Digital Ethiopia 2025 has been successfully completed, achieving its intended goals to a remarkable extent. Today officially marks the launch of Digital Ethiopia 2030.
I was honored to attend this landmark national event, graciously hosted by H.E. Prime Minister Abiy Ahmed, alongside senior government leaders and high-level ministers. Being invited to participate in such an important moment for the country’s future was truly a privilege.
The Digital Ethiopia 2030 strategy places strong emphasis on expanding digital accessibility, creating equal opportunities for all citizens, and strengthening trust between citizens and institutions. These pillars form the core foundation of the strategy.
To achieve these objectives, major efforts will focus on expanding public digital infrastructure and ensuring that digital technologies remain human-centered—empowering citizens and improving everyday life. This vision aligns closely with the government’s broader reform agenda to reduce bureaucracy and translate ambitious national strategies into real, measurable impact.
Grateful to be part of this historic milestone in Ethiopia’s digital transformation journey. 🇪🇹🚀
#DigitalEthiopia2030
#DigitalEthiopia
#DigitalTransformation
#NationalVision
#Innovation
#Leadership
#FutureReadyEthiopia
I was honored to attend this landmark national event, graciously hosted by H.E. Prime Minister Abiy Ahmed, alongside senior government leaders and high-level ministers. Being invited to participate in such an important moment for the country’s future was truly a privilege.
The Digital Ethiopia 2030 strategy places strong emphasis on expanding digital accessibility, creating equal opportunities for all citizens, and strengthening trust between citizens and institutions. These pillars form the core foundation of the strategy.
To achieve these objectives, major efforts will focus on expanding public digital infrastructure and ensuring that digital technologies remain human-centered—empowering citizens and improving everyday life. This vision aligns closely with the government’s broader reform agenda to reduce bureaucracy and translate ambitious national strategies into real, measurable impact.
Grateful to be part of this historic milestone in Ethiopia’s digital transformation journey. 🇪🇹🚀
#DigitalEthiopia2030
#DigitalEthiopia
#DigitalTransformation
#NationalVision
#Innovation
#Leadership
#FutureReadyEthiopia
🎉5👀2❤1
Forwarded from INSA Cyber Talent Center
የኢንሳ ሳይበር ታለንት የኦላይን እና ቅዳሜ እና እሁድ ስልጠና ለመስጠት ምዝገባ በቅርብ እንጀምራለን። በተለይ በሳይበር ደህንነት እና ዴቨሎፕመንት ጀማሪ እና ኢንትርሚዲዬት የሆናችሁ ያዘጋንላችሁ የሶስት ወር ስልጠና ስላለ ምዝገባው እንዳያመልጣችሁ። ላልሰሙት ጓደኞቻችሁም መረጃውን አድርሷቸው። በትርፍ ጊዚዮ እና በአሉበት ሆነው የሳይበር ደህንነት ባለሙያ የሚያደርጎትን ስልጠና በነጻ ይውሰዱ።
@insactc
@insactc
🔥7
#LINUX
When a process is in a "Zombie" (Z) state in the process table, which of the following statements is true regarding system resources?
When a process is in a "Zombie" (Z) state in the process table, which of the following statements is true regarding system resources?
Anonymous Quiz
30%
A) The process is still consuming CPU cycles but no RAM
16%
B) The process has been moved to swap space awaiting a SIGCONT signal
35%
C) The process consumes no CPU or memory, but retains an entry in the process table
19%
D) The kernel is currently dumping the process core to /var/lib/systemd/coredump
❤1
Forwarded from INSA Cyber Talent Center
This media is not supported in your browser
VIEW IN TELEGRAM
Happening Tonight... 🔥
We will have our Malware Analysis 👾 Live Session tonight with a SPECIAL GUEST from INSA.
🎤 Host: INSA CYBER TALENT CENTER (@insactc)
🕐 Time: 1:50 LT (ToNight)
Share with your friends ⚡️
@insactc | @cteinsa
#LiveSession #CyberSecurity #MalwareAnalysis
We will have our Malware Analysis 👾 Live Session tonight with a SPECIAL GUEST from INSA.
