<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security Awareness - osintafrica</title>
	<atom:link href="https://www.osintafrica.net/category/security-awareness/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.osintafrica.net</link>
	<description>intelligency blog</description>
	<lastBuildDate>Fri, 07 Feb 2025 19:46:19 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2023/05/cropped-osintafrica-1.jpg?fit=32%2C32&#038;ssl=1</url>
	<title>Security Awareness - osintafrica</title>
	<link>https://www.osintafrica.net</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">221010672</site>	<item>
		<title>What is OSINT ?</title>
		<link>https://www.osintafrica.net/what-is-osint/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=what-is-osint</link>
		
		<dc:creator><![CDATA[Bangaly Koita]]></dc:creator>
		<pubDate>Fri, 07 Feb 2025 19:19:06 +0000</pubDate>
				<category><![CDATA[Main News]]></category>
		<category><![CDATA[Security Awareness]]></category>
		<category><![CDATA[Security Webcast]]></category>
		<category><![CDATA[Cyber Kill Chain]]></category>
		<category><![CDATA[Cyber Threat Intelligence]]></category>
		<category><![CDATA[osint]]></category>
		<category><![CDATA[OSINT Advantages]]></category>
		<category><![CDATA[OSINT FRAMEWORK]]></category>
		<category><![CDATA[OSINT Report]]></category>
		<category><![CDATA[The Diamond Model of Intrusion Analysis]]></category>
		<guid isPermaLink="false">https://www.osintafrica.net/?p=857</guid>

					<description><![CDATA[<p>OSINT means Open-Source Intelligence. It is a set of tools that are available for everyone...</p>
<p>The post <a href="https://www.osintafrica.net/what-is-osint/">What is OSINT ?</a> first appeared on <a href="https://www.osintafrica.net">osintafrica</a>.</p>]]></description>
										<content:encoded><![CDATA[<p><strong>OSINT</strong> means Open-Source Intelligence. It is a set of tools that are available for everyone and everywhere.</p>
<p><strong>OSINT</strong> is used in many different areas such as:</p>
<ul>
<li><strong>Cyber Threat Intelligence</strong></li>
<li><strong>Human Intelligence</strong></li>
<li><strong>Political Intelligence</strong></li>
<li><strong>Journalist Intelligence</strong></li>
<li><strong>And others.</strong></li>
</ul>
<p>O<strong>SINT</strong> allows to collect any type of data available online and analyze it. The <strong>OSINT cycle</strong> is:</p>
<ul>
<li><strong>Data collection</strong></li>
<li><strong>Data Analysis</strong></li>
<li><strong>Report (Documentation and Recommendations)</strong></li>
</ul>
<p>The <strong>OSINT Report</strong> depends on which area you are using OSINT. For example in Cyber Threat Intelligence (<a href="https://www.osintafrica.net/why-do-we-need-a-cyber-threat-intelligence/">Why do we need a Cyber Threat Intelligence? &#8211; osintafrica</a>), OSINT report can be writing following one of the models <strong>CYBER KILL CHAIN or The Diamond Model</strong> of Intrusion Analysis, more details about the models can be found here <strong><a href="https://www.osintafrica.net/three-attacks-frameworks-that-cyber-security-members-should-know/">Three attacks frameworks that Cyber Security members should know osintafrica. </a></strong></p>
<p><strong>OSINT framework</strong> tools are available and easy to find online.</p>
<p>Some of them are:</p>
<p><a href="https://osintframework.com/">OSINT Framework</a></p>
<p><a href="https://start.me/p/wMdQMQ/tools">Tools &#8211; Start.me</a></p>
<p><a href="https://tools.myosint.training/">My OSINT Training&#8217;s Tools</a></p>
<p><strong>Advantages of using OSINT:</strong></p>
<p>OSINT has many advantages such as many <strong>applications are free and accessible online</strong>, <strong>data available anywhere</strong> but the most important for us, are the following:</p>
<ul>
<li><strong>Detect Threats</strong></li>
<li><strong>Vulnerabilities</strong></li>
<li><strong>Information lookup</strong></li>
<li><strong>Data breached identification</strong></li>
</ul>
<p>Anything that has advantages, has inconveniences as well.</p>
<p><strong>OSINT</strong> does have some.</p>
<p><b>OSINT </b><b>Inconveniences:</b></p>
<p>Data can be query by anyone online</p>
<p>PII data accessible online</p>
<p>Vulnerability and threats are identifiable online</p>
<p>Data breached data are accessible on different platform (Dark Web, Hacking forum , OSINT tools and others ..).</p>
<p>OSINT tools can be vectors of attack.</p>
<p>The privacy concerning OSINT , the privacy concerns is quite similar to GDPR regulation requirements, such as collecting only information related to your investigation, having authorization to collect the data (PII or IP) and others.</p>
<p class="graf graf--p">OSINT is very useful, like said before, the tools are available for anyone to use. You can start using it by looking up some information related to your self. Do not forget about Privacy related to OSINT.</p>
<div class="saboxplugin-wrap" itemtype="http://schema.org/Person" itemscope itemprop="author"><div class="saboxplugin-tab"><div class="saboxplugin-gravatar"><img decoding="async" src="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2023/05/cropped-osintafrica-1.jpg?fit=100%2C100&#038;ssl=1" srcset="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2023/05/cropped-osintafrica-1.jpg?fit=200%2C200&#038;ssl=1 2x" width="100" height="100" alt="Bangaly Koita" class="avatar avatar-100 wp-user-avatar wp-user-avatar-100 photo avatar-default" /></div><div class="saboxplugin-authorname"><a href="https://www.osintafrica.net/author/admin/" class="vcard author" rel="author"><span class="fn">Bangaly Koita</span></a></div><div class="saboxplugin-desc"><div itemprop="description"><p>Bangaly Koita is a SOC Analyst and  Cyber Security researcher . As a passionate in cyber security,  he spends most of the time  writing articles and making videos online to share his knowledge and experience to the vast community of IT but in general Cyber Security. Feel free to contact me in case.</p>
