BIC_Nairobi (@bic_nairobi) 's Twitter Profile
BIC_Nairobi

@bic_nairobi

Blacks in Cybersecurity™ Official Nairobi Kenya Twitter! #LitLikeBic

ID: 1243995330460422147

linkhttps://www.blacksincyberconf.com/ calendar_today28-03-2020 20:16:39

55 Tweet

134 Followers

23 Following

Cyber Defence Club (CyDC) (@cydc_ke) 's Twitter Profile Photo

UPDATE: we're looking for computer donations for our program. COVID19 has given us the opportunity to stock up & set up labs for our participating high schools in Kenya. You can also send in your donations via PAYBILL 8001920, Acc: CyDC Comps. cc Swift Intellect LTD @CyberSpaceKenya

UPDATE: we're looking for computer donations for our program. COVID19 has given us the opportunity to stock up &amp; set up labs for our participating high schools in Kenya. You can also send in your donations via PAYBILL 8001920, Acc: CyDC Comps. cc <a href="/SwiftIntellect/">Swift Intellect LTD</a> @CyberSpaceKenya
bugcrowd (@bugcrowd) 's Twitter Profile Photo

If you had to put together a "Hacking for Beginners" starter kit, what is one item your kit absolutely can't exist without? 😎

SheHacks KE #SheHacks2025 (@shehacks_ke) 's Twitter Profile Photo

Securing your home router is a crucial step in protecting internet connected devices in your home which you may be using for both personal and professional uses. #CybersecurityAwarenessMonth #BeCyberSmart

Securing your home router is a crucial step in protecting internet connected devices in your home which you may be using for both personal and professional uses. 

#CybersecurityAwarenessMonth #BeCyberSmart
SheHacks KE #SheHacks2025 (@shehacks_ke) 's Twitter Profile Photo

Here's how to: 1. Change the default SSID and password 2. Use a strong and unique password 3. Enable access only people and devices that you trust

SheHacks KE #SheHacks2025 (@shehacks_ke) 's Twitter Profile Photo

4. Create a secondary network. .In the event that your router bolsters different networks, consider making an auxiliary network only for smart devices. 5. Update router firmware regularly #BeCyberSmart

WIRED (@wired) 's Twitter Profile Photo

These tech companies are testing a feature for Android phones that automatically tags the time and location when an image was captured. This could help newsrooms covering disasters decide whether to trust social media content claiming to show the damage. wired.trib.al/GwQTvSk

Bright Mawudor,PhD (@brightzeed) 's Twitter Profile Photo

Looking at this KillChain should give indication to organizations that threat Intelligence should become their new focus with a lot of automation. A well thoughtout defense in depth will not only assist to detect such attacks early but also respond and recover easily.

Looking at this KillChain should give indication to organizations that threat Intelligence should become their new focus with a lot of automation.
A well thoughtout defense in depth will not only assist to detect such attacks early but also respond and recover easily.
Raha (@brwn_by) 's Twitter Profile Photo

#cybersecurity professionals out there… How did/do you evaluate the career path you want to take, either as a novice or experienced professional? How did you figure out what you’re passionate about in this vast field? #infosec

Kenya CyberSecurity & Forensics Association: KCSFA (@kcsfa) 's Twitter Profile Photo

Some of the risks involved with phishing: 1)Identity Theft: Your personal information in response to a phishing attempt, can be used to access your financial accounts, make purchases, or secure loans in your name. Theread 👇

Some of the risks involved with phishing:

1)Identity Theft: 
Your personal information in response to a phishing attempt, can be used to access your financial accounts, make purchases, or secure loans in your name.  
Theread 👇
Kenya CyberSecurity & Forensics Association: KCSFA (@kcsfa) 's Twitter Profile Photo

2)Compromising Institutional Information: Credentials obtained via phishing attacks can be used to get inside your network making it easier for cybercriminals to launch lateral attacks aimed at gaining access to secure resources.

Kenya CyberSecurity & Forensics Association: KCSFA (@kcsfa) 's Twitter Profile Photo

3)Loss of data: Some phishing attacks will attempt to deploy crypto malware on your machine, also known as ransomware. Ransomware attacks can result in the loss of personal data as well as institutional and/or research data that is improperly stored on a single user device.

