KAMI

9.8K posts

KAMI

KAMI

@ade_kami

MERN Stack developer || SAIL Alumni

React Katılım Mart 2017
2.6K Takip Edilen321 Takipçiler
Sabitlenmiş Tweet
KAMI
KAMI@ade_kami·
"You can’t truly call yourself “peaceful” unless you are capable of great violence. If you’re not capable of violence, you’re not peaceful, you’re harmless." - Stef Starkgaryen
English
0
0
1
155
KAMI retweetledi
cocofelon
cocofelon@1Cocofelon·
APISEC UNI VERIFIED ME
cocofelon tweet media
Français
12
4
81
3.6K
KAMI retweetledi
Dr Iretioluwa Akerele
Dr Iretioluwa Akerele@ireteeh·
Hello Cyber friends, backups are your safety net when things go wrong. It’s important to backup your important files. Stay cyber safe ✨
English
11
98
273
5.8K
KAMI retweetledi
Dr Iretioluwa Akerele
Dr Iretioluwa Akerele@ireteeh·
Hello Cyber friends, always remember to keep your software updated. it’s one of the simplest ways to stay secure✨
English
6
103
282
10K
KAMI retweetledi
Abdulkadir | Cybersecurity
Abdulkadir | Cybersecurity@cyber_razz·
In tech, the most underrated skill isn’t coding faster or knowing every tool……it’s being able to explain complex topics simply. You can be brilliant with tools and tech stacks, but if you can’t communicate your ideas clearly to teammates, managers, or even in interviews, you’ll struggle to stand out. At the end of the day, tech is about solving problems and making sure others understand the solution.
🛸@mvcciido_szn

unpopular opinion?

English
9
47
281
21.2K
Name cannot be blank
Name cannot be blank@hackSultan·
Give me the chance to change your life for the better and setup a lasting career path for you. If you have an android phone, just download this AltSchoolGO app, signup & wait for Monday.⭐️ RT & Reply “done” here once you have the app so I’ll DM you on Monday. TECH TECH
Name cannot be blank tweet media
English
1.5K
889
2.1K
239K
KAMI
KAMI@ade_kami·
@ireteeh The measures an organization can put in place to prevent insider threat without creating a culture of fear is the application of least privilege for its employees
English
0
0
0
4
Dr Iretioluwa Akerele
Dr Iretioluwa Akerele@ireteeh·
Day 5/31 When Access becomes a Weapon (Tesla, 2018) In mid-2018, Tesla uncovered an alarming internal breach. Sensitive manufacturing data had been leaked, and unauthorized changes were found in the company’s Manufacturing Operating System. At first, investigators suspected an external attack. But the culprit turned out to be one of their own, a production technician. Using legitimate access, he allegedly exported gigabytes of confidential data to unknown third parties and made code changes that could have disrupted operations. Tesla claimed he acted out of frustration over workplace issues, while he insisted he was a whistleblower exposing safety and quality problems. This was not a phishing or malware attack. It is an example of how a trusted insider, with the right credentials and motivation, can become a company’s most dangerous vulnerability. Community Challenge What measures can an organization put in place to prevent insider threat without creating a culture of fear?
English
38
54
154
21.8K
nmesoma. 🎀
nmesoma. 🎀@so4dsntxst·
so lucky patcher no dey work on Opay app?
GIF
English
245
628
5.2K
259.3K
KAMI
KAMI@ade_kami·
@lobacake Okay, that got me good 😂😂👍
English
0
0
0
2
Loba Agboola
Loba Agboola@lobacake·
So, I lost my watch at an event once. An hour later I saw some man stepping on it as he was harassing a girl there. I was so angry, I waked over and slapped him across the face and called security. No one does that to a woman, not on my watch.
English
800
5.2K
74.1K
1.3M
KAMI retweetledi
Dr. Ose Etiobhio
Dr. Ose Etiobhio@osemagnum·
YOU MAY STILL BE YOUR PARENT'S CHILD Dear Eric, PHENOTYPE or GENOTYPE Your "genotype" test might be lying to you! READ ME!!!! Many labs in Nigeria aren’t actually giving you your genotype...they’re giving you your phenotype. And yes, there’s a difference! 1) Phenotype is like vibes, genotype is the DNA behind it. Labs report HbAA, AS, SS, etc., based on what your blood is showing, not the exact genes you inherited. It’s like saying someone is rich because they drive a Benz...without checking their bank account. ● Phenotype: The observable expression of the hemoglobin types present in the blood, typically reported as AA, AS, SS, AC, SC, etc. ● Genotype: The actual genetic makeup of the individual, which requires DNA-based testing to determine specific alleles at the HBB gene locus. 2) Your "AA" might not be so innocent. Some rare hemoglobin variants (HbD, HbE, HbO, thalassemias) can masquerade as AA or AS. Imagine thinking you married an AA, only to find out 9 months later you were lied to. SURPRISE! 🎁 3) Why does this matter? You could accidentally have a child with sickle cell disease because the lab "forgot" to check for rare variants. A ₦5k test today could cost you millions in medical bills later. 😬 4) How do you avoid this mess? ● Get HPLC (High-Performance Liquid Chromatography) instead of basic electrophoresis. ● If your result is confusing, get DNA testing...because genes don’t lie, but lab results sometimes do. Moral of the story: If you're testing for genotype, ask “Is this phenotype or genotype?” before life humbles you!... and when you have done the right test and it's still confusing you need to ask the source deeper questions.
ERIC 💜🦅@LagosPresidentt

My Dad is AA and my Mum is also AA but I’m AS. Can someone make this make sense to me, please.

