๐˜พ๐™ค๐™™๐™š ๐™‰ ๐˜พ๐™ง๐™–๐™ญ
521 subscribers
86 photos
3 videos
2 files
47 links
We are CODE N CRAX | ADWA CTF โ€“ Ethiopiaโ€™s first ever CTF challenge platform. ๐Ÿดโ€โ˜ ๏ธ

Born from a love of hacking, problem solving, and sharing knowledge, weโ€™re here to spark the next wave of cybersecurity talent in Ethiopia. ๐Ÿ”๐Ÿ‡ช๐Ÿ‡น

DM @codeNcrax_support
Download Telegram
Forwarded from INSA Cyber Talent Center
แ‹จINSA แˆณแ‹ญแ‰ แˆญ แ‰ณแˆˆแŠ•แ‰ต แˆ›แ‹•แŠจแˆ แ‹จแ‰…แ‹ณแˆœ แŠฅแŠ“ แŠฅแˆแ‹ต แ•แˆฎแŒแˆซแˆ แˆŠแŒ€แˆแˆญ แАแ‹แข
แˆแ‹แŒˆแ‰ฃ แ‰ แ‰…แˆญแ‰ฅ แ‰€แŠ• แˆตแˆˆแˆแŠ•แŒ€แˆแˆญ แˆˆแŒ“แ‹ฐแŠžแ‰ปแ‰ฝแˆ แˆ˜แˆแŠฅแŠญแ‰ฑแŠ• แŠฅแ‹ตแˆญแˆฑแˆ‹แ‰ธแ‹!

INSA Cyber โ€‹โ€‹Talent Center Weekend Training Program will start soon.

@insactc
๐Ÿ”ฅ9
When you open the binary at 3 AM๐Ÿ˜
๐Ÿ˜10
Digital Ethiopia 2025 has been successfully completed, achieving its intended goals to a remarkable extent. Today officially marks the launch of Digital Ethiopia 2030.

I was honored to attend this landmark national event, graciously hosted by H.E. Prime Minister Abiy Ahmed, alongside senior government leaders and high-level ministers. Being invited to participate in such an important moment for the countryโ€™s future was truly a privilege.

The Digital Ethiopia 2030 strategy places strong emphasis on expanding digital accessibility, creating equal opportunities for all citizens, and strengthening trust between citizens and institutions. These pillars form the core foundation of the strategy.

To achieve these objectives, major efforts will focus on expanding public digital infrastructure and ensuring that digital technologies remain human-centeredโ€”empowering citizens and improving everyday life. This vision aligns closely with the governmentโ€™s broader reform agenda to reduce bureaucracy and translate ambitious national strategies into real, measurable impact.

Grateful to be part of this historic milestone in Ethiopiaโ€™s digital transformation journey. ๐Ÿ‡ช๐Ÿ‡น๐Ÿš€

#DigitalEthiopia2030
#DigitalEthiopia
#DigitalTransformation
#NationalVision
#Innovation
#Leadership
#FutureReadyEthiopia
๐ŸŽ‰5๐Ÿ‘€2โค1
Forwarded from INSA Cyber Talent Center
แ‹จแŠขแŠ•แˆณ แˆณแ‹ญแ‰ แˆญ แ‰ณแˆˆแŠ•แ‰ต แ‹จแŠฆแˆ‹แ‹ญแŠ• แŠฅแŠ“ แ‰…แ‹ณแˆœ แŠฅแŠ“ แŠฅแˆแ‹ต แˆตแˆแŒ แŠ“ แˆˆแˆ˜แˆตแŒ แ‰ต แˆแ‹แŒˆแ‰ฃ แ‰ แ‰…แˆญแ‰ฅ แŠฅแŠ•แŒ€แˆแˆซแˆˆแŠ•แข แ‰ แ‰ฐแˆˆแ‹ญ แ‰ แˆณแ‹ญแ‰ แˆญ แ‹ฐแˆ…แŠ•แАแ‰ต แŠฅแŠ“ แ‹ดแ‰จแˆŽแ•แˆ˜แŠ•แ‰ต แŒ€แˆ›แˆช แŠฅแŠ“ แŠขแŠ•แ‰ตแˆญแˆšแ‹ฒแ‹ฌแ‰ต แ‹จแˆ†แŠ“แ‰ฝแˆ แ‹ซแ‹˜แŒ‹แŠ•แˆ‹แ‰ฝแˆ แ‹จแˆถแˆตแ‰ต แ‹ˆแˆญ แˆตแˆแŒ แŠ“ แˆตแˆ‹แˆˆ แˆแ‹แŒˆแ‰ฃแ‹ แŠฅแŠ•แ‹ณแ‹ซแˆ˜แˆแŒฃแ‰ฝแˆแข แˆ‹แˆแˆฐแˆ™แ‰ต แŒ“แ‹ฐแŠžแ‰ปแ‰ฝแˆแˆ แˆ˜แˆจแŒƒแ‹แŠ• แŠ แ‹ตแˆญแˆทแ‰ธแ‹แข แ‰ แ‰ตแˆญแ แŒŠแ‹šแ‹ฎ แŠฅแŠ“ แ‰ แŠ แˆ‰แ‰ แ‰ต แˆ†แАแ‹ แ‹จแˆณแ‹ญแ‰ แˆญ แ‹ฐแˆ…แŠ•แАแ‰ต แ‰ฃแˆˆแˆ™แ‹ซ แ‹จแˆšแ‹ซแ‹ฐแˆญแŒŽแ‰ตแŠ• แˆตแˆแŒ แŠ“ แ‰ แАแŒป แ‹ญแ‹แˆฐแ‹ฑแข