</div></div><div class="saboxplugin-web "><a href="https://osintafrica.net" target="_self" >osintafrica.net</a></div><div class="clearfix"></div><div class="saboxplugin-socials "><a title="Linkedin" target="_blank" href="https://www.linkedin.com/in/bangaly-koita-68b8b912a/" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-linkedin" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M100.3 480H7.4V180.9h92.9V480zM53.8 140.1C24.1 140.1 0 115.5 0 85.8 0 56.1 24.1 32 53.8 32c29.7 0 53.8 24.1 53.8 53.8 0 29.7-24.1 54.3-53.8 54.3zM448 480h-92.7V334.4c0-34.7-.7-79.2-48.3-79.2-48.3 0-55.7 37.7-55.7 76.7V480h-92.8V180.9h89.1v40.8h1.3c12.4-23.5 42.7-48.3 87.9-48.3 94 0 111.3 61.9 111.3 142.3V480z"></path></svg></span></a></div></div></div><p>The post <a href="https://www.osintafrica.net/what-is-osint/">What is OSINT ?</a> first appeared on <a href="https://www.osintafrica.net">osintafrica</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">857</post-id>	</item>
		<item>
		<title>LE BYOD et les organisations en Afrique</title>
		<link>https://www.osintafrica.net/le-byod-et-les-organisations-en-afrique/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=le-byod-et-les-organisations-en-afrique</link>
		
		<dc:creator><![CDATA[Bangaly Koita]]></dc:creator>
		<pubDate>Mon, 16 Jan 2023 22:38:59 +0000</pubDate>
				<category><![CDATA[Security Awareness]]></category>
		<guid isPermaLink="false">https://www.osintafrica.net/?p=496</guid>

					<description><![CDATA[<p>Le BYOD signifie Bring your own device, le BYOD est devenu très populaire dans les...</p>
<p>The post <a href="https://www.osintafrica.net/le-byod-et-les-organisations-en-afrique/">LE BYOD et les organisations en Afrique</a> first appeared on <a href="https://www.osintafrica.net">osintafrica</a>.</p>]]></description>
										<content:encoded><![CDATA[<p><span style="color: #000000;"><img data-recalc-dims="1" fetchpriority="high" decoding="async" class="alignnone size-full wp-image-497" src="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2023/01/BYOD.png?resize=640%2C360&#038;ssl=1" alt="" width="640" height="360" srcset="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2023/01/BYOD.png?w=1000&amp;ssl=1 1000w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2023/01/BYOD.png?resize=300%2C169&amp;ssl=1 300w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2023/01/BYOD.png?resize=768%2C432&amp;ssl=1 768w" sizes="(max-width: 640px) 100vw, 640px" /></span></p>
<p><span style="color: #000000;">Le BYOD signifie Bring your own device, le BYOD est devenu très populaire dans les organisations à travers le monde mais aussi en Afrique.</span></p>
<p><span style="color: #000000;"> Le BYOD permet aux travailleurs de venir avec leurs propres équipements tels que: des ordinateurs, téléphones mobiles, tablettes pour se connecter à l’infrastructure de leur organisation et travailler avec. Cela apporte d’énormes avantages aux organisations mais s’il n’y a pas de suivi cela pourrait aussi avoir plus de conséquences que d’avantages.</span></p>
<p><span style="color: #000000;">Le BYOD est utilisé souvent dans les lieux suivants : Les écoles, les organisations publiques ou gouvernementales, entreprises.</span></p>
<p><span style="color: #000000;">Les Etats Africains par manque de moyen n’ont pas le choix d’adopter d’autres alternatives que le BYOD.</span></p>
<p><span style="color: #000000;">Imaginons que chaque Etat Africain décidait d’acheter des équipements pour les travailleurs cela couterait d’énorme fortune a chaque Etat, ce qui fait que le BYOD est l’option la plus souhaite.</span></p>
<p><span style="color: #000000;">Avec les informations recueillies avec certaines sources, la plupart des pays Africains aujourd’hui utilisent le BYOD dans les organisations gouvernementales et aussi dans les entreprises sans suivis.</span></p>
<p><span style="color: #000000;">Le manque de suivi est le problème majeur du BYOD et les problèmes sont parfois irréparables.</span></p>
<p><span style="color: #000000;">Le manque de suivi du BYOD entraine des fuites de données en sachant que les données de nos jours sont devenues comme une matière première, elles permettent aux organisations, entreprises et Etats de collecter et produire des informations politiques, militaires, économiques, éducatives, médicales et autres.</span></p>
<p><span style="color: #000000;">Il ne faut pas avoir peur, le BYOD n’est pas une fatalité si les conditions sont mises en place pour l’implémenter, le maintenir jusqu’au niveau de la disposition des équipements et le départ d’un travailleur.</span></p>
<p><span style="color: #000000;"><strong>Avantages d’utilisation du BYOD dans une organisation.</strong></span></p>
<ul>
<li><span style="color: #000000;">L’organisation arrive à économiser financièrement</span></li>
<li><span style="color: #000000;">Selon certaines sources le BYOD peut améliorer le travail des employés et aussi le moral des employés</span></li>
<li><span style="color: #000000;">Augmentation de la productivité des travailleurs.</span></li>
</ul>
<p><span style="color: #000000;"><strong>Les conséquences</strong> <strong>d’utilisation du BYOD dans une organisation.</strong></span></p>
<ul>
<li><span style="color: #000000;">Violation de la politique de l’entreprise</span></li>
<li><span style="color: #000000;">Fuite des données</span></li>
<li><span style="color: #000000;">Manque de gestions des équipements</span></li>
<li><span style="color: #000000;">Augmentation des vulnérabilités et de menaces</span></li>
<li><span style="color: #000000;">Augmentation du shadow IT</span></li>
<li><span style="color: #000000;">Augmentation des cybers attaques</span></li>
</ul>
<p><span style="color: #000000;">Nous pouvons encore citer plusieurs avantages et conséquences, mais limitons-la-nous le temps c’est de l’argent.</span></p>