English
152
935
2.7K
449.3K
Abdulkadir | Cybersecurity
Abdulkadir | Cybersecurity@cyber_razz·
LINUX KNOWLEDGE CHECKPOINT A web server on Linux is not responding. You want to verify if the Apache service is running. Which command would you use? A) systemctl status apache2 B) ifconfig apache2 C) netstat -r apache2 D) ls -l /etc/apache2
English
38
11
184
17.6K
Name cannot be blank
Name cannot be blank@hackSultan·
If you want a global Diploma in software engineering @ayobaapp has partnered with @AltSchoolAfrica to give a 100% scholarship to tons of student who pass the entrance exams. You can learn: Cyber Security Frontend eng. Backend eng. Cloud end. RT this + reply and I’ll DM you.
Ccc@91882i7

@hackSultan You be mumu. No be everything you go dey chook mouth. When the other side throws their own bants, I hope you are bold enough to also caution them. No go hustle students for your tech school, dey mumu yoitself 🤡

English
1.5K
1.8K
1.8K
348.2K
Dr Iretioluwa Akerele
Dr Iretioluwa Akerele@ireteeh·
Day 4/31 Every Breach is a Lesson (Co-op, 2025) In April 2025, one of Britain’s oldest and most trusted retail cooperatives, the Co-op, found itself in the crosshairs of a cyberattack that shook its foundations. Investigations suggest the attackers may have used social engineering to trick Co-op IT/helpdesk staff into resetting passwords or granting access. Store shelves were unstocked, deliveries were delayed/ cancelled, and staff were left unable to perform basic operational tasks. To contain the threat, Co-op deliberately powered down parts of its IT systems, effectively choosing disruption over deeper compromise. Then came the news no member wanted to hear: the personal details of 6.5 million Co-op members, including names and contact information, had been stolen. Community Challenge The attackers used social engineering to gain access. What’s the most effective control an organization can implement to reduce this type of risk?
English
39
58
131
18.5K
KAMI retweetledi
Dr Iretioluwa Akerele
Dr Iretioluwa Akerele@ireteeh·
Day 3/31 — When a City Went Dark (St. Paul (Minnesota, 2025) It started like a whisper on the network, a flicker in logs that became a blackout. In late July 2025, St. Paul’s digital heartbeat stuttered. The city systems went offline, public Wi-Fi and library services failed, bill-pay portals stopped working, and employees found themselves locked out of the tools they use every day. The city shut down chunks of its IT estate to contain the threat. The ransomware group “Interlock” claimed credit for the attack. The attackers were described as a “sophisticated external actor.” The attackers published 43GB of data online after the city refused to pay ransom. This intensified the pressure on recovery teams scrambling to rebuild. St. Paul chose to contain, rebuild and restore rather than reward the attackers. Community Challenge St. Paul chose not to pay the ransom. Was this the right call? Why or why not?
English
34
61
123
24.4K
KAMI retweetledi
Dr Iretioluwa Akerele
Dr Iretioluwa Akerele@ireteeh·
Day 2/31 When Airports Stood Still: A Cyber Wake-Up Call. (London Heathrow, Brussels, Berlin, Dublin 2025) Last month, passengers at four European airports were stranded in long queues. Flights were delayed/cancelled and bags were unclaimed. At first, it was dismissed as “technical issues.” In reality, it was a ransomware attack on Collins Aerospace’s MUSE system, the software that powers check-in, boarding, and baggage handling. With systems down, the airports were forced to use manual approach. The incident exposed a hard truth, aviation doesn’t just run on engines and runways. It relies on secure systems; and when the system is vulnerable, the industry stalls. The planes are flying again. But the warning is clear. Community Challenge Which element of the CIA triad was hit the hardest? Give reasons
English
56
87
215
28.7K
KAMI retweetledi
Dr Iretioluwa Akerele
Dr Iretioluwa Akerele@ireteeh·
Day 1/31 “When Innocence Was Exploited” Kido International - 2025 A cyber-attack hit an institution built on care, where trust is everything. Few days ago, a criminal group calling itself Radiant claimed to have breached Kido International (A nursery chain with 18 UK sites and additional sites overseas). The group reportedly stole personal information of about 8000 children. The attackers published profiles of 20 children on a darknet leak site, and private data of employees. They contacted some parents and carers, threatening to post more information, unless Kido pays a ransom. The stolen data includes children’s names, photographs, DOBs, home addresses etc. Multiple reports indicate the breach involved third-party systems. Community Challenge The attackers claimed they "deserve to be compensated for their pentest” Was this truly a penetration test? Explain why or why not.
English
74
97
203
31.4K
KAMI retweetledi
Confidence Staveley
Confidence Staveley@Sisinerd·
In Mariah Carey’s voice, “Its timeeeeeeeeeeeeee!”💃🏻 To read more and apply for this @cybersafehq training, visit cybersafefoundation.org/our-programs/a… Please note that this is a high accountability hands-on training that requires a minimum of 83% attendance and consistent task completion throughout the program. I’m looking forward to welcoming cohort 2.0!
Confidence Staveley tweet media
English
9
116
266
20.9K
KAMI
KAMI@ade_kami·
@ireteeh The organization should employ IAM and access controls, as this ensures only authorized people/systems can access resources. The org should also gamify user awareness to make it easier to teach employees about the different types of attack, how they work, and how to prevent it.
English
0
0
0
8