@insactc
๐Ÿ”ฅ7
Forwarded from INSA Cyber Talent Center
This media is not supported in your browser
VIEW IN TELEGRAM
Happening Tonight... ๐Ÿ”ฅ

We will have our Malware Analysis ๐Ÿ‘พ Live Session tonight with a SPECIAL GUEST from INSA.

๐ŸŽค Host: INSA CYBER TALENT CENTER (@insactc)
๐Ÿ• Time: 1:50 LT (ToNight)

Share with your friends โšก๏ธ

@insactc | @cteinsa

#LiveSession #CyberSecurity #MalwareAnalysis
โค3
Forwarded from INSA Cyber Talent Center
๐Ÿ”ดToday we diving deep into one of the basis of the security world: "Hacking: The Art of Exploitation" (2nd Edition) by Jon Erickson.

๐Ÿ’ฅWeโ€™ll be breaking down:

   โ–ถ๏ธ The Book Review: Why this classic is still relevant for developers today.

   โ–ถ๏ธHollywood vs. Reality: Weโ€™re analyzing famous movie hacking scenes. Are they even possible, or just flashy graphics?

  โ–ถ๏ธThe "No Discipline" Myth: Movies often portray hackers as chaotic or undisciplined. Weโ€™ll discuss why real-world hacking actually requires extreme patience, logic, and strict discipline.

๐Ÿ•’ Event Details

   ๐Ÿ“— Topic: Book Review & Hacking Ethics.
   ๐Ÿ“šBook: Hacking: The Art of Exploitation
๐Ÿ“ŒTime: Today at 2:00 LT

Whether you are a coder looking to secure your apps or a tech enthusiast curious about the "dark side," you don't want to miss this.

See you in the stream!

@insactc
@cteinsa

#LiveSession #PersonalDevelopment #Midset #Book
๐Ÿ‘2
Forwarded from ThreatX Security (Dawit Peter)
ThreatX Security Internship 2026 is OPEN!

We are a Top 120 AI Startup in Ethiopia building real cybersecurity & AI systems and weโ€™re looking for talent.

Open roles:
โ€ข Software Developers
โ€ข Cybersecurity
โ€ข AI Specialists
โ€ข Graphic Designers
โ€ข Video Editors

- Work on real products
- Get international exposure
- Grow into global opportunities

๐Ÿ“ฉ Apply now:
Send your CV or portfolio to threatxs@gmail.com

Comment โ€œInternโ€ to get started.
#ThreatX #Cybersecurity #AI #Internship2026
๐Ÿ”ฅ3โค1
Forwarded from INSA Cyber Talent Center
๐Ÿ”ด LIVE SESSION TONIGHT ๐Ÿ”ด

Topic: Introduction to Cryptography & Secure Communication

โฐ Today | 2:00 LT (Night)
๐Ÿ“ On INSA Cyber Talent Center Channel @insactc

Join us for a hands-on live session where we break down the fundamentals of cryptography, explore how secure systems work, and understand the core mechanisms behind modern cybersecurity.