<p><span style="color: #000000;">Apres avoir citer les conséquences, je vois que vous aviez décidé de tout changer dans votre organisation. Mais non, il y a toujours des solutions pour bien implémenter le BYOD.</span></p>
<p><span style="color: #000000;"><strong>Solutions d’utilisation du BYOD dans une organisation.</strong></span></p>
<ul>
<li><span style="color: #000000;">Mettre en place une politique de gestion du BYOD</span></li>
<li><span style="color: #000000;">Mettre en place un moyen de gestion d’équipements (asset management)</span></li>
<li><span style="color: #000000;">Mettre en place une équipe de gestions de risques</span></li>
</ul>
<p><span style="color: #000000;"><span style="color: #000000;"><b>NB:</b> Il y aussi d’autres alternatives telles que: </span><strong style="color: #000000;">CYOD ou le COPE.</strong></span></p>
<p><span style="color: #000000;"><strong>CYOD (choose your own device)</strong></span></p>
<p><span style="color: #000000;">A ce niveau, l’employer ou l’entreprise donne une liste d’équipements que les employés peuvent acheter. Cela permet à l’employer de mieux gérer les équipements dans l’entreprise.</span></p>
<p><span style="color: #000000;"><strong>COPE (CORPORATE OWN PERSONAL ENABLED)</strong></span></p>
<p><span style="color: #000000;">A ce niveau, l’employer achète des équipements pour les travailleurs. Les travailleurs peuvent utiliser les équipements pour le travail mais aussi pour leurs fins personnelles.</span></p>
<p><span style="color: #000000;"><span style="color: #000000;"><b>NB:</b> </span><strong style="color: #000000;">Il faudra faire signer à chaque employé un document en confirmant leur accord et mettre une politique de surveillance en place pour une bonne implémentation du BYOD, CYOD, COPE.</strong></span></p>
<p><span style="color: #000000;">En conclusion, le BYOD est une bonne alternative en Afrique mais et à travers le monde. Une bonne implémentation du BYOD en mettant en place une bonne politique de gestion et de suivis peut aider une entreprise à mieux gérer les équipements. L’adaptation du BYOD sans se rendre compte des conséquences et des risques dans les organisations telles que (ministères, directions et autres) en Afriques sont les causes de la plupart des fuites de données. Il faudra alors prendre en compte des avantages et des conséquences pour mieux protéger les données.</span></p>
<div class="saboxplugin-wrap" itemtype="http://schema.org/Person" itemscope itemprop="author"><div class="saboxplugin-tab"><div class="saboxplugin-gravatar"><img decoding="async" src="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2023/05/cropped-osintafrica-1.jpg?fit=100%2C100&#038;ssl=1" srcset="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2023/05/cropped-osintafrica-1.jpg?fit=200%2C200&#038;ssl=1 2x" width="100" height="100" alt="Bangaly Koita" class="avatar avatar-100 wp-user-avatar wp-user-avatar-100 photo avatar-default" /></div><div class="saboxplugin-authorname"><a href="https://www.osintafrica.net/author/admin/" class="vcard author" rel="author"><span class="fn">Bangaly Koita</span></a></div><div class="saboxplugin-desc"><div itemprop="description"><p>Bangaly Koita is a SOC Analyst and  Cyber Security researcher . As a passionate in cyber security,  he spends most of the time  writing articles and making videos online to share his knowledge and experience to the vast community of IT but in general Cyber Security. Feel free to contact me in case.</p>
</div></div><div class="saboxplugin-web "><a href="https://osintafrica.net" target="_self" >osintafrica.net</a></div><div class="clearfix"></div><div class="saboxplugin-socials "><a title="Linkedin" target="_blank" href="https://www.linkedin.com/in/bangaly-koita-68b8b912a/" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-linkedin" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M100.3 480H7.4V180.9h92.9V480zM53.8 140.1C24.1 140.1 0 115.5 0 85.8 0 56.1 24.1 32 53.8 32c29.7 0 53.8 24.1 53.8 53.8 0 29.7-24.1 54.3-53.8 54.3zM448 480h-92.7V334.4c0-34.7-.7-79.2-48.3-79.2-48.3 0-55.7 37.7-55.7 76.7V480h-92.8V180.9h89.1v40.8h1.3c12.4-23.5 42.7-48.3 87.9-48.3 94 0 111.3 61.9 111.3 142.3V480z"></path></svg></span></a></div></div></div><p>The post <a href="https://www.osintafrica.net/le-byod-et-les-organisations-en-afrique/">LE BYOD et les organisations en Afrique</a> first appeared on <a href="https://www.osintafrica.net">osintafrica</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">496</post-id>	</item>
		<item>
		<title>Facebook reinitialization code is targeted by the bad guys to steal user’s credential</title>
		<link>https://www.osintafrica.net/facebook-reinitialization-code-is-targeted-by-the-bad-guys-to-steal-users-credential/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=facebook-reinitialization-code-is-targeted-by-the-bad-guys-to-steal-users-credential</link>
		
		<dc:creator><![CDATA[Bangaly Koita]]></dc:creator>
		<pubDate>Tue, 15 Nov 2022 22:54:23 +0000</pubDate>
				<category><![CDATA[Security Awareness]]></category>
		<guid isPermaLink="false">https://www.osintafrica.net/?p=395</guid>

					<description><![CDATA[<p>&#160; As we explained in the previous article (HOW TO PROTECT YOUR PASSWORD ON SOCIAL...</p>
<p>The post <a href="https://www.osintafrica.net/facebook-reinitialization-code-is-targeted-by-the-bad-guys-to-steal-users-credential/">Facebook reinitialization code is targeted by the bad guys to steal user’s credential</a> first appeared on <a href="https://www.osintafrica.net">osintafrica</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>&nbsp;</p>
<p><span style="color: #000000;">As we explained in the previous article (<span style="color: #0000ff;"><a style="color: #0000ff;" href="https://www.osintafrica.net/comment-proteger-votre-mot-de-passe-sur-les-reseaux-sociaux/">HOW TO PROTECT YOUR PASSWORD ON SOCIAL NETWORKS – osintafrica</a></span>), most of the users on the social media such as Facebook and others are not aware of how to protect their account, this is due to the fact that the users are not trained for and did not receive any information related to that topic.</span></p>
