UgCERT (@ugcert) 's Twitter Profile
UgCERT

@ugcert

Uganda Computer Emergency Response Team (CERT) @UCC_official
Computer security incident or internet crime?
Call TollFree 0800222777 or email: [email protected]

ID: 2282264556

linkhttp://www.ug-cert.ug calendar_today08-01-2014 15:05:46

5,5K Tweet

2,2K Takipçi

281 Takip Edilen

Hackread.com (@hackread) 's Twitter Profile Photo

⚠️ Watch out! A new Android backdoor called #Baohuo is spreading through a fake Telegram X app, hijacking Telegram accounts on thousands of devices. Read: hackread.com/baohuo-android… #CyberSecurity #Android #Malware #TelegramX #Telegram

Steven Lim (@0x534c) 's Twitter Profile Photo

🤖🎣 Detecting CoPhish: OAuth Token Theft via Copilot Studio Agents securitylabs.datadoghq.com/articles/cophi… My LinkedIn connection Katie Knowles from Datadog Security Labs has surfaced a clever new OAuth phishing technique dubbed CoPhish — exploiting Microsoft Copilot Studio agents to deliver

🤖🎣 Detecting CoPhish: OAuth Token Theft via Copilot Studio Agents

securitylabs.datadoghq.com/articles/cophi…

My LinkedIn connection Katie Knowles from Datadog Security Labs has surfaced a clever new OAuth phishing technique dubbed CoPhish — exploiting Microsoft Copilot Studio agents to deliver
World Bank Digital (@wbg_digital) 's Twitter Profile Photo

From 80+ countries to hundreds of millions of lives changed. The World Bank's ID4D-G2Px Annual Report reveals a decade of progress in digital identity and government payments, and the launch of the new Digital Public Infrastructure Program.🌍 Dive in wrld.bg/nOUV50XgXhx

From 80+ countries to hundreds of millions of lives changed. The <a href="/WorldBank/">World Bank</a>'s ID4D-G2Px Annual Report reveals a decade of progress in digital identity and government payments, and the launch of the new Digital Public Infrastructure Program.🌍 Dive in wrld.bg/nOUV50XgXhx
The Shadowserver Foundation (@shadowserver) 's Twitter Profile Photo

Attention - Microsoft WSUS CVE-2025-59287 incidents! We are observing exploitation attempts based on a published POC. We have also began fingerprinting exposed WSUS instances (ports 8530/8531) with at least 2800 seen on 2025-10-25 (not necessarily vulnerable).

Attention - Microsoft WSUS CVE-2025-59287 incidents! We are observing exploitation attempts based on a published POC. We have also began fingerprinting exposed WSUS instances  (ports 8530/8531) with at least 2800 seen on 2025-10-25 (not necessarily vulnerable).
International Cyber Digest (@intcyberdigest) 's Twitter Profile Photo

🚨 BIND 9 DNS Server Vulnerable to Cache Poisoning — PoC Available Censys reports 706,000 vulnerable internet-facing instances. An off-path attacker who can race or spoof responses may inject forged address data into a resolver’s cache. Once poisoned, clients can be redirected

🚨 BIND 9 DNS Server Vulnerable to Cache Poisoning — PoC Available

Censys reports 706,000 vulnerable internet-facing instances.

An off-path attacker who can race or spoof responses may inject forged address data into a resolver’s cache.

Once poisoned, clients can be redirected
Dark Web Informer - Cyber Threat Intelligence (@darkwebinformer) 's Twitter Profile Photo

🚨🇺🇸The U.S. Secret Service conducted a card-skimming enforcement operation in Baltimore, removing 22 illegal skimming devices. cbsnews.com/baltimore/news… On October 22–23, agents joined local law enforcement to inspect 493 businesses, examining more than 3,000 point-of-sale

UgCERT (@ugcert) 's Twitter Profile Photo

The cloud isn’t automatically secure; it’s only as safe as you make it. Use strong passwords, MFA, encrypt data, check access, and back up often. Your cloud, your responsibility. UCC UCC Consumer Affairs Ministry of ICT&NG Government Citizen Interaction Centre Uganda Media Centre

Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

When the CFO walks in and you need to justify the budget for “research” Hacking simulators 1. geekprank.com/hacker/ 2. geektyper.com 3. hacker-simulator.com 4. pranx.com/hacker/ 5. hackertyper.com Pew Pew Maps A. cybermap.kaspersky.com B.

