs it, and blocking it shuts the door on this whole class of bug...
International Cyber Digest tweet mediaInternational Cyber Digest tweet media
English
231
2.7K
11.7K
2.4M
@mbatiaranking💫 retweetledi
The Menace 🥷
The Menace 🥷@charlestonwhyt·
Charleston White goes off on 2 married groupies who attempt to seduce him on the plane! 😳😭 “Y’all Know They Easy To F*ck Just Look At Them”
English
157
635
8.5K
813.8K
@mbatiaranking💫 retweetledi
🎬N
🎬N@Nino12x·
🚨WATCH😳 Full video of Chelsea players being confronted by the fans at full time🤯🤯🤯
English
506
3.8K
45.2K
2.1M
@mbatiaranking💫 retweetledi
Mindful Maven
Mindful Maven@mindfulmaven_·
6 Signs of Maturity: 1.
Mindful Maven tweet media
English
13
105
810
42.3K
@mbatiaranking💫 retweetledi
Sky Sports News
Sky Sports News@SkySportsNews·
"I have no regrets" 🗣️ Victor Wanyama reflects on his career after announcing his retirement ⚽️
English
48
1.2K
10.6K
301.7K
@mbatiaranking💫 retweetledi
Moe
Moe@moneyacademyKE·
Average loan interest rates by top banks in Kenya as of February 2026: StanChart Kenya — 12% Stanbic Kenya — 12% Absa Kenya — 13.8% Equity Bank — 15% DTB Kenya — 14.5% I&M Bank — 14.8% KCB Bank — 15% Co-op Bank — 15.5% NCBA Bank — 15.5% Sidian Bank —15.9% Family Bank—16% HFC limited —17.5% CBK data.
Indonesia
20
112
475
83.7K
@mbatiaranking💫 retweetledi
Arthur🇳🇬🇬🇧🇸🇳
He took his babe to an NBA game only for her to try getting the player’s attention.😳
English
1.6K
1.8K
24.2K
6.2M
@mbatiaranking💫 retweetledi
Twilight
Twilight@the_marcoliboy·
Carlo just gave Endrick 20 minutes to prove himself if he deserves a World Cup call up, he assisted and won a penalty! Generational Talent ⭐️
English
30
341
7.5K
144.5K
@mbatiaranking💫 retweetledi
KENYA GOSSIP HUB
KENYA GOSSIP HUB@kenyasgossips·
A case has left Kenyans talking after a man reportedly moved to court over KSh1,500 fare money he claims was "eaten" by a woman. The man allegedly sent the woman KSh1,500 via M-Pesa on March 4, 2026, to facilitate her travel to Eldoret after she reportedly confirmed she would make the trip. However, he now claims she received the money but failed to travel as agreed. Despite acknowledging receipt of the fare, the woman did not fulfill the agreed journey and allegedly kept the full amount without any lawful justification. The man, identified as Chrysostom Makhumbiri Agava, then reportedly instructed his lawyers to step in. Things took a dramatic turn when the lawyers demanded not just the original KSh1,500, but an extra KSh10,000 in legal and administrative fees, bringing the total amount being sought to KSh11,500. The woman was reportedly given 48 hours to pay or risk being dragged to the Small Claims Court. The legal notice further warns that if she fails to comply, the case could proceed in court with added consequences including interest at court rates, filing fees, process server charges, and more legal costs.
KENYA GOSSIP HUB tweet media
English
30
56
345
34.8K
@mbatiaranking💫 retweetledi
𝙷𝚊𝚛𝚛𝚒𝚜𝚘𝚗
These Portuguese players think they’re still playing Luxembourg or Liechtenstein 😂 Pedro Neto nearly lost his life there 😂 you don’t try that nonsense against a cartel boss 😭
English
546
965
30.8K
4.2M
Nexo
Nexo@Nexo·
Access crypto-backed credit at 0% interest and zero fees, with full transparency into how it settles — from day one.
English
1
1
4
6.1K
@mbatiaranking💫 retweetledi
THEE ALFA HOUSE
THEE ALFA HOUSE@thee_alfa_house·
In America, the recent exposè, against Somali community in Minneapolis, was termed the "biggest fraud scheme in US history". Now a bombshell follow-up to a "Minnesota Covid feeding scandal" has emerged, tracing a river of these stolen American taxpayer dollars, in billions of shillings, directly to a quiet property company in Nairobi’s South C. FULL STORY 👇
THEE ALFA HOUSE tweet media
English
27
134
397
56.4K
@mbatiaranking💫 retweetledi
richo
richo@richo·
🚨WATCH: iShowSpeed realises he’s been talking to the village leader’s daughter and freezes when her father walks in — then asks the bride price and finds out it’s 17 cows
richo tweet media
English
1.7K
6.5K
143.9K
11.1M
@mbatiaranking💫 retweetledi
Your Best Version
Your Best Version@YourPrimePath·
Everyone needs to hear this… The Empty Boat Mindset: // a visual thread //
Your Best Version tweet media
English
48
1K
5.5K
1.5M
Rumi
Rumi@rumilyrics·
Let's see your positively!
Rumi tweet media
English
1.6K
138
2.1K
205.2K