Forwarded from INSA Cyber Talent Center
แจINSA แณแญแ แญ แณแแแต แแแจแ แจแ
แณแ แฅแ แฅแแต แแฎแแซแ แแแแญ แแแข
แแแแฃ แ แ แญแฅ แแ แตแแแแแแญ แแแฐแแปแฝแ แแแฅแญแฑแ แฅแตแญแฑแแธแ!
INSA Cyber โโTalent Center Weekend Training Program will start soon.
@insactc
แแแแฃ แ แ แญแฅ แแ แตแแแแแแญ แแแฐแแปแฝแ แแแฅแญแฑแ แฅแตแญแฑแแธแ!
INSA Cyber โโTalent Center Weekend Training Program will start soon.
@insactc
๐ฅ9
Digital Ethiopia 2025 has been successfully completed, achieving its intended goals to a remarkable extent. Today officially marks the launch of Digital Ethiopia 2030.
I was honored to attend this landmark national event, graciously hosted by H.E. Prime Minister Abiy Ahmed, alongside senior government leaders and high-level ministers. Being invited to participate in such an important moment for the countryโs future was truly a privilege.
The Digital Ethiopia 2030 strategy places strong emphasis on expanding digital accessibility, creating equal opportunities for all citizens, and strengthening trust between citizens and institutions. These pillars form the core foundation of the strategy.
To achieve these objectives, major efforts will focus on expanding public digital infrastructure and ensuring that digital technologies remain human-centeredโempowering citizens and improving everyday life. This vision aligns closely with the governmentโs broader reform agenda to reduce bureaucracy and translate ambitious national strategies into real, measurable impact.
Grateful to be part of this historic milestone in Ethiopiaโs digital transformation journey. ๐ช๐น๐
#DigitalEthiopia2030
#DigitalEthiopia
#DigitalTransformation
#NationalVision
#Innovation
#Leadership
#FutureReadyEthiopia
I was honored to attend this landmark national event, graciously hosted by H.E. Prime Minister Abiy Ahmed, alongside senior government leaders and high-level ministers. Being invited to participate in such an important moment for the countryโs future was truly a privilege.
The Digital Ethiopia 2030 strategy places strong emphasis on expanding digital accessibility, creating equal opportunities for all citizens, and strengthening trust between citizens and institutions. These pillars form the core foundation of the strategy.
To achieve these objectives, major efforts will focus on expanding public digital infrastructure and ensuring that digital technologies remain human-centeredโempowering citizens and improving everyday life. This vision aligns closely with the governmentโs broader reform agenda to reduce bureaucracy and translate ambitious national strategies into real, measurable impact.
Grateful to be part of this historic milestone in Ethiopiaโs digital transformation journey. ๐ช๐น๐
#DigitalEthiopia2030
#DigitalEthiopia
#DigitalTransformation
#NationalVision
#Innovation
#Leadership
#FutureReadyEthiopia
๐5๐2โค1
Forwarded from INSA Cyber Talent Center
แจแขแแณ แณแญแ แญ แณแแแต แจแฆแแญแ แฅแ แ
แณแ แฅแ แฅแแต แตแแ แ แแแตแ แต แแแแฃ แ แ
แญแฅ แฅแแแแซแแแข แ แฐแแญ แ แณแญแ แญ แฐแ
แแแต แฅแ แดแจแแแแแต แแแช แฅแ แขแแตแญแแฒแฌแต แจแแแฝแ แซแแแแแฝแ แจแถแตแต แแญ แตแแ แ แตแแ แแแแฃแ แฅแแณแซแแแฃแฝแแข แแแฐแแต แแฐแแปแฝแแ แแจแแแ แ แตแญแทแธแแข แ แตแญแ แแแฎ แฅแ แ แ แแ แต แแแ แจแณแญแ แญ แฐแ
แแแต แฃแแแซ แจแแซแฐแญแแตแ แตแแ แ แ แแป แญแแฐแฑแข
@insactc
@insactc
๐ฅ7
#LINUX
When a process is in a "Zombie" (Z) state in the process table, which of the following statements is true regarding system resources?
When a process is in a "Zombie" (Z) state in the process table, which of the following statements is true regarding system resources?
Anonymous Quiz
30%
A) The process is still consuming CPU cycles but no RAM
18%
B) The process has been moved to swap space awaiting a SIGCONT signal
34%
C) The process consumes no CPU or memory, but retains an entry in the process table
18%
D) The kernel is currently dumping the process core to /var/lib/systemd/coredump
โค1
Forwarded from INSA Cyber Talent Center
This media is not supported in your browser
VIEW IN TELEGRAM
Happening Tonight... ๐ฅ
We will have our Malware Analysis ๐พ Live Session tonight with a SPECIAL GUEST from INSA.
