Hey fams 👋 I’m Yeabsira, and I’m excited to share something I’ve been working on in Cybersecurity especially in Reverse Engineering!
🚀 REX – Reverse Engineering Automation Tool
A powerful tool built to automate static malware analysis and make reverse engineering faster and easier.
Key Features:
🔍 Automated static binary analysis
📊 File metadata, entropy, strings, sections
🖥️ Simple GUI + CLI support
⚡ Fast & lightweight – built in C and Python
🔒 Designed for educational and research purposes only, safe to use and explore.
Check it out here: 👉 GitHub | LinkedIn
🚀 REX – Reverse Engineering Automation Tool
A powerful tool built to automate static malware analysis and make reverse engineering faster and easier.
Key Features:
🔍 Automated static binary analysis
📊 File metadata, entropy, strings, sections
🖥️ Simple GUI + CLI support
⚡ Fast & lightweight – built in C and Python
🔒 Designed for educational and research purposes only, safe to use and explore.
Check it out here: 👉 GitHub | LinkedIn
👏12🔥3
#NEWS
🚨 Cisco flaw already under attack: CVE-2025-20352 lets remote hackers crash systems or run code as root via SNMP.
Cisco IOS & IOS XE devices with SNMP enabled are at risk—Meraki MS390 & Catalyst 9300 included. Patch to IOS XE 17.15.4a now.
Full story: https://thehackernews.com/2025/09/cisco-warns-of-actively-exploited-snmp.html
Telegram | LinkedIn
🚨 Cisco flaw already under attack: CVE-2025-20352 lets remote hackers crash systems or run code as root via SNMP.
Cisco IOS & IOS XE devices with SNMP enabled are at risk—Meraki MS390 & Catalyst 9300 included. Patch to IOS XE 17.15.4a now.
Full story: https://thehackernews.com/2025/09/cisco-warns-of-actively-exploited-snmp.html
Telegram | LinkedIn
❤2
Forwarded from Information Systems Hub 💻🔁
🔎 Workshop Recap
Our Digital Forensics & Cyber Investigation workshop was a huge success! 🚀
A big thank you to Nehimya Mesfin for sharing his expert insights on tracing hackers, analyzing digital evidence.
The session was hosted by Eyerusalem Belay , who guided participants through interactive discussions and Q&A.
💡 Key Takeaway:Forensics is more than solving cybercrimes—it’s about combining technology, ethics, and critical thinking to protect and secure our digital world.
Thank you to everyone who joined and made this session truly impactful! 🙌
Our Digital Forensics & Cyber Investigation workshop was a huge success! 🚀
A big thank you to Nehimya Mesfin for sharing his expert insights on tracing hackers, analyzing digital evidence.
The session was hosted by Eyerusalem Belay , who guided participants through interactive discussions and Q&A.
💡 Key Takeaway:Forensics is more than solving cybercrimes—it’s about combining technology, ethics, and critical thinking to protect and secure our digital world.
Thank you to everyone who joined and made this session truly impactful! 🙌
🔥2❤1
Forwarded from Information Systems Hub 💻🔁
🎥 Missed the session? Don’t worry! We have a video recording available for you to catch up.
🤝2❤1
🎉 To the burnouts and endless classes!💀
Melkam yetemert gize class lejemerachu hulu 🥂
Melkam yetemert gize class lejemerachu hulu 🥂
🔥14
#AdwaCTF #Adwa_Night
👨💻 Get ready... a little fun is waiting for you at the end of this week! 🥁🥁
Telegram | LinkedIn
👨💻 Get ready... a little fun is waiting for you at the end of this week! 🥁🥁
Telegram | LinkedIn
🔥10❤3👏2
Forwarded from INSA Cyber Talent Center
የCTF ውድድር ጥሪ!
የኢንፎርሜሽን መረብ ደህንነት አስተዳደር (ኢመደአ)
6ኛው ሀገር አቀፍ የሳይበር ደህንነት ወርን ምክንያት በማድረግ የተዘጋጀ የCapture The Flag (CTF) ውድድር!!
የሳይበር ደህንነት ክህሎትዎን የሚፈትሹበት እና ከሌሎች የዘርፉ ባለሙያዎች ጋር የሚወዳደሩበት መድረክ !!
ይወዳደሩ! ይሸለሙ!
ለመመዝገብ፡- ከታች ያለውን QR ኮድ ስካን ያድርጉ
ቦታ የኢንፎርሜሽን መረብ ደህንነት አስተዳደር (ኢመደአ) በአካል
ቀን ጥቅምት 1/2018ዓ.ም
ከ ጠዋቱ 2፡ 30 በአካል
የኢንፎርሜሽን መረብ ደህንነት አስተዳደር (ኢመደአ)
6ኛው ሀገር አቀፍ የሳይበር ደህንነት ወርን ምክንያት በማድረግ የተዘጋጀ የCapture The Flag (CTF) ውድድር!!
