YourNextCISO Profile Banner
Nde Profile
Nde

@YourNextCISO

Followers
394
Following
13K
Media
173
Statuses
2K

SOC Analyst || 💙 Blue Team journey || #cybersecurity👨🏿‍💻

Douala, Cameroon.
Joined November 2022
Don't wanna be here? Send us removal request.
@YourNextCISO
Nde
6 hours
RT @ireteeh: We launched CyBlack SOC Academy last year, and we are proud to share that we have recorded 18 jobs so far. Application for t….
0
91
0
@YourNextCISO
Nde
2 days
RT @akintunero: If you missed the session this morning:
0
4
0
@YourNextCISO
Nde
2 days
RT @Mydeen4u: Please help repost and like when you see this🙏.
0
17
0
@YourNextCISO
Nde
6 days
RT @TisforTolu: Cybersecurity is broad. Before you start thinking “ethical hacker” or “SOC analyst,” pause. The real first step? Underst….
0
274
0
@YourNextCISO
Nde
6 days
RT @Dghost_Ninja: Got my write-up published on a DevSecOps page. LFG! 💪🏽🔥
Tweet media one
Tweet media two
0
16
0
@YourNextCISO
Nde
6 days
RT @Cyb3rMonk: 🚨Bad news for defenders, good news for red teamers:.Linkable token identifiers in Entra ID are useful only in an AiTM scenar….
0
19
0
@YourNextCISO
Nde
8 days
RT @T3chFalcon: Scheduled Task Persistence via SharpPersist + Cobalt Strike. Runs a Base64-encoded PowerShell payload.Executes hourly via….
0
31
0
@YourNextCISO
Nde
8 days
RT @I_Am_Jakoby: Added a new tool to:. ⚠️Please Use Responsibly⚠️. You can use this to instantly generate an obfusc….
0
411
0
@YourNextCISO
Nde
8 days
RT @T3chFalcon: Everyone knows certutil.exe. But certreq.exe?. Native to Windows.Signed by Microsoft.HTTP POST support.Can exfil small file….
Tweet card summary image
lolbas-project.github.io
CertReq.exe is a living-of-the-land file containing unexpected functionality that can be abused by attackers; this page lists all its use cases.
0
64
0
@YourNextCISO
Nde
12 days
RT @T3chFalcon: Decrypting Edge Browser Passwords. Modern Edge/Chrome encrypt saved logins with AES-GCM. Step 1: Extract AES key from the….
0
48
0
@YourNextCISO
Nde
12 days
RT @bluecapesec: 🔷 Want to learn real Windows forensics?.Join our live walkthrough of a real-world compromise + see what a structured fore….
0
2
0
@YourNextCISO
Nde
15 days
0
2
0
@YourNextCISO
Nde
15 days
RT @OtterHacker: Okta chained with Azure with auto MFA subscription for Okta and frame-buster bypass to perform Bitb !. Evilginx is really….
0
53
0
@YourNextCISO
Nde
15 days
RT @Dghost_Ninja: Hi @hackSultan . My name is Samuel. A cybersecurity enthusiast specialized in Application Security Engineering and Penetr….
0
63
0
@YourNextCISO
Nde
15 days
RT @Dghost_Ninja: Really need a role for real. If you've an opening or your organization is hiring, please just reach out. So tired of this….
0
20
0
@YourNextCISO
Nde
15 days
RT @inversecos: Become a contributor at XINTRA @XintraOrg 🔎. We're looking for RED and BLUE team contributors . 🔴Red Team – Emulate real AP….
0
20
0
@YourNextCISO
Nde
15 days
RT @mathias_fuchs: 🕵️‍♂️ How do attackers ghost past your EDR?. New blog post dives deep into evasion tricks—LOLBins, memory games, syscall….
Tweet card summary image
medium.com
Endpoint Detection and Response (EDR) solutions are the cyber sentinels on our endpoints — vigilant guards that monitor system behavior…
0
3
0
@YourNextCISO
Nde
15 days
RT @mathias_fuchs: 🗓 Logs lie. Prefetch tattles. ShimCache whispers. Timestamps dance. Building timelines in DFIR isn’t just science—it’s….
Tweet card summary image
medium.com
Building a coherent DFIR timeline can feel like wrangling the Greek god of time (Chronos) while fending off complete chaos. Timelines are…
0
5
0
@YourNextCISO
Nde
15 days
RT @inversecos: Red teamers, no need to “pull” clipboard data when Windows already saves it all on disk for you in a neat little file 🗿. (i….
0
321
0