<p><span style="color: #000000;">On<span style="color: #0000ff;"> <a style="color: #0000ff;" href="https://www.facebook.com/">Facebook</a>,</span> the password can be reset by simply entering the mobile number following by the password reset code. By knowing that, many bad guys use this opportunity to take over the user’s account without his or her consent.</span></p>
<p><strong><span style="color: #000000;">Let’s give an example:</span></strong></p>
<p><span style="color: #000000;"><img data-recalc-dims="1" decoding="async" class="alignnone wp-image-396 size-large" src="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2022/11/1.jpg?resize=640%2C853&#038;ssl=1" alt="" width="640" height="853" srcset="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2022/11/1.jpg?resize=768%2C1024&amp;ssl=1 768w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2022/11/1.jpg?resize=225%2C300&amp;ssl=1 225w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2022/11/1.jpg?resize=1152%2C1536&amp;ssl=1 1152w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2022/11/1.jpg?resize=1024%2C1365&amp;ssl=1 1024w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2022/11/1.jpg?w=1488&amp;ssl=1 1488w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2022/11/1.jpg?w=1280&amp;ssl=1 1280w" sizes="(max-width: 640px) 100vw, 640px" /></span></p>
<p>&nbsp;</p>
<p><span style="color: #000000;">As you see in the screenshot, the message is in French.</span></p>
<p><span style="color: #000000;"><strong>Message details:</strong></span></p>
<ul>
<li><span style="color: #000000;">Sender or bad guy – Good morning, how are you?</span></li>
<li><span style="color: #000000;">Receiver or victim – Good morning, I am fine and you?</span></li>
<li><span style="color: #000000;">Sender or bad guy – Well, give me your mobile phone’s number</span></li>
<li><span style="color: #000000;">Receiver or victim – “Sent his or her number”</span></li>
<li><span style="color: #000000;">Sender or bad guy – Send me the code that you received</span></li>
<li><span style="color: #000000;">Receiver or victim – 92997418 is your Facebook password reset code</span></li>
</ul>
<p>&nbsp;</p>
<p><span style="color: #000000;">As you see on the message description, the bad guy asked the user to send his or her password reset code, once received they can use the code to reset the user password and take over the account. The technique used is very tricky and hard to detect by many users. The bad guy used the user’s emotion to steal his or her credential.</span></p>
<p><span style="color: #000000;">This issue is becoming more frequent actually. One important thing to mention is that most of the users who lose their password do not try to recover their account. They just open another account, which make the situation worse as more fake account more people will fall into the same situation.</span></p>
<p><span style="color: #000000;">This activity should be taken into account by Facebook by finding a proper solution to stop it. Below, we will give some recommendations that could help the users to prevent this activity from happening.</span></p>
<p><strong><span style="color: #000000;">Recommendation:</span></strong></p>
<ul>
<li><span style="color: #000000;">Do not send the password reset code to anyone requesting it (the password reset code is confidential, it should not be shared)</span></li>
</ul>
<ul>
<li><span style="color: #000000;">Enable <strong>2FA.</strong></span></li>
<li><span style="color: #000000;">Use a more <strong>complex</strong> password (at least 8 digits with uppercase, lowercase and numbers and other characters as possible).</span></li>
<li><span style="color: #000000;">Inform customers about different attack aim to steal their password and how to protect their account (This part could be done by Facebook or other voluntaries as OSINTAFRICA).</span></li>
</ul>
<p>&nbsp;</p>
<div class="saboxplugin-wrap" itemtype="http://schema.org/Person" itemscope itemprop="author"><div class="saboxplugin-tab"><div class="saboxplugin-gravatar"><img decoding="async" src="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2023/05/cropped-osintafrica-1.jpg?fit=100%2C100&#038;ssl=1" srcset="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2023/05/cropped-osintafrica-1.jpg?fit=200%2C200&#038;ssl=1 2x" width="100" height="100" alt="Bangaly Koita" class="avatar avatar-100 wp-user-avatar wp-user-avatar-100 photo avatar-default" /></div><div class="saboxplugin-authorname"><a href="https://www.osintafrica.net/author/admin/" class="vcard author" rel="author"><span class="fn">Bangaly Koita</span></a></div><div class="saboxplugin-desc"><div itemprop="description"><p>Bangaly Koita is a SOC Analyst and  Cyber Security researcher . As a passionate in cyber security,  he spends most of the time  writing articles and making videos online to share his knowledge and experience to the vast community of IT but in general Cyber Security. Feel free to contact me in case.</p>
</div></div><div class="saboxplugin-web "><a href="https://osintafrica.net" target="_self" >osintafrica.net</a></div><div class="clearfix"></div><div class="saboxplugin-socials "><a title="Linkedin" target="_blank" href="https://www.linkedin.com/in/bangaly-koita-68b8b912a/" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-linkedin" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M100.3 480H7.4V180.9h92.9V480zM53.8 140.1C24.1 140.1 0 115.5 0 85.8 0 56.1 24.1 32 53.8 32c29.7 0 53.8 24.1 53.8 53.8 0 29.7-24.1 54.3-53.8 54.3zM448 480h-92.7V334.4c0-34.7-.7-79.2-48.3-79.2-48.3 0-55.7 37.7-55.7 76.7V480h-92.8V180.9h89.1v40.8h1.3c12.4-23.5 42.7-48.3 87.9-48.3 94 0 111.3 61.9 111.3 142.3V480z"></path></svg></span></a></div></div></div><p>The post <a href="https://www.osintafrica.net/facebook-reinitialization-code-is-targeted-by-the-bad-guys-to-steal-users-credential/">Facebook reinitialization code is targeted by the bad guys to steal user’s credential</a> first appeared on <a href="https://www.osintafrica.net">osintafrica</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">395</post-id>	</item>