የሳይበር ደህንነት ክህሎትዎን የሚፈትሹበት እና ከሌሎች የዘርፉ ባለሙያዎች ጋር የሚወዳደሩበት መድረክ !!
ይወዳደሩ! ይሸለሙ!
ለመመዝገብ፡- ከታች ያለውን QR ኮድ ስካን ያድርጉ
ቦታ የኢንፎርሜሽን መረብ ደህንነት አስተዳደር (ኢመደአ) በአካል
ቀን ጥቅምት 1/2018ዓ.ም
ከ ጠዋቱ 2፡ 30 በአካል
INSA Cyber Talent Center
የCTF ውድድር ጥሪ! የኢንፎርሜሽን መረብ ደህንነት አስተዳደር (ኢመደአ) 6ኛው ሀገር አቀፍ የሳይበር ደህንነት ወርን ምክንያት በማድረግ የተዘጋጀ የCapture The Flag (CTF) ውድድር!! የሳይበር ደህንነት ክህሎትዎን የሚፈትሹበት እና ከሌሎች የዘርፉ ባለሙያዎች ጋር የሚወዳደሩበት መድረክ !! ይወዳደሩ! ይሸለሙ! ለመመዝገብ፡- ከታች ያለውን QR ኮድ ስካን ያድርጉ ቦታ የኢንፎርሜሽን መረብ…
Adwa CTF "Hack Night" is postponed to the next week #Friday due to INSA's CTF program.
Good Luck for all participants!! 🔥🇪🇹
#AdwaCTF #HackNight
Good Luck for all participants!! 🔥🇪🇹
#AdwaCTF #HackNight
👍8
#AWARENESS
How to Defend Phishing Attack 👨💻
Phishing attacks target your "trust". Criminals pretend to be banks, your insurance company, or colleagues to steal your sensitive data and money.
📍Why it Matters?
• One click can give hackers access to your accounts
• They use stolen info to move money, steal identities, or blackmail you
• Most breaches start with a phishing message
📍How it Happens?
• You get a message that looks real and urgent
• It asks you to click a link, open a file, or confirm details
• The fake site captures your login info or infects your device
✅ How to Protect yourself?
• Verify the sender’s source address or number
• Do not click links from unexpected messages
• Go directly to official websites to cross-check
• Never share your passwords or OTPs
"Stay Alert. Think Before you Click!"
Telegram | LinkedIn
How to Defend Phishing Attack 👨💻
Phishing attacks target your "trust". Criminals pretend to be banks, your insurance company, or colleagues to steal your sensitive data and money.
📍Why it Matters?
• One click can give hackers access to your accounts
• They use stolen info to move money, steal identities, or blackmail you
• Most breaches start with a phishing message
📍How it Happens?
• You get a message that looks real and urgent
• It asks you to click a link, open a file, or confirm details
• The fake site captures your login info or infects your device
✅ How to Protect yourself?
• Verify the sender’s source address or number
• Do not click links from unexpected messages
• Go directly to official websites to cross-check
• Never share your passwords or OTPs
"Stay Alert. Think Before you Click!"
Telegram | LinkedIn
❤3👍2
🚨 Imagine you received this email:
"Your account has been flaged for suspicious activity. Please login immediately to verify your identity or your account will be suspended. [Click here]" What would you do?
"Your account has been flaged for suspicious activity. Please login immediately to verify your identity or your account will be suspended. [Click here]" What would you do?
Anonymous Poll
4%
A. Click the link right away to protect my account
66%
B. Check the sender’s email address first
4%
C. Ignore it -- it's probably fake
26%
D. Report it as phishing and delete it
#AWARENESS
Password Safety & 2FA 🔐
Many lose accounts due to weak or reused passwords. Hackers don’t always break in; they log in with your own password. 👨💻
📍How Hackers Get Your Password:
• Guessing simple ones: “12345678,” “password123”
• Buying leaked passwords
• Phishing with fake emails/links
📍Why It’s Dangerous:
• One password can risk all accounts
• Hackers can reset passwords via email
• They can read messages, steal money, or impersonate you
📍How to Create a Strong Password:
• Use 12+ characters
• Mix letters, numbers, and symbols
• Avoid names, birthdays, or obvious patterns like “password123”
✅ Use a Password Manager:
• Stores and generates strong passwords
• Checks weak passwords
✅ Turn on 2FA:
• Adds a second login step
• Even with your password, hackers can’t log in without the code
"A strong password keeps you safe. 2FA makes you safer."