๐ค Host: INSA CYBER TALENT CENTER (@insactc)
๐ Time: 1:50 LT (ToNight)
Share with your friends โก๏ธ
@insactc | @cteinsa
#LiveSession #CyberSecurity #MalwareAnalysis
We will have our Malware Analysis ๐พ Live Session tonight with a SPECIAL GUEST from INSA.
๐ค Host: INSA CYBER TALENT CENTER (@insactc)
๐ Time: 1:50 LT (ToNight)
Share with your friends โก๏ธ
@insactc | @cteinsa
#LiveSession #CyberSecurity #MalwareAnalysis
โค3
Forwarded from INSA Cyber Talent Center
๐ดToday we diving deep into one of the basis of the security world: "Hacking: The Art of Exploitation" (2nd Edition) by Jon Erickson.
๐ฅWeโll be breaking down:
โถ๏ธ The Book Review: Why this classic is still relevant for developers today.
โถ๏ธHollywood vs. Reality: Weโre analyzing famous movie hacking scenes. Are they even possible, or just flashy graphics?
โถ๏ธThe "No Discipline" Myth: Movies often portray hackers as chaotic or undisciplined. Weโll discuss why real-world hacking actually requires extreme patience, logic, and strict discipline.
๐ Event Details
๐ Topic: Book Review & Hacking Ethics.
๐Book: Hacking: The Art of Exploitation
๐Time: Today at 2:00 LT
Whether you are a coder looking to secure your apps or a tech enthusiast curious about the "dark side," you don't want to miss this.
See you in the stream!
@insactc
@cteinsa
#LiveSession #PersonalDevelopment #Midset #Book
๐ฅWeโll be breaking down:
โถ๏ธ The Book Review: Why this classic is still relevant for developers today.
โถ๏ธHollywood vs. Reality: Weโre analyzing famous movie hacking scenes. Are they even possible, or just flashy graphics?
โถ๏ธThe "No Discipline" Myth: Movies often portray hackers as chaotic or undisciplined. Weโll discuss why real-world hacking actually requires extreme patience, logic, and strict discipline.
๐ Event Details
๐ Topic: Book Review & Hacking Ethics.
๐Book: Hacking: The Art of Exploitation
๐Time: Today at 2:00 LT
Whether you are a coder looking to secure your apps or a tech enthusiast curious about the "dark side," you don't want to miss this.
See you in the stream!
@insactc
@cteinsa
#LiveSession #PersonalDevelopment #Midset #Book
๐2
Forwarded from ThreatX Security (Dawit Peter)
ThreatX Security Internship 2026 is OPEN!
We are a Top 120 AI Startup in Ethiopia building real cybersecurity & AI systems and weโre looking for talent.
Open roles:
โข Software Developers
โข Cybersecurity
โข AI Specialists
โข Graphic Designers
โข Video Editors
- Work on real products
- Get international exposure
- Grow into global opportunities
๐ฉ Apply now:
Send your CV or portfolio to threatxs@gmail.com
Comment โInternโ to get started.
#ThreatX #Cybersecurity #AI #Internship2026
We are a Top 120 AI Startup in Ethiopia building real cybersecurity & AI systems and weโre looking for talent.
Open roles:
โข Software Developers
โข Cybersecurity
โข AI Specialists
โข Graphic Designers
โข Video Editors
- Work on real products
- Get international exposure
- Grow into global opportunities
๐ฉ Apply now:
Send your CV or portfolio to threatxs@gmail.com
Comment โInternโ to get started.
#ThreatX #Cybersecurity #AI #Internship2026
๐ฅ3โค1
Forwarded from INSA Cyber Talent Center
๐ด LIVE SESSION TONIGHT ๐ด
Topic: Introduction to Cryptography & Secure Communication
โฐ Today | 2:00 LT (Night)
๐ On INSA Cyber Talent Center Channel @insactc
Join us for a hands-on live session where we break down the fundamentals of cryptography, explore how secure systems work, and understand the core mechanisms behind modern cybersecurity.
โก๏ธ Session highlights:
* Introduction to Cryptography: why it matters in cybersecurity
* Symmetric vs. Asymmetric Encryption: concepts & real-world use cases
* Key Exchange Protocols: understanding Diffie-Hellman
* Hash Functions: integrity, authentication, and applications
* Public Key Infrastructure (PKI): certificates and trust models
* Interactive Q&A on encryption, keys, and secure communication
@insactc
@cteinsa
#INSA #LiveSession #Cryptography #CyberSecurity #Encryption #PKI #InfoSec
Topic: Introduction to Cryptography & Secure Communication
โฐ Today | 2:00 LT (Night)
๐ On INSA Cyber Talent Center Channel @insactc
Join us for a hands-on live session where we break down the fundamentals of cryptography, explore how secure systems work, and understand the core mechanisms behind modern cybersecurity.