		<item>
		<title>COMMENT PROTEGER VOTRE MOT DE PASSE SUR LES RESEAUX SOCIAUX</title>
		<link>https://www.osintafrica.net/comment-proteger-votre-mot-de-passe-sur-les-reseaux-sociaux/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=comment-proteger-votre-mot-de-passe-sur-les-reseaux-sociaux</link>
		
		<dc:creator><![CDATA[Bangaly Koita]]></dc:creator>
		<pubDate>Sun, 13 Nov 2022 16:38:40 +0000</pubDate>
				<category><![CDATA[Security Awareness]]></category>
		<guid isPermaLink="false">https://www.osintafrica.net/?p=379</guid>

					<description><![CDATA[<p>La protection des mots de passes est devenue tres difficile pour les utilisateurs sur les...</p>
<p>The post <a href="https://www.osintafrica.net/comment-proteger-votre-mot-de-passe-sur-les-reseaux-sociaux/">COMMENT PROTEGER VOTRE MOT DE PASSE SUR LES RESEAUX SOCIAUX</a> first appeared on <a href="https://www.osintafrica.net">osintafrica</a>.</p>]]></description>
										<content:encoded><![CDATA[<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignnone size-full wp-image-376" src="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2022/11/1-3.png?resize=640%2C360&#038;ssl=1" alt="" width="640" height="360" srcset="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2022/11/1-3.png?w=1280&amp;ssl=1 1280w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2022/11/1-3.png?resize=300%2C169&amp;ssl=1 300w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2022/11/1-3.png?resize=1024%2C576&amp;ssl=1 1024w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2022/11/1-3.png?resize=768%2C432&amp;ssl=1 768w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<p><span style="color: #000000;">La protection des mots de passes est devenue tres difficile pour les utilisateurs sur les reseaux sociaux.</span></p>
<p><span style="color: #000000;">Chaque jour des milliers d’utilisateurs perdent leur mot de passe. La plupart des utlisateurs n’arrivent plus a recouvrir leur compte. Ils recreent juste un autre compte.  Mais cela est une mauvaise pratique car dans le compte precedent si vous aviez des informations confidentielles, cela pourrait vous compromettre. La meilleure solution serait de recouvrir votre compte.  Pour lutter contre cela, il faudra prendre des precautions. La meilleure solution sera d’y prendre soin. Cest pourquoi osintafrica.net a ete cree pour vous aider a mieux proteger vos informations telle que votre mot de passe.</span></p>
<p><span style="color: #000000;">Juste un exemple , sur les reseaux sociaux comme Facebook, Instagram,Youtube,Twitter, Tiktok la plupart  des utilisateurs  sont pas informes sur les bonnes pratiques pour mieux proteger leur mot de passe. Cela amene les utilisateurs souvent de commettre des erreurs sans se rendre compte.</span></p>
<p><span style="color: #000000;">A cet effet, citons quelques exemples de mauvaises pratiques des utilisateurs sur les reseaux sociaux.</span></p>
<p><span style="color: #000000;"><strong>Mauvaises pratiques:</strong></span></p>
<ul>
<li><span style="color: #000000;">Utilisation de mot de passe tres facile a retenir</span></li>
<li><span style="color: #000000;">Sauvegarde de mot de passe dans le telephone ou sur papier (en plus de mettre sur le papier, ils le mettent dans l’armoire 😊). Comme on le dit en Anglais <strong>security through obscurite</strong>.</span></li>
<li><span style="color: #000000;">2FA nest pas active sur le compte</span></li>
<li><span style="color: #000000;">Le meme mot de passe ne change jamais (le mot de passe nest pas un monument il faut le changer 😊)</span></li>
<li><span style="color: #000000;">Le meme mot de passe est utilise sur d’autres comptes ( exemple meme mot de passe utilise sur Facebook, Instagram, Youtube etc…).</span></li>
<li><span style="color: #000000;">Beaucoup d&#8217;utilisateurs cliquent sur les liens malvaillants sans se rendre compte du danger (les liens malvaillants vous guident souvent sur un lien similaire au siteweb sur le quel vous vous connecte pour voler votre mot de passe).</span></li>
<li><span style="color: #000000;">Envoyer son code de reinitialisation de mot de passe sans se rendre compte du danger.</span></li>
<li><span style="color: #000000;">Utilisation de mot de passe similaire au mot de passe precedent (<strong>one-upped password</strong>) &#8211; Si le premier mot de passe etait : password , le second sera: password1 (  Ce qui est une mauvaise pratique car les hackers arrivent a facillement trouver se genre de mot de passe.)</span></li>
<li><span style="color: #000000;">Sans faire attention, beaucoup d’utilisateurs tapent leur mot de passe dans les lieux publics sans couvrir lecran .</span></li>
<li><span style="color: #000000;">Pas d’application pour gerer les mots de passes.</span></li>
<li><span style="color: #000000;">Les utilisateurs une foins cree un compte ne garde plus la boite mail creee se qui rend le recouvrement du mot de passe impossible. </span></li>
</ul>
<p><span style="color: #000000;">Nous pouvons en citer plusieurs encore, mais limitons nous la ( le temps cest de l’argent).</span></p>
<p><span style="color: #000000;">Pour remedier a ces mauvaises pratiques il ya des bonnes pratiques.</span></p>
<p><span style="color: #000000;">S’il vous plait, souffler avant de lire 😊.</span></p>
<p><span style="color: #000000;"><strong>Bonnes pratiques :</strong></span></p>
<ul>
<li><span style="color: #000000;">Utiliser un mot de passe plus <strong>complexe</strong> (au moins 8 chiffres avec des majuscules, minuscules et des chiffres et d’autre characters ci possible).</span></li>