โšก๏ธ Session highlights:

* Introduction to Cryptography: why it matters in cybersecurity
* Symmetric vs. Asymmetric Encryption: concepts & real-world use cases
* Key Exchange Protocols: understanding Diffie-Hellman
* Hash Functions: integrity, authentication, and applications
* Public Key Infrastructure (PKI): certificates and trust models
* Interactive Q&A on encryption, keys, and secure communication

๐Ÿ“ข Happening today at 2:00 LT night. Donโ€™t miss it!


@insactc
@cteinsa

#INSA #LiveSession #Cryptography #CyberSecurity #Encryption #PKI #InfoSec
โค1๐Ÿ”ฅ1
Forwarded from ADWA CTF
๐Ÿ“‚Useful Resources For Cryptography

The Science of Codes: An Intro to Cryptography
https://www.youtube.com/watch?v=-yFZGF8FHSg
Cryptography: Crash Course Computer Science
https://www.youtube.com/watch?v=jhXCTbFnK8o

Advanced:
Cryptography for Beginners - Full Python Course (SHA-256, AES, RSA, Passwords)
https://www.youtube.com/watch?v=kb_scuDUHls

Website:
cryptohack.org

@insactc @cteinsa
#CyberSecurity #Cryptography
๐Ÿ”ฅ6โค1
๐Ÿ‘€๐Ÿ”ฅ
๐Ÿ˜ญ10๐Ÿ‘€5๐Ÿค“1๐Ÿ‘จโ€๐Ÿ’ป1
Forwarded from ADWA CTF (๐—ฌ๐—˜๐—”๐—•๐—ฆ๐—œ๐—ฅ๐—”)
แŠฅแŠ•แŠณแŠ• แˆˆแŒŒแ‰ณแ‰ฝแŠ• แˆˆแˆ˜แ‹ตแˆ€แŠ’แ‰ณแ‰ฝ แˆˆแŠขแ‹จแˆฑแˆต แŠญแˆญแˆตแ‰ถแˆต แ‹จแˆแ‹ฐแ‰ต แ‰ แ‹“แˆ แ‰ แˆฐแˆ‹แˆ แŠ แ‹ฐแˆจแˆณแ‰ฝแˆแข

แ‰ แ‹แˆ‰ แ‹จแˆฐแˆ‹แˆ แŠฅแŠ“ แ‹จแแ‰…แˆญ แ‹ญแˆแŠ•แˆ‹แ‰ฝแˆแข๐Ÿ™โค๏ธ
โค12๐Ÿ™2โคโ€๐Ÿ”ฅ1๐Ÿคฉ1
แˆ›แ‹ญแŠญแˆฎแˆถแแ‰ต แ‹จแŒฅแˆญ แ‹ˆแˆญ แ‹จแ‹ฐแˆ…แŠ•แАแ‰ต แ‹แˆ˜แŠ“แ‹‰ 114 แ‹จแ‹ฐแˆ…แŠ•แАแ‰ต แŠญแแ‰ฐแ‰ถแ‰ฝแŠ• แˆ˜แ‹แŒ‹แ‰ฑแŠ• แŠ แˆตแ‰ณแ‹ˆแ‰€

แˆ›แ‹ญแŠญแˆฎแˆถแแ‰ต แŠฅ.แŠค.แŠ . แ‹จ2026 แ‹จแˆ˜แŒ€แˆ˜แˆชแ‹ซแ‹ แ‰ แˆ†แАแ‹ แ‹จแŒฅแˆญ แ‹ˆแˆญ แ‹จแ‹ฐแˆ…แŠ•แАแ‰ต แˆ›แˆปแˆปแ‹ซ แ•แˆฎแŒแˆซแˆ™แฃ แ‰ แŠ แŒ แ‰ƒแˆ‹แ‹ญ 114 แ‹จแ‹ฐแˆ…แŠ•แАแ‰ต แŠญแแ‰ฐแ‰ถแ‰ฝแŠ• #CVEs แˆ˜แ‹แŒ‹แ‰ฑแŠ• แŠ แˆตแ‰ณแ‹ˆแ‰€แข