โก๏ธ Session highlights:
* Introduction to Cryptography: why it matters in cybersecurity
* Symmetric vs. Asymmetric Encryption: concepts & real-world use cases
* Key Exchange Protocols: understanding Diffie-Hellman
* Hash Functions: integrity, authentication, and applications
* Public Key Infrastructure (PKI): certificates and trust models
* Interactive Q&A on encryption, keys, and secure communication
๐ข Happening today at 2:00 LT night. Donโt miss it!
@insactc
@cteinsa
#INSA #LiveSession #Cryptography #CyberSecurity #Encryption #PKI #InfoSec
โค1๐ฅ1
Forwarded from ADWA CTF
๐Useful Resources For Cryptography
The Science of Codes: An Intro to Cryptography
https://www.youtube.com/watch?v=-yFZGF8FHSg
Cryptography: Crash Course Computer Science
https://www.youtube.com/watch?v=jhXCTbFnK8o
Advanced:
Cryptography for Beginners - Full Python Course (SHA-256, AES, RSA, Passwords)
https://www.youtube.com/watch?v=kb_scuDUHls
Website:
cryptohack.org
@insactc @cteinsa
#CyberSecurity #Cryptography
The Science of Codes: An Intro to Cryptography
https://www.youtube.com/watch?v=-yFZGF8FHSg
Cryptography: Crash Course Computer Science
https://www.youtube.com/watch?v=jhXCTbFnK8o
Advanced:
Cryptography for Beginners - Full Python Course (SHA-256, AES, RSA, Passwords)
https://www.youtube.com/watch?v=kb_scuDUHls
Website:
cryptohack.org
@insactc @cteinsa
#CyberSecurity #Cryptography
๐ฅ6โค1
Forwarded from ADWA CTF (๐ฌ๐๐๐๐ฆ๐๐ฅ๐)
แฅแแณแ แแแณแฝแ แแแตแแแณแฝ แแขแจแฑแต แญแญแตแถแต แจแแฐแต แ แแ แ แฐแแ แ แฐแจแณแฝแแข
แ แแ แจแฐแแ แฅแ แจแแ แญ แญแแแแฝแแข๐โค๏ธ
แ แแ แจแฐแแ แฅแ แจแแ แญ แญแแแแฝแแข๐โค๏ธ
โค12๐2โคโ๐ฅ1๐คฉ1
แแญแญแฎแถแแต แจแฅแญ แแญ แจแฐแ
แแแต แแแแ 114 แจแฐแ
แแแต แญแแฐแถแฝแ แแแแฑแ แ แตแณแแ
แแญแญแฎแถแแต แฅ.แค.แ . แจ2026 แจแแแแชแซแ แ แแแ แจแฅแญ แแญ แจแฐแ แแแต แแปแปแซ แแฎแแซแแฃ แ แ แ แแแญ 114 แจแฐแ แแแต แญแแฐแถแฝแ #CVEs แแแแฑแ แ แตแณแแแข
แจแฅแแแ แ แแซแจแ แฆแตแฑ "แแฎ-แดแญ" #Zero_day แจแฐแฐแแ แจแแฐแ แตแแต แจแฐแแ แแแแธแ แฐแแแฟแแข
แ แแปแปแซแ แแตแฅ แจแฐแซแฐแฑแต แญแแฐแถแฝ แแซแจแ CVE-2026-20805 แจแฐแฐแแแ แ แแแถแแต #Desktop_Window_Manager แแญ แจแแแแ แฅแแฝแต แ แ แแ แฐแแต แ แ แฅแแแฝ แฅแ แแตแ แฅแแต แฅแจแฐแแธแแ แต แแแ แฐแจแแแงแแข
แญแ แญแแฐแต แจแแจแ แแแณแแแฝ แจแฒแตแฐแแ แจแฐแ แแแต แแจแแจแซ แฐแฅแจแ แ แแแฃแต แจแฎแแแแฐแฉแ แแตแฅแซแ แแจแแแฝ แฅแแฒแฐแญแ แแแแต แจแจแแฐ แแแ แณแแแแข