<li><span style="color: #000000;">Ne jamais mettre le mot de passe dans le telephone ( a plus forte raison dans votre armoire 😊).</span></li>
<li><span style="color: #000000;">Activer le <strong>2FA</strong>.</span></li>
<li><span style="color: #000000;">Changer le mot de passe au moins une fois dans l’annee (  cest mieux de le changer apres chaque 6 mois).</span></li>
<li><span style="color: #000000;">Ne pas cliquer sur un lien qui vient souvent des inconnus ou bien des personnes avec les quelles vous communiquees rarement , cest mieuix de verifier toujours le lien sur une platform comme <span style="color: #0000ff;"><a style="color: #0000ff;" href="https://www.virustotal.com/gui/home/search">VirusTotal &#8211; Home</a>.</span></span></li>
<li><span style="color: #000000;">Ne jamais envoyer le code de reinitialization  de mot de passe a un autre utilisateur  (encore jamais du tout)</span></li>
<li><span style="color: #000000;">Contacter le service clientele (par exemple Facebook a un service clientele pour des cas de perte de mot de passe a contacter).</span></li>
<li><span style="color: #000000;">Utiliser la boite mail qui avait ete creee pour creer le compte (Facebook, Instagram, Youtube etc&#8230;)</span></li>
<li><span style="color: #000000;">Ne jamais utiliser un mot de passe similaire au precedent (<strong>one-upped password</strong>)  </span></li>
<li><span style="color: #000000;">Toujours cacher le mot de passe avant de le taper  (surtout regardez les cameras aussi a cote).</span></li>
<li><span style="color: #000000;">Utiliser une application pour mieux gerer vos mots de passe:</span></li>
<li><span style="color: #000000;">Exemples:</span></li>
<li><span style="color: #000000;">Keepass <span style="color: #0000ff;"><a style="color: #0000ff;" href="https://keepass.info/">KeePass Password Safe</a></span></span></li>
<li><span style="color: #000000;">Lastpass <span style="color: #0000ff;"><a style="color: #0000ff;" href="https://www.lastpass.com/">#1 Password Manager &amp; Vault App with Single-Sign On &amp; MFA Solutions | LastPass</a></span></span></li>
</ul>
<p><span style="color: #000000;">Comme vous le constate, les bonnes pratiques sont l’inverse des mauvaises pratiques. Donc essayer de changer ces mauvaises pratiques pour mieux proteger votre compte.</span></p>
<div class="saboxplugin-wrap" itemtype="http://schema.org/Person" itemscope itemprop="author"><div class="saboxplugin-tab"><div class="saboxplugin-gravatar"><img decoding="async" src="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2023/05/cropped-osintafrica-1.jpg?fit=100%2C100&#038;ssl=1" srcset="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2023/05/cropped-osintafrica-1.jpg?fit=200%2C200&#038;ssl=1 2x" width="100" height="100" alt="Bangaly Koita" class="avatar avatar-100 wp-user-avatar wp-user-avatar-100 photo avatar-default" /></div><div class="saboxplugin-authorname"><a href="https://www.osintafrica.net/author/admin/" class="vcard author" rel="author"><span class="fn">Bangaly Koita</span></a></div><div class="saboxplugin-desc"><div itemprop="description"><p>Bangaly Koita is a SOC Analyst and  Cyber Security researcher . As a passionate in cyber security,  he spends most of the time  writing articles and making videos online to share his knowledge and experience to the vast community of IT but in general Cyber Security. Feel free to contact me in case.</p>
</div></div><div class="saboxplugin-web "><a href="https://osintafrica.net" target="_self" >osintafrica.net</a></div><div class="clearfix"></div><div class="saboxplugin-socials "><a title="Linkedin" target="_blank" href="https://www.linkedin.com/in/bangaly-koita-68b8b912a/" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-linkedin" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M100.3 480H7.4V180.9h92.9V480zM53.8 140.1C24.1 140.1 0 115.5 0 85.8 0 56.1 24.1 32 53.8 32c29.7 0 53.8 24.1 53.8 53.8 0 29.7-24.1 54.3-53.8 54.3zM448 480h-92.7V334.4c0-34.7-.7-79.2-48.3-79.2-48.3 0-55.7 37.7-55.7 76.7V480h-92.8V180.9h89.1v40.8h1.3c12.4-23.5 42.7-48.3 87.9-48.3 94 0 111.3 61.9 111.3 142.3V480z"></path></svg></span></a></div></div></div><p>The post <a href="https://www.osintafrica.net/comment-proteger-votre-mot-de-passe-sur-les-reseaux-sociaux/">COMMENT PROTEGER VOTRE MOT DE PASSE SUR LES RESEAUX SOCIAUX</a> first appeared on <a href="https://www.osintafrica.net">osintafrica</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">379</post-id>	</item>
		<item>
		<title>Why should we update our browsers?</title>
		<link>https://www.osintafrica.net/why-should-we-update-our-browsers/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=why-should-we-update-our-browsers</link>
		
		<dc:creator><![CDATA[Bangaly Koita]]></dc:creator>
		<pubDate>Tue, 08 Nov 2022 19:04:02 +0000</pubDate>
				<category><![CDATA[Security Awareness]]></category>
		<guid isPermaLink="false">https://www.osintafrica.net/?p=343</guid>

					<description><![CDATA[<p>&#160; While you are reading this post, I know that your browser is not updated....</p>
<p>The post <a href="https://www.osintafrica.net/why-should-we-update-our-browsers/">Why should we update our browsers?</a> first appeared on <a href="https://www.osintafrica.net">osintafrica</a>.</p>]]></description>
										<content:encoded><![CDATA[<p><span style="color: #000000;"><img data-recalc-dims="1" loading="lazy" decoding="async" class="size-full wp-image-344 aligncenter" src="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2022/11/template-1.png?resize=640%2C360&#038;ssl=1" alt="" width="640" height="360" srcset="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2022/11/template-1.png?w=1280&amp;ssl=1 1280w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2022/11/template-1.png?resize=300%2C169&amp;ssl=1 300w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2022/11/template-1.png?resize=1024%2C576&amp;ssl=1 1024w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2022/11/template-1.png?resize=768%2C432&amp;ssl=1 768w" sizes="(max-width: 640px) 100vw, 640px" /></span></p>