When the CFO walks in and you need to justify the budget for “research”

Hacking simulators
1. geekprank.com/hacker/
2. geektyper.com
3. hacker-simulator.com
4. pranx.com/hacker/
5. hackertyper.com

Pew Pew Maps
A. cybermap.kaspersky.com
B.
The Hacker News (@thehackersnews) 's Twitter Profile Photo

CISOs planning 2026 budgets are rethinking priorities. Data visibility & DSPM are moving from “nice-to-have” to the foundation for risk reduction, faster audits & ROI. Read: Why Data Visibility Belongs in Your 2026 Cybersecurity Budget: thn.news/data-visibilit… via

CISOs planning 2026 budgets are rethinking priorities.

Data visibility &amp; DSPM are moving from “nice-to-have” to the foundation for risk reduction, faster audits &amp; ROI.

Read: Why Data Visibility Belongs in Your 2026 Cybersecurity Budget: thn.news/data-visibilit…

via
UgCERT (@ugcert) 's Twitter Profile Photo

Beware of Drive-By Downloads! Just visiting a hacked website, pop-up ad, or fake movie site can secretly install malware on your device no clicks needed. Keep your browser & antivirus updated to stay safe online. UCC UCC Consumer Affairs Ministry of ICT&NG Government Citizen Interaction Centre Uganda Media Centre

Be Safe Online - Uganda (@besafeonlineug) 's Twitter Profile Photo

Seeing isn’t always believing anymore 👀 AI can make anyone say or do things they never did. Before you react — Pause, Verify, Think NITA-Uganda Personal Data Protection Office, Uganda Ministry of ICT&NG #BeeraKuGuard #cybersecurity #dataprotectionandprivacy

Seeing isn’t always believing anymore 👀 
AI can make anyone say or do things they never did.
Before you react — Pause, Verify, Think 

<a href="/NITAUganda1/">NITA-Uganda</a> <a href="/pdpoUG/">Personal Data Protection Office, Uganda</a> <a href="/MoICT_Ug/">Ministry of ICT&NG</a>

#BeeraKuGuard #cybersecurity #dataprotectionandprivacy
National Cybersecurity Alliance (@staysafeonline) 's Twitter Profile Photo

Save your memory for your grandkids birthdays. Use a password manager and let it remember your passwords for you. Find more cybersecurity tips in our Then & Now workbook! hubs.la/Q03Q4nLb0

Save your memory for your grandkids birthdays. Use a password manager and let it remember your passwords for you. Find more cybersecurity tips in our Then &amp; Now workbook! hubs.la/Q03Q4nLb0
UgCERT (@ugcert) 's Twitter Profile Photo

Default passwords = open doors. Many devices still use factory-set logins like admin/admin, easy targets for hackers. Always change default passwords immediately and use strong, unique ones for every device. UCC UCC Consumer Affairs Ministry of ICT&NG Government Citizen Interaction Centre Uganda Media Centre

Be Safe Online - Uganda (@besafeonlineug) 's Twitter Profile Photo

From free money to a free iPhone to a free heartbreak.....scammers never sleep Be careful of these scams: - Fake jobs - Romance traps - Spin-to-win - Fake investments - SIM swaps NITA-Uganda Personal Data Protection Office, Uganda Ministry of ICT&NG #BeeraKuGuard #cybersecurity #dataprotectionandprivacy

From free money to a free iPhone to a free heartbreak.....scammers never sleep 

Be careful of these scams: 
- Fake jobs
- Romance traps
- Spin-to-win
- Fake investments
- SIM swaps 

<a href="/NITAUganda1/">NITA-Uganda</a> <a href="/pdpoUG/">Personal Data Protection Office, Uganda</a> <a href="/MoICT_Ug/">Ministry of ICT&NG</a>

#BeeraKuGuard #cybersecurity #dataprotectionandprivacy
Hackread.com (@hackread) 's Twitter Profile Photo

Hackers are hijacking corporate #XWiki servers using flaw CVE-2025-24893 to install cryptominers and gain full server access. Patch now. 🔒 Read: hackread.com/hackers-hijack… #CyberSecurity #RCE #Cryptojacking #XWiki #InfoSec

BleepingComputer (@bleepincomputer) 's Twitter Profile Photo

Microsoft is investigating an ongoing DNS outage affecting customers worldwide, preventing them from accessing Microsoft Azure and Microsoft 365 services. bleepingcomputer.com/news/microsoft…

UgCERT (@ugcert) 's Twitter Profile Photo

Leaving your device unattended, even for a few minutes, can expose your data to prying eyes. Always lock your screen when stepping away at work, school, or public spaces. A quick lock can prevent a major breach! UCC UCC Consumer Affairs Ministry of ICT&NG Government Citizen Interaction Centre Uganda Media Centre