แŠจแŠฅแАแ‹šแˆ…แˆ แˆ˜แŠซแŠจแˆ แˆฆแˆตแ‰ฑ "แ‹œแˆฎ-แ‹ดแ‹ญ" #Zero_day แ‹จแ‰ฐแˆฐแŠ™แŠ“ แŠจแแ‰ฐแŠ› แˆตแŒ‹แ‰ต แ‹จแ‹ฐแ‰€แŠ‘ แˆ˜แˆ†แŠ“แ‰ธแ‹ แ‰ฐแŒˆแˆแŒฟแˆแข

แ‰ แˆ›แˆปแˆปแ‹ซแ‹ แ‹แˆตแŒฅ แŠจแ‰ฐแŠซแ‰ฐแ‰ฑแ‰ต แŠญแแ‰ฐแ‰ถแ‰ฝ แˆ˜แŠซแŠจแˆ CVE-2026-20805 แ‹จแ‰ฐแˆฐแŠ˜แ‹แŠ“ แ‰ แ‹ŠแŠ•แ‹ถแ‹แˆต #Desktop_Window_Manager แˆ‹แ‹ญ แ‹จแˆšแŒˆแŠ˜แ‹ แ‰ฅแˆแˆฝแ‰ต แ‰ แŠ แˆแŠ‘ แˆฐแ‹“แ‰ต แ‰ แŠ แŒฅแ‰‚แ‹Žแ‰ฝ แŠฅแŒ… แ‹ˆแ‹ตแ‰† แŒฅแ‰ƒแ‰ต แŠฅแ‹จแ‰ฐแˆแŒธแˆ˜แ‰ แ‰ต แˆ˜แˆ†แŠ‘ แ‰ฐแˆจแŒ‹แŒแŒงแˆแข

แ‹ญแˆ… แŠญแแ‰ฐแ‰ต แ‹จแˆ˜แˆจแŒƒ แˆ˜แŠ•แ‰ณแŠแ‹Žแ‰ฝ แ‹จแˆฒแˆตแ‰ฐแˆ™แŠ• แ‹จแ‹ฐแˆ…แŠ•แАแ‰ต แˆ˜แŠจแˆ‹แŠจแ‹ซ แˆฐแ‰ฅแˆจแ‹ แ‰ แˆ˜แŒแ‰ฃแ‰ต แ‹จแŠฎแˆแ’แ‹แ‰ฐแˆฉแŠ• แˆšแˆตแŒฅแˆซแ‹Š แˆ˜แˆจแŒƒแ‹Žแ‰ฝ แŠฅแŠ•แ‹ฒแˆฐแˆญแ‰ แˆ˜แŠ•แŒˆแ‹ต แ‹จแŠจแˆแ‰ฐ แˆ˜แˆ†แŠ‘ แ‰ณแ‹‰แ‰‹แˆแข

แˆŒแˆ‹แŠ›แ‹แŠ“ แ‰ตแˆแ‰… แˆตแŒ‹แ‰ต แ‹จแˆ†แАแ‹ CVE-2026-21265 แ‹จแ‰ฐแˆฐแŠ˜แ‹ แŠญแแ‰ฐแ‰ต แАแ‹แข แ‹ญแˆ… แ‰ฝแŒแˆญ แŠฅ.แŠค.แŠ . แŠจ2012 แŠฅแˆตแŠจ 2025 แ‰ฃแˆ‰แ‰ต แ‹“แˆ˜แ‰ณแ‰ต แ‹จแ‰ฐแŒˆแ‹™ แŠฎแˆแ’แ‹แ‰ฐแˆฎแ‰ฝแŠ• แ‰ แˆ™แˆ‰ แ‹จแˆšแˆ˜แˆˆแŠจแ‰ต แˆฒแˆ†แŠ•แฃ แ‹จแ‹ŠแŠ•แ‹ถแ‹แˆต แ‹จแ‹ฐแˆ…แŠ•แАแ‰ต แˆฐแˆญแ‰ฐแแŠฌแ‰ถแ‰ฝ แ‰ แ‹šแˆ… แ‹“แˆ˜แ‰ต แˆฐแŠ” แŠฅแŠ“ แŒฅแ‰…แˆแ‰ต แ‹ˆแˆญ แˆ‹แ‹ญ แ‹จแˆšแ‹ซแ‰ แ‰ แ‰ แˆ˜แˆ†แŠ‘ แ‹จแˆšแˆแŒ แˆญ แŠฅแŠ•แ‹ฐแˆ†แАแˆ แ‰ณแ‹‰แ‰‹แˆแข