🎤 Host: INSA CYBER TALENT CENTER (@insactc)
🕐 Time: 1:50 LT (ToNight)
Share with your friends ⚡️
@insactc | @cteinsa
#LiveSession #CyberSecurity #MalwareAnalysis
❤3
Forwarded from INSA Cyber Talent Center
🔴Today we diving deep into one of the basis of the security world: "Hacking: The Art of Exploitation" (2nd Edition) by Jon Erickson.
💥We’ll be breaking down:
▶️ The Book Review: Why this classic is still relevant for developers today.
▶️Hollywood vs. Reality: We’re analyzing famous movie hacking scenes. Are they even possible, or just flashy graphics?
▶️The "No Discipline" Myth: Movies often portray hackers as chaotic or undisciplined. We’ll discuss why real-world hacking actually requires extreme patience, logic, and strict discipline.
🕒 Event Details
📗 Topic: Book Review & Hacking Ethics.
📚Book: Hacking: The Art of Exploitation
📌Time: Today at 2:00 LT
Whether you are a coder looking to secure your apps or a tech enthusiast curious about the "dark side," you don't want to miss this.
See you in the stream!
@insactc
@cteinsa
#LiveSession #PersonalDevelopment #Midset #Book
💥We’ll be breaking down:
▶️ The Book Review: Why this classic is still relevant for developers today.
▶️Hollywood vs. Reality: We’re analyzing famous movie hacking scenes. Are they even possible, or just flashy graphics?
▶️The "No Discipline" Myth: Movies often portray hackers as chaotic or undisciplined. We’ll discuss why real-world hacking actually requires extreme patience, logic, and strict discipline.
🕒 Event Details
📗 Topic: Book Review & Hacking Ethics.
📚Book: Hacking: The Art of Exploitation
📌Time: Today at 2:00 LT
Whether you are a coder looking to secure your apps or a tech enthusiast curious about the "dark side," you don't want to miss this.
See you in the stream!
@insactc
@cteinsa
#LiveSession #PersonalDevelopment #Midset #Book
👍2
Forwarded from ThreatX Security (Dawit Peter)
ThreatX Security Internship 2026 is OPEN!
We are a Top 120 AI Startup in Ethiopia building real cybersecurity & AI systems and we’re looking for talent.
Open roles:
• Software Developers
• Cybersecurity
• AI Specialists
• Graphic Designers
• Video Editors
- Work on real products
- Get international exposure
- Grow into global opportunities
📩 Apply now:
Send your CV or portfolio to threatxs@gmail.com
Comment “Intern” to get started.
#ThreatX #Cybersecurity #AI #Internship2026
We are a Top 120 AI Startup in Ethiopia building real cybersecurity & AI systems and we’re looking for talent.
Open roles:
• Software Developers
• Cybersecurity
• AI Specialists
• Graphic Designers
• Video Editors
- Work on real products
- Get international exposure
- Grow into global opportunities
📩 Apply now:
Send your CV or portfolio to threatxs@gmail.com
Comment “Intern” to get started.
#ThreatX #Cybersecurity #AI #Internship2026
🔥3❤1
Forwarded from INSA Cyber Talent Center
🔴 LIVE SESSION TONIGHT 🔴
Topic: Introduction to Cryptography & Secure Communication
⏰ Today | 2:00 LT (Night)
📍 On INSA Cyber Talent Center Channel @insactc
Join us for a hands-on live session where we break down the fundamentals of cryptography, explore how secure systems work, and understand the core mechanisms behind modern cybersecurity.
⚡️ Session highlights:
* Introduction to Cryptography: why it matters in cybersecurity
* Symmetric vs. Asymmetric Encryption: concepts & real-world use cases
* Key Exchange Protocols: understanding Diffie-Hellman
* Hash Functions: integrity, authentication, and applications
* Public Key Infrastructure (PKI): certificates and trust models
* Interactive Q&A on encryption, keys, and secure communication
@insactc
@cteinsa
#INSA #LiveSession #Cryptography #CyberSecurity #Encryption #PKI #InfoSec
Topic: Introduction to Cryptography & Secure Communication
⏰ Today | 2:00 LT (Night)
📍 On INSA Cyber Talent Center Channel @insactc
Join us for a hands-on live session where we break down the fundamentals of cryptography, explore how secure systems work, and understand the core mechanisms behind modern cybersecurity.