Telegram | LinkedIn
Password Safety & 2FA 🔐
Many lose accounts due to weak or reused passwords. Hackers don’t always break in; they log in with your own password. 👨💻
📍How Hackers Get Your Password:
• Guessing simple ones: “12345678,” “password123”
• Buying leaked passwords
• Phishing with fake emails/links
📍Why It’s Dangerous:
• One password can risk all accounts
• Hackers can reset passwords via email
• They can read messages, steal money, or impersonate you
📍How to Create a Strong Password:
• Use 12+ characters
• Mix letters, numbers, and symbols
• Avoid names, birthdays, or obvious patterns like “password123”
✅ Use a Password Manager:
• Stores and generates strong passwords
• Checks weak passwords
✅ Turn on 2FA:
• Adds a second login step
• Even with your password, hackers can’t log in without the code
"A strong password keeps you safe. 2FA makes you safer."
Telegram | LinkedIn
❤2
Forwarded from INSA - የኢንፎርሜሽን መረብ ደህንነት አስተዳደር - INSA
የሳይበር ደህንነት ግንዛቤዎን የሚፈትሹበት እና የሚሸለሙበት ውድድር እነሆ!!
• በየቀኑ የአምስት መቶ ብር ካርድ፤
• በየሳምንቱ የስማር ሰአት ሽልማት፤ እንዲሁም
• በጥቅምት ወር መጨረሻ የላፕቶፕ ሽልማት
6ተኛውን ሀገር አቀፍ የሳይበር ደህንነት ወር ምክንያት በማድረግ ሁሉንም የሕብረተሰብ ክፍል የሚያሳትፍና የሚያሸልም የሳይበር ደህንነት የጥያቄና መልስ ውድድር እንዲሁም የጌም ጨዋታ ከጥቅምት 1 እስከ 30/2018 ዓ/ም ድረስ ተዘጋጅቷል፡፡ እርስዎም ጥያቄዎችን በመመለስ እንዲሁም የቀረቡ ጌሞችን በመጫወት ተሸላሚ ይሁኑ!
በጥያቄና መልስ ውድድሩ ላይ ለመሳተፍ እንዲሁም የቀረቡ ጌሞችን ለመጫወትና ለመሸለም ከታች ያለውን QR Code ስካን ያድርጉ ወይም https://lottery.insa.gov.et/signup ይጠቀሙ፡፡
“የሳይበር ደህንነት - የዲጂታል ኢትዮጵያ መሰረት”
#6ተኛው_ሀገር_አቀፍ_የሳይበር_ደህንነት_ወር
ከጥቅምት 1 እስከ 30/2018 ዓ/ም
#የኢንፎርሜሽን_መረብ_ደህንነት_አስተዳደር
#insa #6_Cyber_Security_Month #Ethiopia #DigitalEthiopa #CyberSecurity
• በየቀኑ የአምስት መቶ ብር ካርድ፤
• በየሳምንቱ የስማር ሰአት ሽልማት፤ እንዲሁም
• በጥቅምት ወር መጨረሻ የላፕቶፕ ሽልማት
6ተኛውን ሀገር አቀፍ የሳይበር ደህንነት ወር ምክንያት በማድረግ ሁሉንም የሕብረተሰብ ክፍል የሚያሳትፍና የሚያሸልም የሳይበር ደህንነት የጥያቄና መልስ ውድድር እንዲሁም የጌም ጨዋታ ከጥቅምት 1 እስከ 30/2018 ዓ/ም ድረስ ተዘጋጅቷል፡፡ እርስዎም ጥያቄዎችን በመመለስ እንዲሁም የቀረቡ ጌሞችን በመጫወት ተሸላሚ ይሁኑ!
በጥያቄና መልስ ውድድሩ ላይ ለመሳተፍ እንዲሁም የቀረቡ ጌሞችን ለመጫወትና ለመሸለም ከታች ያለውን QR Code ስካን ያድርጉ ወይም https://lottery.insa.gov.et/signup ይጠቀሙ፡፡
“የሳይበር ደህንነት - የዲጂታል ኢትዮጵያ መሰረት”
#6ተኛው_ሀገር_አቀፍ_የሳይበር_ደህንነት_ወር
ከጥቅምት 1 እስከ 30/2018 ዓ/ም
#የኢንፎርሜሽን_መረብ_ደህንነት_አስተዳደር
#insa #6_Cyber_Security_Month #Ethiopia #DigitalEthiopa #CyberSecurity
🔥1🎉1