Ennkasa (@ennkasa) 's Twitter Profile
Ennkasa

@ennkasa

Ennkasa

ID: 1425206272631222278

calendar_today10-08-2021 21:24:07

922 Tweet

116 Followers

412 Following

YKGH (@youknowghana) 's Twitter Profile Photo

Have I ever lied to you? Richard Adu Gyamfi A British Citizen A UK resident Former British Army Soldier Representing the Ghana National Scholarship Secretariat Defending extreme corruption Whatever happens in Ghana doesn’t really affect him.

Have I ever lied to you? 

Richard Adu Gyamfi 

A British Citizen 
A UK resident 
Former British Army Soldier 

Representing the Ghana National Scholarship Secretariat 

Defending extreme corruption 

Whatever happens in Ghana doesn’t really affect him.
Ennkasa (@ennkasa) 's Twitter Profile Photo

FTC finalizes Order with Avast Banning it from selling or licensing web browsing data for advertising and requiring to pay $16.5 Million. Parties: Avast Ltd-UK, Avast Software-Czech and Jumpshot-US. Why? FTC alleged that Avast sold data which were not de-identified properly.

FTC finalizes Order with Avast Banning it from selling or licensing web browsing data for advertising and requiring to pay $16.5 Million.

Parties: Avast Ltd-UK, Avast Software-Czech and Jumpshot-US. 

Why? FTC alleged that Avast sold data which were not de-identified properly.
Ennkasa (@ennkasa) 's Twitter Profile Photo

CYBER INTEGRITY 7/19/24: Pic1-Dunstan Guba breaks the news of a DVLA web subdomain hack. Pic2-A "pentester" posts the same story, citing Dunstan Guba's IG as the source. 7/21/24: Video-This "pentester" claims on a spaces, a mysterious "FBI" friend tipped him off a day earlier 🤔

Ennkasa (@ennkasa) 's Twitter Profile Photo

😂 Write blockers (external) connects evidentiary devices to forensic workstations for IMAGING & subsequent HARSHING (md5 etc). Originals go into tamper-proof bags. Work with image/copy with sound documentation. Live hashing verifies evidence integrity in court.

Ennkasa (@ennkasa) 's Twitter Profile Photo

A quick test of the robustness of the online form on the “oralgh.org” website. Findings: Poor coding/formatting of Form 1. Accepts strings/texts as phone number 2. Accepts any input with an "@" sign as email addr Issues: Data Quality/Integrity & Security Risks

A quick test of the robustness of the online form on the “oralgh.org” website. 

Findings: Poor coding/formatting of Form

1. Accepts strings/texts as phone number

2. Accepts any input with an "@" sign as email addr

Issues: Data Quality/Integrity & Security Risks
Amitav Bhattacharjee (@bamitav) 's Twitter Profile Photo

Cisco Data Breach – Authenticity of 4.45GB Data Leak Confirmed! cybersecuritynews.com/cisco-data-aut… #Cisco #vulnerability #2fa #RCE #ZeroTrust #ZeroDay #cybercrime #hacker #privacy #APT #bot #CISO #DDoS #hacking #phishing #CyberAttack #cybersecurity #Security #infosec #AppSec #CyberSec

Tom Dörr (@tom_doerr) 's Twitter Profile Photo

CISO Assistant: an open-source tool for managing Governance, Risk, and Compliance (GRC) across over 70 frameworks, including NIST CSF, ISO 27001, and SOC2, with features for risk assessment, audit management, and compliance tracking

CISO Assistant: an open-source tool for managing Governance, Risk, and Compliance (GRC) across over 70 frameworks, including NIST CSF, ISO 27001, and SOC2, with features for risk assessment, audit management, and compliance tracking
Patrick (@rva4n6) 's Twitter Profile Photo

I wrote an Article several years ago about Cellebrite UFED Reader (UFDR) reports entitled "You Don't Know What You're Missing." Following up from a recent post about the practice of "pump & dump" which garnered a lot of comments, I wanted take these two points and illustrate

I wrote an Article several years ago about <a href="/Cellebrite/">Cellebrite</a>  UFED Reader (UFDR) reports entitled "You Don't Know What You're Missing."  Following up from a recent post about the practice of "pump &amp; dump" which garnered a lot of comments, I wanted take these two points and illustrate
Grant Collins (@collinsinfosec) 's Twitter Profile Photo

Introducing projectsecurity.io! A free platform dedicated to practical #cybersecurity training through homelabs, build real-world scenarios, master the basics, and create a portfolio of projects along the way. Learn more: bit.ly/40gQnBc It's free. No gimmicks.

Marc Menninger (@marcmenninger) 's Twitter Profile Photo

🚀 The Hardest Cybersecurity Skills to Learn (And How They Pay Off) Some cybersecurity skills are brutal to master. They take time, patience, and relentless practice. But if you push through? You’ll level up to an advanced cybersecurity professional. Here are the toughest

Israel (@israeladeloye_) 's Twitter Profile Photo

Certified! Got this through the Google Get Certified Program. I wrote about my journey, how I applied and got in, up to the resources I used for the exam; check it out here: medium.com/p/4263d041b739

Certified!

Got this through the Google Get Certified Program.

I wrote about my journey, how I applied and got in, up to the resources I used for the exam; check it out here: medium.com/p/4263d041b739