"แ‹ญแˆ… แŠญแแ‰ฐแ‰ต แŠ แŠ•แ‹ต แŒŠแ‹œ แˆถแแ‰ตแ‹Œแˆญ แ‰ แˆ›แ‹˜แˆ˜แŠ• แ‰ฅแ‰ป แ‹จแˆšแˆแ‰ณ แŠ แˆˆแˆ˜แˆ†แŠ‘แŠ•แŠ“ แ‹จแŠฎแˆแ’แ‹แ‰ฐแˆฉแŠ• #Firmware (BIOS) แˆ›แ‹˜แˆ˜แŠ•แŠ•แŠ“ แŒฅแŠ•แ‰ƒแ‰„ แ‹จแ‰ฐแˆžแˆ‹แ‰ แ‰ต แŠญแ‰ตแ‰ตแˆแŠ• แ‹ญแŒ แ‹ญแ‰ƒแˆ แ‰ฐแ‰ฅแˆแˆแข

แ‰ แ‰ฐแŒจแˆ›แˆชแˆแฃ แˆ›แ‹ญแŠญแˆฎแˆถแแ‰ต แˆ‹แˆˆแ‰แ‰ต 20 แ‹“แˆ˜แ‰ณแ‰ต แ‰ แ‹ŠแŠ•แ‹ถแ‹แˆต แ‹แˆตแŒฅ แ‹จแ‰†แ‹ฉ แ‹จ #Agere_Modem แ‹ตแˆซแ‹ญแ‰จแˆฎแ‰ฝแŠ• แŠ แˆตแ‹ˆแŒแ‹ทแˆแข

แŠฅแАแ‹šแˆ… แ‹ตแˆซแ‹ญแ‰จแˆฎแ‰ฝ แ‰ แ‹˜แˆ˜แŠ“แ‹Š แŠฎแˆแ’แ‹แ‰ฐแˆฎแ‰ฝ แˆ‹แ‹ญ แ‰ แ‰ฅแ‹›แ‰ต แ‰ฃแ‹ญแŒˆแŠ™แˆแฃ

แ‰ฐแŒจแˆ›แˆช แˆˆแˆ›แŠ•แ‰ แ‰ฅแก- https://web.facebook.com/INSA.ETHIOPIA
๐Ÿคฏ3โค1
๐Ÿ›‘ URGENT: Microsoft rushed out out-of-band fixes for an actively exploited Office zero-day.

CVE-2026-21509 (CVSS 7.8) lets attackers bypass Office security using a malicious file that must be opened by the victim.

๐Ÿ”— Details โ†’ https://thehackernews.com/2026/01/microsoft-issues-emergency-patch-for.html

@codeNcrax
@adwactf
๐Ÿ‘2๐Ÿ‘€1
Forwarded from INSA Cyber Talent Center
แ‹จแŠขแˆ˜แ‹ฐแŠ /INSA แ‹จแ‹ŠแŠญ แŠขแŠ•แ‹ต/weekend แ‹จแ‰ณแˆˆแŠ•แ‰ต แˆแˆ›แ‰ต แ•แˆฎแŒแˆซแˆ แˆแ‹แŒˆแ‰ฃ แ‰ฐแŒ€แˆ˜แˆจ

