Onovae Deborah (@bome_dee) 's Twitter Profile
Onovae Deborah

@bome_dee

Pharmacist/Cybersecurity (GRC)/ISC2 CC Certified /Risk Management/Cybergirl 3.0 Alumni /Blogger/wife et mom/

ID: 1276179067558125568

linkhttps://www.linkedin.com/in/deborah-onovae calendar_today25-06-2020 15:43:08

855 Tweet

579 Followers

1,1K Following

Confidence Staveley (@sisinerdtweets) 's Twitter Profile Photo

I won’t use fancy words to convince you to attend this event if you’re a #cybersecurity beginner. But here’s what I will say: everyone who shows up will walk away sharper, more informed, and better prepared. Expect undiluted truths, actionable insights, and eye-opening blind

I won’t use fancy words to convince you to attend this event if you’re a #cybersecurity beginner.

But here’s what I will say: everyone who shows up will walk away sharper, more informed, and better prepared. Expect undiluted truths, actionable insights, and eye-opening blind
Symone Capone (@symonecapone) 's Twitter Profile Photo

❤️❤️Valentines Day Giveaway❤️❤️ I’m giving away two CompTIA Security+ Exam Vouchers How to enter: - Like and RT - comment or tag someone Winners will be announced on Valentine’s Day I’ll be doing more giveaways throughout the yr so stay tuned. Good Luck!

❤️❤️Valentines Day Giveaway❤️❤️

I’m giving away two CompTIA Security+ Exam Vouchers

How to enter:
- Like and RT
- comment or tag someone 

Winners will be announced on Valentine’s Day 

I’ll be doing more giveaways throughout the yr so stay tuned. 

Good Luck!
ARAMI 🇳🇬 (@esther_hamzat) 's Twitter Profile Photo

Exciting News! My Book is Here! Happy Safer Internet Day 2025! What better way to celebrate than with the launch of “Getting Started in Cybersecurity for Teens”!🎊🎊 This book equips teens with essential cybersecurity knowledge to navigate the internet safely.

Temitopeade (@cybertems) 's Twitter Profile Photo

I deployed a honeypot, and within minutes, attacks flooded in from around the world! Watching the live map feels like a digital battlefield, so fascinating and alarming at the same time. This proves one thing: threat actors never sleep!

Elizabeth Ekedoro (@lizettle_) 's Twitter Profile Photo

📌 Update! I GOT THE U.S. 🇺🇸 VISA FOR WiCyS 2025!!!🎉💃 But I still need your support to make this dream a reality🙏 While my visa is secured, I urgently need funds to cover my flight ticket before my flight arrangements submission deadline (25/03/2025). A THREAD🧵.. 1/5

📌 Update! 

I GOT THE U.S. 🇺🇸 VISA FOR WiCyS 2025!!!🎉💃

But I still need your support to make this dream a reality🙏

While my visa is secured, I urgently need funds to cover my flight ticket before my flight arrangements submission deadline (25/03/2025).

A THREAD🧵.. 1/5
Elizabeth Ekedoro (@lizettle_) 's Twitter Profile Photo

We're making progress, and I'm super grateful to everyone!!!🙏🙏 We're currently at N1,500,000 ($937.5) of 2.5M ($1592) target. Please help me meet my goal by contributing and also by sharing. Links for donations: buymeacoffee.com/ekedoroeli5 donate-ng.com/campaign/help-… Thank You!!

Elizabeth Ekedoro (@lizettle_) 's Twitter Profile Photo

You all are too sweet for me🥹.Thank you for your support so far🙏 We're currently at N1,912,850($1,195). We still have N588,000($392) to go🥹 Please help me meet my goal by contributing & also by sharing. Links for donations: buymeacoffee.com/ekedoroeli5 donate-ng.com/campaign/help-…

Confidence Staveley (@sisinerdtweets) 's Twitter Profile Photo

How do you write a regex to prevent prompt injection attacks? On this AI Cyber Magazine interview, Steve Wilson (Steve Wilson) aptly explains why prompt injection attacks are so difficult to prevent and what you should do instead. Watch the full conversation here

Itunuoluwa Olorunfemi (@productyuna) 's Twitter Profile Photo

Ice Phishing Attacks: A Threat Vector Targeting Web3 Users In a recent security alert, Microsoft identified a new and sophisticated blockchain-based attack vector targeting the decentralized Web3 environment. Known as Ice Phishing, this attack technique diverges from

Ice Phishing Attacks: A Threat Vector Targeting Web3 Users

In a recent security alert, Microsoft identified a new and sophisticated blockchain-based attack vector targeting the decentralized Web3 environment. Known as Ice Phishing, this attack technique diverges from
Confidence Staveley (@sisinerdtweets) 's Twitter Profile Photo

My Q&A with Patricia Ephraim Eke (Patricia Ephraim Eke) for AI Cyber Magazine IS NOW LIVE ON YOUTUBE In this conversation, she shared her insights on shaping global cybersecurity policies, the evolving role of AI in security, and the challenges in public policy. We discussed the

Elizabeth Ekedoro (@lizettle_) 's Twitter Profile Photo

Wondering what the Dark Web is all about? In this video, I talk about: 👉The layers of the Internet (surface web, deep web, and dark web). 👉How Tor works. 👉Why the dark web is dangerous. 👉 The risks, especially for non-technical users. 👇👇👇👇👇 youtu.be/BM-swqPRuu8

Onovae Deborah (@bome_dee) 's Twitter Profile Photo

I got balloons today cos it’s my birthday!! Happy #birthday to me🥳, lines are falling in pleasant places for me.. cheers to an awesome year ahead. #birthdaygirl

I got balloons today cos it’s my birthday!!

Happy #birthday to me🥳, lines are falling in pleasant places for me.. cheers to an awesome year ahead.

#birthdaygirl
S.L.P (@mr_sholape) 's Twitter Profile Photo

Looking for an AI-powered fraud detection solution focused on supply chain fraud. Preferably already built with a solid track record. If you know any, please DM me.