Kenya CyberSecurity & Forensics Association: KCSFA (@kcsfa) 's Twitter Profile Photo

4)Malware infection: Some fraudulent emails include links or attachments that, once clicked, download malicious software to your computer. Others may install keystroke loggers that record your computer activity including entry or usernames and passwords .

BIC_Nairobi (@bic_nairobi) 's Twitter Profile Photo

The BIC Awards #BICA2021 are currently happening. Plenty of awesome people pushing for tech and Cyber Security in the Black Community globally. Blacks In Cybersecurity #ShareTheMicInCyber

TryHackMe (@realtryhackme) 's Twitter Profile Photo

Advent of Cyber 3 has officially STARTED‼️ 🎄 $19k+ worth of prizes 🎄 Certificate of Completion 🎄 100% FREE 🎄 Video walkthroughs Go! Go! Go! tryhackme.com/room/adventofc… Once you've completed Day 1, reply to this Tweet and show us!

Advent of Cyber 3 has officially STARTED‼️

🎄 $19k+ worth of prizes
🎄 Certificate of Completion
🎄 100% FREE
🎄 Video walkthroughs

Go! Go! Go! tryhackme.com/room/adventofc…

Once you've completed Day 1, reply to this Tweet and show us!
Blacks In Cybersecurity (@blackincyberco1) 's Twitter Profile Photo

This week is #BlackCyberContentCreators Week! Have a new favorite creator? BICA 2022 Nominations are OPEN! Link: blacksincyberconf.com/bica #blacksincybersecurity #blackincybersecurity #blacksIncyber #blackincyber #BICA #BICA2022 #BIC_AWARDS #BICAWARDS #BlackCyberCreatorsWeek

This week is #BlackCyberContentCreators Week! Have a new favorite creator?

BICA 2022 Nominations are OPEN! 

Link: blacksincyberconf.com/bica

#blacksincybersecurity #blackincybersecurity  #blacksIncyber #blackincyber #BICA #BICA2022 #BIC_AWARDS #BICAWARDS 
#BlackCyberCreatorsWeek
Raha (@brwn_by) 's Twitter Profile Photo

To all the cybersecurity learners, enthusiasts, experienced practitioners and curious-minded, you have a shot at enriching your knowledge through this years Advent of Cyber challenge!! Crack & learn. Day 1 Done! tryhackme.com/room/adventofc… #CyberSecurity #infosec

To all the cybersecurity learners, enthusiasts, experienced practitioners and curious-minded, you have a shot at enriching your knowledge through this years <a href="/tryhackme/"></a> Advent of Cyber challenge!!

Crack &amp; learn. Day 1 Done!

tryhackme.com/room/adventofc…
#CyberSecurity #infosec
Jones Baraza (@jonesbaraza) 's Twitter Profile Photo

A couple of days ago I talked about finding an IDOR vulnerability on a local portal here & for "Advent of Cyber 3 (2021)" by guess what day 1 was all about? Very good refresher for me. IDOR is dangerous. Looking forward to Day 2.

A couple of days ago I talked about finding an IDOR vulnerability on a local portal here &amp; for "Advent of Cyber 3 (2021)" by <a href="/tryhackme/"></a> guess what day 1 was all about? Very good refresher for me. IDOR is dangerous. Looking forward to Day 2.
Davin Jackson (@djax_alpha) 's Twitter Profile Photo

Think I might hop on in a little bit to knock out day one of The #AdventofCyber event. I'll be streaming on YouTube and Twitch thanks to Restream! #YouTube - youtube.com/c/Alphacyberse… #Twitch - twitch.tv/djax120 #Like #Comment #Follow #Subscribe

BIC_Nairobi (@bic_nairobi) 's Twitter Profile Photo

Day 8 of #AoC2021 from was a real bag of toys and tricks. Special Task from John Hammond and is a good log analysis and investigation test. Good to see SheHacks KE #SheHacks2025 article on Shellbags be used as material. Keep learning #Cybersecurity #THM #CTF

Day 8 of #AoC2021 from <a href="/tryhackme/"></a> was a real bag of toys and tricks. Special Task from <a href="/_JohnHammond/">John Hammond</a> and is a good log analysis and investigation test.

Good to see <a href="/shehacks_ke/">SheHacks KE #SheHacks2025</a> article on Shellbags be used as material. 

Keep learning #Cybersecurity #THM #CTF