<p>&nbsp;</p>
<p><span style="color: #000000;">While you are reading this post, I know that your browser is not updated. This is because you are not aware of the impact that it might cause to your system or organization.</span></p>
<p><span style="color: #000000;">In October 2022, Google fixed 7 Chrome zero-day vulnerabilities exploited by threat actors.</span></p>
<p><span style="color: #000000;">CVE-2022-3723 </span></p>
<p><span style="color: #000000;">CVE-2022-1096</span></p>
<p><span style="color: #000000;">CVE-2022-0609</span></p>
<p><span style="color: #000000;">CVE-2022-2856</span></p>
<p><span style="color: #000000;">CVE-2022-1364</span></p>
<p><span style="color: #000000;">CVE-2022-2294</span></p>
<p><span style="color: #000000;">CVE-2022-3075</span></p>
<p><span style="color: #000000;">Google Chrome recommended to update the web browsers to block exploitation attempts.</span></p>
<p><span style="color: #000000;">In October 2022, Microsoft has released several fixes for the Microsoft Edge Stable versions.</span></p>
<p><span style="color: #000000;">Details:</span></p>
<p><span style="color: #000000;">Microsoft has released the latest Microsoft Edge Stable Channel (Version 107.0.1418.26). This update contains the fix for CVE-2022-3723, reported by the Chromium team as having an exploit in the wild.</span></p>
<p><span style="color: #000000;">Microsoft has also updated Microsoft Edge Extended Stable Channel (Version 106.0.1370.61), which contains the fix to CVE-2022-3723.</span></p>
<p><span style="color: #000000;">Microsoft has released the latest Microsoft Edge Stable Channel (Version 107.0.1418.24), which incorporates the latest Security Updates of the Chromium project.</span></p>
<p><span style="color: #000000;">Microsoft has released the latest Microsoft Edge Stable Channel (Version 106.0.1370.34), which incorporates the latest Security Updates of the Chromium project.</span></p>
<p><span style="color: #000000;">Microsoft has recommended to update to the newest version.</span></p>
<p><span style="color: #000000;">In March 2022, Firefox fixed 2 vulnerabilities (CVE-2022-26485 and CVE-2022-26486) under attack.</span></p>
<p><span style="color: #000000;">Firefox recommended to upgrade to Firefox 97.0.2, Firefox ESR 91.6.1, Firefox for Android 97.3.0, Focus 97.3.0 to block exploitation attempts</span></p>
<p><span style="color: #000000;">As we might see, the web browsers could have several vulnerabilities and also could be exploited by the threat actors to steal users’ data or data from different entities such as corporation, government and so on.</span></p>
<p><span style="color: #000000;">In order to avoid that, there are some recommendations to follow.</span></p>
<p><span style="color: #000000;">Recommendation:</span></p>
<p><span style="color: #000000;">Monitor your browser if there is any update information.</span></p>
<p><span style="color: #000000;">You could also subscribe to the security blog or webpage of the organization owning the browser so you can get information about different update issues.</span></p>
<p><span style="color: #000000;">Update your browser always when the update is available.</span></p>
<div class="saboxplugin-wrap" itemtype="http://schema.org/Person" itemscope itemprop="author"><div class="saboxplugin-tab"><div class="saboxplugin-gravatar"><img decoding="async" src="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2023/05/cropped-osintafrica-1.jpg?fit=100%2C100&#038;ssl=1" srcset="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2023/05/cropped-osintafrica-1.jpg?fit=200%2C200&#038;ssl=1 2x" width="100" height="100" alt="Bangaly Koita" class="avatar avatar-100 wp-user-avatar wp-user-avatar-100 photo avatar-default" /></div><div class="saboxplugin-authorname"><a href="https://www.osintafrica.net/author/admin/" class="vcard author" rel="author"><span class="fn">Bangaly Koita</span></a></div><div class="saboxplugin-desc"><div itemprop="description"><p>Bangaly Koita is a SOC Analyst and  Cyber Security researcher . As a passionate in cyber security,  he spends most of the time  writing articles and making videos online to share his knowledge and experience to the vast community of IT but in general Cyber Security. Feel free to contact me in case.</p>
</div></div><div class="saboxplugin-web "><a href="https://osintafrica.net" target="_self" >osintafrica.net</a></div><div class="clearfix"></div><div class="saboxplugin-socials "><a title="Linkedin" target="_blank" href="https://www.linkedin.com/in/bangaly-koita-68b8b912a/" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-linkedin" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M100.3 480H7.4V180.9h92.9V480zM53.8 140.1C24.1 140.1 0 115.5 0 85.8 0 56.1 24.1 32 53.8 32c29.7 0 53.8 24.1 53.8 53.8 0 29.7-24.1 54.3-53.8 54.3zM448 480h-92.7V334.4c0-34.7-.7-79.2-48.3-79.2-48.3 0-55.7 37.7-55.7 76.7V480h-92.8V180.9h89.1v40.8h1.3c12.4-23.5 42.7-48.3 87.9-48.3 94 0 111.3 61.9 111.3 142.3V480z"></path></svg></span></a></div></div></div><p>The post <a href="https://www.osintafrica.net/why-should-we-update-our-browsers/">Why should we update our browsers?</a> first appeared on <a href="https://www.osintafrica.net">osintafrica</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">343</post-id>	</item>
		<item>
		<title>How to protect your data?</title>
		<link>https://www.osintafrica.net/how-to-protect-your-data/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=how-to-protect-your-data</link>
		
		<dc:creator><![CDATA[Bangaly Koita]]></dc:creator>
		<pubDate>Fri, 04 Nov 2022 20:31:32 +0000</pubDate>
				<category><![CDATA[Security Awareness]]></category>
		<guid isPermaLink="false">https://www.osintafrica.net/?p=270</guid>

					<description><![CDATA[<p>&#160; The confidential data are any types of data if leaked could cause several damages...</p>