แแแแแ แตแแ แตแแต แจแแแ CVE-2026-21265 แจแฐแฐแแ แญแแฐแต แแแข แญแ แฝแแญ แฅ.แค.แ . แจ2012 แฅแตแจ 2025 แฃแแต แแแณแต แจแฐแแ แฎแแแแฐแฎแฝแ แ แแ แจแแแแจแต แฒแแแฃ แจแแแถแแต แจแฐแ แแแต แฐแญแฐแแฌแถแฝ แ แแ แแแต แฐแ แฅแ แฅแ แแต แแญ แแญ แจแแซแ แ แ แแแ แจแแแ แญ แฅแแฐแแแ แณแแแแข
"แญแ แญแแฐแต แ แแต แแ แถแแตแแญ แ แแแแ แฅแป แจแแแณ แ แแแแแแ แจแฎแแแแฐแฉแ #Firmware (BIOS) แแแแแแ แฅแแแ แจแฐแแแ แต แญแตแตแแ แญแ แญแแ แฐแฅแแแข
แ แฐแจแแชแแฃ แแญแญแฎแถแแต แแแแต 20 แแแณแต แ แแแถแแต แแตแฅ แจแแฉ แจ #Agere_Modem แตแซแญแจแฎแฝแ แ แตแแแทแแข
แฅแแแ แตแซแญแจแฎแฝ แ แแแแ แฎแแแแฐแฎแฝ แแญ แ แฅแแต แฃแญแแแแฃ
แฐแจแแช แแแแ แฅแก- https://web.facebook.com/INSA.ETHIOPIA
แแญแญแฎแถแแต แฅ.แค.แ . แจ2026 แจแแแแชแซแ แ แแแ แจแฅแญ แแญ แจแฐแ แแแต แแปแปแซ แแฎแแซแแฃ แ แ แ แแแญ 114 แจแฐแ แแแต แญแแฐแถแฝแ #CVEs แแแแฑแ แ แตแณแแแข
แจแฅแแแ แ แแซแจแ แฆแตแฑ "แแฎ-แดแญ" #Zero_day แจแฐแฐแแ แจแแฐแ แตแแต แจแฐแแ แแแแธแ แฐแแแฟแแข
แ แแปแปแซแ แแตแฅ แจแฐแซแฐแฑแต แญแแฐแถแฝ แแซแจแ CVE-2026-20805 แจแฐแฐแแแ แ แแแถแแต #Desktop_Window_Manager แแญ แจแแแแ แฅแแฝแต แ แ แแ แฐแแต แ แ แฅแแแฝ แฅแ แแตแ แฅแแต แฅแจแฐแแธแแ แต แแแ แฐแจแแแงแแข
แญแ แญแแฐแต แจแแจแ แแแณแแแฝ แจแฒแตแฐแแ แจแฐแ แแแต แแจแแจแซ แฐแฅแจแ แ แแแฃแต แจแฎแแแแฐแฉแ แแตแฅแซแ แแจแแแฝ แฅแแฒแฐแญแ แแแแต แจแจแแฐ แแแ แณแแแแข
แแแแแ แตแแ แตแแต แจแแแ CVE-2026-21265 แจแฐแฐแแ แญแแฐแต แแแข แญแ แฝแแญ แฅ.แค.แ . แจ2012 แฅแตแจ 2025 แฃแแต แแแณแต แจแฐแแ แฎแแแแฐแฎแฝแ แ แแ แจแแแแจแต แฒแแแฃ แจแแแถแแต แจแฐแ แแแต แฐแญแฐแแฌแถแฝ แ แแ แแแต แฐแ แฅแ แฅแ แแต แแญ แแญ แจแแซแ แ แ แแแ แจแแแ แญ แฅแแฐแแแ แณแแแแข
"แญแ แญแแฐแต แ แแต แแ แถแแตแแญ แ แแแแ แฅแป แจแแแณ แ แแแแแแ แจแฎแแแแฐแฉแ #Firmware (BIOS) แแแแแแ แฅแแแ แจแฐแแแ แต แญแตแตแแ แญแ แญแแ แฐแฅแแแข
แ แฐแจแแชแแฃ แแญแญแฎแถแแต แแแแต 20 แแแณแต แ แแแถแแต แแตแฅ แจแแฉ แจ #Agere_Modem แตแซแญแจแฎแฝแ แ แตแแแทแแข
แฅแแแ แตแซแญแจแฎแฝ แ แแแแ แฎแแแแฐแฎแฝ แแญ แ แฅแแต แฃแญแแแแฃ
แฐแจแแช แแแแ แฅแก- https://web.facebook.com/INSA.ETHIOPIA
๐คฏ3โค1
๐ URGENT: Microsoft rushed out out-of-band fixes for an actively exploited Office zero-day.
CVE-2026-21509 (CVSS 7.8) lets attackers bypass Office security using a malicious file that must be opened by the victim.
๐ Details โ https://thehackernews.com/2026/01/microsoft-issues-emergency-patch-for.html
@codeNcrax
@adwactf
CVE-2026-21509 (CVSS 7.8) lets attackers bypass Office security using a malicious file that must be opened by the victim.
๐ Details โ https://thehackernews.com/2026/01/microsoft-issues-emergency-patch-for.html
@codeNcrax
@adwactf
๐2๐1