Famous (@famous_a_a) 's Twitter Profile
Famous

@famous_a_a

Cybersecurity in progress 💻 | Chelsea forever 💙 | Crypto believer | Documenting the grind

ID: 1077597724822917125

calendar_today25-12-2018 16:11:33

6,6K Tweet

329 Followers

1,1K Following

Famous (@famous_a_a) 's Twitter Profile Photo

#BlueTeamer #100DaysOfCybersecurity Day 95-97 Day 95- Continued working on the vulnerability management task and I was unable to make much progress, I’ve been having a hard time making sense of the scan result from Nessus. Day 96- I decided to continue my leaning on coursera, I

#BlueTeamer #100DaysOfCybersecurity Day 95-97

Day 95- Continued working on the vulnerability management task and I was unable to make much progress, I’ve been having a hard time making sense of the scan result from Nessus.

Day 96- I decided to continue my leaning on coursera, I
Famous (@famous_a_a) 's Twitter Profile Photo

#BlueTeamer #100DaysOfCybersecurity Day 98 We had our first session at CyBlack SOC academy today and it was about threat intelligence. We were given a task to complete and properly briefed on what’s expected of us. Immediately after that, I had a meeting with my team

#BlueTeamer #100DaysOfCybersecurity Day 98

We had our first session at <a href="/Cyblackorg/">CyBlack</a> SOC academy today and it was about threat intelligence. We were given a task to complete and properly briefed on what’s expected of us.

Immediately after that, I had a meeting with my team
Networking Academy (@cisconetacad) 's Twitter Profile Photo

Cisco Networking Academy and @Splunk just made it easier to break into cybersecurity for free. The Cybersecurity Defense Analyst Career Path is now available. Splunk built this curriculum, and we're delivering it to learners everywhere. Start here: cs.co/6011B6214c

Cisco Networking Academy and @Splunk just made it easier to break into cybersecurity for free.  

The Cybersecurity Defense Analyst Career Path is now available. Splunk built this curriculum, and we're delivering it to learners everywhere.  

Start here: cs.co/6011B6214c
Famous (@famous_a_a) 's Twitter Profile Photo

#BlueTeamer #100DaysOfCybersecurity Day 99 In preparation for the task ahead, I completed some basic rooms on LetsDefend ; IT Security basics for Corporate VirusTotal for SOC Analyst How to investigate a SIEM alert and Cyber Threat Intelligence zʇunH ʎɐſ ɐsɐɟnW 🦁🦁🦁🦁 Dr Iretioluwa Akerele Cisco Nerd

Blcvksheep (@iamshedrachking) 's Twitter Profile Photo

Day 100/100 of #100DaysOfCybersecurity I did it 🚀🎊. 100 days complete. This journey gave me real hands on practice, taught me consistency, and pushed me to document my learning publicly. It kept me accountable and helped me stay on track even on difficult days.

Famous (@famous_a_a) 's Twitter Profile Photo

#BlueTeamer #100DaysOfCybersecurity Day 100/100 I was assigned a threat intelligence task using MISP to investigate a suspected threat actor by identifying and analysing indicators of compromise (IOCs), with the goal of building a threat profile and preparing a briefing. I began

#BlueTeamer #100DaysOfCybersecurity Day 100/100

I was assigned a threat intelligence task using MISP to investigate a suspected threat actor by identifying and analysing indicators of compromise (IOCs), with the goal of building a threat profile and preparing a briefing.
I began
Famous (@famous_a_a) 's Twitter Profile Photo

Just wrapped up my 100 Days Cybersecurity challenge 🎉🎉 Big thank you to my accountability partner Ifunanya your consistency, check-ins, and support kept me going even on the days I wanted to slack. I also want to appreciate some amazing people in the cybersecurity space whose

Ifunanya (@_naya07) 's Twitter Profile Photo

I just completed my 100 Days of Cybersecurity challenge. Big thanks to my accountability partner Famous for the check-ins and support, really helped me stay on track. Showing up every day was not always easy, but I did it. Dr Iretioluwa Akerele Temitope Sobulo🛡️ Ṣẹ́gunfúnmi😎 zʇunH ʎɐſ ɐsɐɟnW 🦁🦁🦁🦁

Sudo Undeesputed (@umarmusashehu2) 's Twitter Profile Photo

DAY 100/100 OF #100DAYSOFCYBERSECURITY 🎉 TODAY MARKS THE COMPLETION OF MY 100 DAYS OF CYBERSECURITY JOURNEY A CONSISTENT AND TRANSFORMATIVE EXPERIENCE THAT HAS SHAPED MY UNDERSTANDING OF SECURITY FROM THE GROUND UP. FROM EXPLORING CORE CONCEPTS LIKE SOCIAL ENGINEERING, LOG

DAY 100/100 OF #100DAYSOFCYBERSECURITY 🎉

TODAY MARKS THE COMPLETION OF MY 100 DAYS OF CYBERSECURITY JOURNEY A CONSISTENT AND TRANSFORMATIVE EXPERIENCE THAT HAS SHAPED MY UNDERSTANDING OF SECURITY FROM THE GROUND UP.
FROM EXPLORING CORE CONCEPTS LIKE SOCIAL ENGINEERING, LOG
Ṣẹ́gunfúnmi😎 (@segoslavia) 's Twitter Profile Photo

Consistency is often misunderstood. People see a “70-day streak” and assume it’s about intensity, long hours, or some extraordinary level of discipline. It’s not. The real story is much simpler—and far more achievable. It’s about showing up. Not when you feel motivated. Not

Cyber Security News (@the_cyber_news) 's Twitter Profile Photo

🚨 Microsoft Defender 0-Day Vulnerability “RedSun” Enables Full SYSTEM Access Source: cybersecuritynews.com/defender-0-day… A newly disclosed zero-day vulnerability in Microsoft Defender, dubbed "RedSun," allows an unprivileged user to escalate privileges to full SYSTEM-level access on

🚨 Microsoft Defender 0-Day Vulnerability “RedSun” Enables Full SYSTEM Access 

Source: cybersecuritynews.com/defender-0-day…

A newly disclosed zero-day vulnerability in Microsoft Defender, dubbed "RedSun," allows an unprivileged user to escalate privileges to full SYSTEM-level access on
Networking Academy (@cisconetacad) 's Twitter Profile Photo

Know someone trying to break into cybersecurity? Tag them. 👇 We’ve released 8 free @Splunk courses that form the Cybersecurity Defense Analyst Career Path, built for aspiring SOC Analysts. Start learning today: cs.co/6011BBBoIc

Dark Web Informer - Cyber Threat Intelligence (@darkwebinformer) 's Twitter Profile Photo

‼️🇳🇬 A threat actor operating under the group Nullsec Nigeria has made available a dataset allegedly scraped from Nigerias Economic and Financial Crimes Commission (EFCC). The leaked data reportedly includes agent names, phone numbers, agent code names, and password hashes.

‼️🇳🇬 A threat actor operating under the group Nullsec Nigeria has made available a dataset allegedly scraped from Nigerias Economic and Financial Crimes Commission (EFCC).

The leaked data reportedly includes agent names, phone numbers, agent code names, and password hashes.