<p>The post <a href="https://www.osintafrica.net/how-to-protect-your-data/">How to protect your data?</a> first appeared on <a href="https://www.osintafrica.net">osintafrica</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>&nbsp;</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignnone size-full wp-image-334" src="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2022/11/protect.png?resize=640%2C360&#038;ssl=1" alt="" width="640" height="360" srcset="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2022/11/protect.png?w=1280&amp;ssl=1 1280w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2022/11/protect.png?resize=300%2C169&amp;ssl=1 300w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2022/11/protect.png?resize=1024%2C576&amp;ssl=1 1024w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2022/11/protect.png?resize=768%2C432&amp;ssl=1 768w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<p><span style="color: #000000;">The confidential data are any types of data if leaked could cause several damages to any company such as data lost, loss of reputation or a person.</span></p>
<p><span style="color: #000000;">Data are categorized in the following ways:</span></p>
<p><span style="color: #000000;"><strong>PII (Personal identifiable Information)</strong> – Consist of data such as Username and password, date of birthday, social security number, credit card number and others.</span></p>
<p><span style="color: #000000;"><strong>PHI (Personal Health Information)</strong> – Consist of data such as data related to human health (medical record).</span></p>
<p><span style="color: #000000;"><strong>Sensitive or confidential Information</strong> – Consist of data related managed by private institution, public institution, military institution or army or data that belong to a person such as personal data that could be used to blackmail someone (Pictures, message, voice call, video and others).</span></p>
<p><span style="color: #000000;"><strong>Financial Data</strong> &#8211; Consist of data managed by financial institution such as Banks, any institution storing financial information (Organization, Insurance companies and others)</span></p>
<p><span style="color: #000000;">The data are protected by <em>regulations</em> or standards based on the countries where the data reside such as the African Union’s Convention on Cyber Security and Personal Data Protection, GDRP, The Gramm-Leach-Bliley, HIPAA, PCI DSS and others.</span></p>
<p>&nbsp;</p>
<p><span style="color: #000000;">Below, you can get some tips about how to protect your data:</span></p>
<p><span style="color: #000000;">Don&#8217;t share confidential data sensitive data via public file transfer and storage.</span></p>
<p><span style="color: #000000;">Don’t put data such as password, key, source code on public GitHub or other code repositories.</span></p>
<p><span style="color: #000000;">Use 2FA.</span></p>
<p><span style="color: #000000;">Use encryption while sharing confidential data</span></p>
<p><span style="color: #000000;">Don&#8217;t put any confidential data over social media</span></p>
<p><span style="color: #000000;">Don&#8217;t upload file on virus total or others similar sources unless you are sure that it does not contain any confidential data</span></p>
<p><span style="color: #000000;">Use the hash to check the file reputation on VT</span></p>
<p><span style="color: #000000;">Monitor confidential data leaked on dark web or data leaked issue from source such as Havebeepwned</span></p>
<p><span style="color: #000000;">Monitor your key word on different social media</span></p>
<p><span style="color: #000000;">Perform a vulnerability assessment and patching</span></p>
<p><span style="color: #000000;">Perform a threat hunting to detect any threat that can be exploited</span></p>
<p>&nbsp;</p>
<div class="saboxplugin-wrap" itemtype="http://schema.org/Person" itemscope itemprop="author"><div class="saboxplugin-tab"><div class="saboxplugin-gravatar"><img decoding="async" src="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2023/05/cropped-osintafrica-1.jpg?fit=100%2C100&#038;ssl=1" srcset="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2023/05/cropped-osintafrica-1.jpg?fit=200%2C200&#038;ssl=1 2x" width="100" height="100" alt="Bangaly Koita" class="avatar avatar-100 wp-user-avatar wp-user-avatar-100 photo avatar-default" /></div><div class="saboxplugin-authorname"><a href="https://www.osintafrica.net/author/admin/" class="vcard author" rel="author"><span class="fn">Bangaly Koita</span></a></div><div class="saboxplugin-desc"><div itemprop="description"><p>Bangaly Koita is a SOC Analyst and  Cyber Security researcher . As a passionate in cyber security,  he spends most of the time  writing articles and making videos online to share his knowledge and experience to the vast community of IT but in general Cyber Security. Feel free to contact me in case.</p>
</div></div><div class="saboxplugin-web "><a href="https://osintafrica.net" target="_self" >osintafrica.net</a></div><div class="clearfix"></div><div class="saboxplugin-socials "><a title="Linkedin" target="_blank" href="https://www.linkedin.com/in/bangaly-koita-68b8b912a/" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-linkedin" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M100.3 480H7.4V180.9h92.9V480zM53.8 140.1C24.1 140.1 0 115.5 0 85.8 0 56.1 24.1 32 53.8 32c29.7 0 53.8 24.1 53.8 53.8 0 29.7-24.1 54.3-53.8 54.3zM448 480h-92.7V334.4c0-34.7-.7-79.2-48.3-79.2-48.3 0-55.7 37.7-55.7 76.7V480h-92.8V180.9h89.1v40.8h1.3c12.4-23.5 42.7-48.3 87.9-48.3 94 0 111.3 61.9 111.3 142.3V480z"></path></svg></span></a></div></div></div><p>The post <a href="https://www.osintafrica.net/how-to-protect-your-data/">How to protect your data?</a> first appeared on <a href="https://www.osintafrica.net">osintafrica</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">270</post-id>	</item>
	</channel>
</rss>