⚡️ Session highlights:
* Introduction to Cryptography: why it matters in cybersecurity
* Symmetric vs. Asymmetric Encryption: concepts & real-world use cases
* Key Exchange Protocols: understanding Diffie-Hellman
* Hash Functions: integrity, authentication, and applications
* Public Key Infrastructure (PKI): certificates and trust models
* Interactive Q&A on encryption, keys, and secure communication
📢 Happening today at 2:00 LT night. Don’t miss it!
@insactc
@cteinsa
#INSA #LiveSession #Cryptography #CyberSecurity #Encryption #PKI #InfoSec
❤1🔥1
Forwarded from ADWA CTF
📂Useful Resources For Cryptography
The Science of Codes: An Intro to Cryptography
https://www.youtube.com/watch?v=-yFZGF8FHSg
Cryptography: Crash Course Computer Science
https://www.youtube.com/watch?v=jhXCTbFnK8o
Advanced:
Cryptography for Beginners - Full Python Course (SHA-256, AES, RSA, Passwords)
https://www.youtube.com/watch?v=kb_scuDUHls
Website:
cryptohack.org
@insactc @cteinsa
#CyberSecurity #Cryptography
The Science of Codes: An Intro to Cryptography
https://www.youtube.com/watch?v=-yFZGF8FHSg
Cryptography: Crash Course Computer Science
https://www.youtube.com/watch?v=jhXCTbFnK8o
Advanced:
Cryptography for Beginners - Full Python Course (SHA-256, AES, RSA, Passwords)
https://www.youtube.com/watch?v=kb_scuDUHls
Website:
cryptohack.org
@insactc @cteinsa
#CyberSecurity #Cryptography
🔥6❤1
Forwarded from ADWA CTF (𝗬𝗘𝗔𝗕𝗦𝗜𝗥𝗔)
እንኳን ለጌታችን ለመድሀኒታች ለኢየሱስ ክርስቶስ የልደት በዓል በሰላም አደረሳችሁ።
በዐሉ የሰላም እና የፍቅር ይሁንላችሁ።🙏❤️
በዐሉ የሰላም እና የፍቅር ይሁንላችሁ።🙏❤️
❤12🙏2❤🔥1🤩1
Forwarded from INSA - የኢንፎርሜሽን መረብ ደህንነት አስተዳደር - INSA
ማይክሮሶፍት የጥር ወር የደህንነት ዝመናዉ 114 የደህንነት ክፍተቶችን መዝጋቱን አስታወቀ
ማይክሮሶፍት እ.ኤ.አ. የ2026 የመጀመሪያው በሆነው የጥር ወር የደህንነት ማሻሻያ ፕሮግራሙ፣ በአጠቃላይ 114 የደህንነት ክፍተቶችን #CVEs መዝጋቱን አስታወቀ።
ከእነዚህም መካከል ሦስቱ "ዜሮ-ዴይ" #Zero_day የተሰኙና ከፍተኛ ስጋት የደቀኑ መሆናቸው ተገልጿል።
በማሻሻያው ውስጥ ከተካተቱት ክፍተቶች መካከል CVE-2026-20805 የተሰኘውና በዊንዶውስ #Desktop_Window_Manager ላይ የሚገኘው ብልሽት በአሁኑ ሰዓት በአጥቂዎች እጅ ወድቆ ጥቃት እየተፈጸመበት መሆኑ ተረጋግጧል።