แ•แˆฎแŒแˆซแˆ™ แ‹จแˆšแˆฐแŒฅแ‰ แ‰ต แ‰€แŠ“แ‰ต - แ‰ แˆณแˆแŠ•แ‰ฑ แˆ˜แŒจแˆจแˆป แ‰…แ‹ณแˆœ แŠฅแŠ“ แŠฅแˆแ‹ต
แ•แˆฎแŒแˆซแˆ™ แ‹จแˆšแˆฐแŒ แ‹‰ - แŠ แ‹ฒแˆต แŠ แ‰ แ‰ฃ แŠขแˆ˜แ‹ฐแŠ  แ‰ณแˆˆแŠ•แ‰ต แˆ›แŠฅแŠจแˆ
แ•แˆฎแŒแˆซแˆ™แŠ• แˆ˜แˆณแ‰ฐแ แ‹จแˆšแ‰ฝแˆ‰
1.แ‰ แˆณแ‹ญแ‰ แˆญ แŠฅแŠ“ แ‰ แˆ˜แˆณแˆฐแˆ‰แ‰ต แ‹˜แˆญแŽแ‰ฝ แ‹˜แˆญแ‰ แˆ‹แ‹ญ แˆแ‹ฉ แ‰ณแˆˆแŠ•แ‰ต แ‹ซแˆ‹แ‰ธแ‹‰ แŠฅแŠ“ แ‹จแˆžแŠซแŠจแˆฏแ‰ธแ‹‰แŠ• แ•แˆฎแŒ€แŠญแ‰ถแ‰ฝ แˆ›แˆณแ‹จแ‰ต แ‹จแˆšแ‰ฝแˆ‰
2.แ‰ฐแ‰‹แˆ™ แ‹จแˆšแ‹ซแ‹˜แŒ‹แŒ€แ‹‰แŠ• แˆแ‰ฐแŠ“/แ‰ปแˆŒแŠ•แŒ… แˆ›แˆˆแ แ‹จแˆšแ‰ฝแˆ‰
3.แ‰…แ‹ณแˆœ แŠฅแŠ“ แŠฅแˆแ‹ต แ‰ฐแˆ˜แˆ‹แˆแˆฐแ‹‰ แˆ˜แˆณแ‰ฐแ แ‹จแˆšแ‰ฝแˆ‰
4.แŠจแŠ แŠ•แ‹ฐแŠ› แ‹ฐแˆจแŒƒ แŒ€แˆแˆฎ แŠฅแˆตแŠจ แ‹ฉแŠ’แ‰จแˆญแˆตแ‰ฒ แ‰ฐแˆ˜แˆซแ‰‚

แˆแ‹แŒˆแ‰ฃแ‹‰ แ‹จแˆšแ‹ฐแˆจแŒแ‰ แ‰ต แ•แˆ‹แ‰ตแŽแˆญแˆ แˆˆแ‹šแˆ แ•แˆฎแŒแˆซแˆ แ‰ฐแ‰ฅแˆŽ แ‰ แ‰ฐแ‹˜แŒ‹แŒ€ แ–แˆญแ‰ณแˆ - https://talent.insa.gov.et 

แ‹จแˆแ‹แŒˆแ‰ฃ แŒŠแ‹œ แŠจแŒฅแˆญ 27 - แ‹จแŠซแ‰ฒแ‰ต 07 แ‹ตแˆจแˆต

แˆตแˆˆแ•แˆฎแŒแˆซแˆ™ แˆ›แ‰ฅแˆซแˆชแ‹ซ แŠจแˆแˆˆแŒ‰ แ‰ แ‰ณแˆˆแŠ•แ‰ต แˆ›แŠฅแŠจแˆ‰ แ‹จแ‰ดแˆŒแŒแˆซแˆ แ‰ปแŠ“แˆ
https://t.me/insactc
https://t.me/cteinsa
แ‰ แˆ˜แŒแ‰ฃแ‰ต แˆ›แŒแŠ˜แ‰ต แ‹จแˆแ‰ตแ‰ฝแˆ‰ แˆ˜แˆ†แŠ‘แŠ• แŠฅแŠ“แˆณแ‹‰แ‰ƒแˆˆแŠ•แข ๐Ÿ“ข INSA Weekend Talent Development Program โ€“ Registration Open

The Information Network Security Administration (INSA) invites talented individuals to apply for its Weekend Talent Development Program in cyber security and related fields.

๐Ÿ—“ Schedule: Saturdays & Sundays
๐Ÿ“ Location: INSA Talent Center, Addis Ababa

Eligible applicants:
โœ”๏ธ Talented individuals with demonstrable projects
โœ”๏ธ Those who pass INSAโ€™s exam/challenge
โœ”๏ธ Primary school students to university graduates
โœ”๏ธ Must be available on weekends

๐Ÿ“ Registration: February 04 โ€“ February 14
๐Ÿ”— Apply at: https://talent.insa.gov.et

โ„น๏ธ More info:
https://t.me/insactc
| https://t.me/cteinsa
๐Ÿ”ฅ3โค1