ይህ ክፍተት የመረጃ መንታፊዎች የሲስተሙን የደህንነት መከላከያ ሰብረው በመግባት የኮምፒውተሩን ሚስጥራዊ መረጃዎች እንዲሰርቁ መንገድ የከፈተ መሆኑ ታዉቋል።
ሌላኛውና ትልቅ ስጋት የሆነው CVE-2026-21265 የተሰኘው ክፍተት ነው። ይህ ችግር እ.ኤ.አ. ከ2012 እስከ 2025 ባሉት ዓመታት የተገዙ ኮምፒውተሮችን በሙሉ የሚመለከት ሲሆን፣ የዊንዶውስ የደህንነት ሰርተፍኬቶች በዚህ ዓመት ሰኔ እና ጥቅምት ወር ላይ የሚያበቁ በመሆኑ የሚፈጠር እንደሆነም ታዉቋል።
"ይህ ክፍተት አንድ ጊዜ ሶፍትዌር በማዘመን ብቻ የሚፈታ አለመሆኑንና የኮምፒውተሩን #Firmware (BIOS) ማዘመንንና ጥንቃቄ የተሞላበት ክትትልን ይጠይቃል ተብሏል።
በተጨማሪም፣ ማይክሮሶፍት ላለፉት 20 ዓመታት በዊንዶውስ ውስጥ የቆዩ የ #Agere_Modem ድራይቨሮችን አስወግዷል።
እነዚህ ድራይቨሮች በዘመናዊ ኮምፒውተሮች ላይ በብዛት ባይገኙም፣
ተጨማሪ ለማንበብ፡- https://web.facebook.com/INSA.ETHIOPIA
ማይክሮሶፍት እ.ኤ.አ. የ2026 የመጀመሪያው በሆነው የጥር ወር የደህንነት ማሻሻያ ፕሮግራሙ፣ በአጠቃላይ 114 የደህንነት ክፍተቶችን #CVEs መዝጋቱን አስታወቀ።
ከእነዚህም መካከል ሦስቱ "ዜሮ-ዴይ" #Zero_day የተሰኙና ከፍተኛ ስጋት የደቀኑ መሆናቸው ተገልጿል።
በማሻሻያው ውስጥ ከተካተቱት ክፍተቶች መካከል CVE-2026-20805 የተሰኘውና በዊንዶውስ #Desktop_Window_Manager ላይ የሚገኘው ብልሽት በአሁኑ ሰዓት በአጥቂዎች እጅ ወድቆ ጥቃት እየተፈጸመበት መሆኑ ተረጋግጧል።
ይህ ክፍተት የመረጃ መንታፊዎች የሲስተሙን የደህንነት መከላከያ ሰብረው በመግባት የኮምፒውተሩን ሚስጥራዊ መረጃዎች እንዲሰርቁ መንገድ የከፈተ መሆኑ ታዉቋል።
ሌላኛውና ትልቅ ስጋት የሆነው CVE-2026-21265 የተሰኘው ክፍተት ነው። ይህ ችግር እ.ኤ.አ. ከ2012 እስከ 2025 ባሉት ዓመታት የተገዙ ኮምፒውተሮችን በሙሉ የሚመለከት ሲሆን፣ የዊንዶውስ የደህንነት ሰርተፍኬቶች በዚህ ዓመት ሰኔ እና ጥቅምት ወር ላይ የሚያበቁ በመሆኑ የሚፈጠር እንደሆነም ታዉቋል።
"ይህ ክፍተት አንድ ጊዜ ሶፍትዌር በማዘመን ብቻ የሚፈታ አለመሆኑንና የኮምፒውተሩን #Firmware (BIOS) ማዘመንንና ጥንቃቄ የተሞላበት ክትትልን ይጠይቃል ተብሏል።
በተጨማሪም፣ ማይክሮሶፍት ላለፉት 20 ዓመታት በዊንዶውስ ውስጥ የቆዩ የ #Agere_Modem ድራይቨሮችን አስወግዷል።
እነዚህ ድራይቨሮች በዘመናዊ ኮምፒውተሮች ላይ በብዛት ባይገኙም፣
ተጨማሪ ለማንበብ፡- https://web.facebook.com/INSA.ETHIOPIA
🤯3❤1
🛑 URGENT: Microsoft rushed out out-of-band fixes for an actively exploited Office zero-day.
CVE-2026-21509 (CVSS 7.8) lets attackers bypass Office security using a malicious file that must be opened by the victim.
🔗 Details → https://thehackernews.com/2026/01/microsoft-issues-emergency-patch-for.html
@codeNcrax
@adwactf
CVE-2026-21509 (CVSS 7.8) lets attackers bypass Office security using a malicious file that must be opened by the victim.
🔗 Details → https://thehackernews.com/2026/01/microsoft-issues-emergency-patch-for.html
@codeNcrax
@adwactf
👍2👀1
