Connect with us

News

Why Former Plateau Governor Lalong didn’t make President Tinubu’s Ministerial List

editor

Published

on

Tinubu Lalong

President Bola Tinubu’s recent release of ministerial names has sparked curiosity and raised eyebrows as some political heavyweights, including former Plateau State Governor, HE Simon Bako Lalong, were conspicuously absent from the list.

Being the campaign Director-General and playing a crucial role in securing a resounding victory at the polls during the nationwide campaign, Governor Lalong was widely expected to be among the top contenders for the Secretary to the Government of the Federation and now a ministerial position in Nigeria’s government, along with other former Governors mentioned in the list.

Surprisingly, while some former Governors, even those who defected from the People’s Democratic Party (PDP) to the All Progressives Congress (APC), made it onto the ministerial list, Governor Lalong’s omission has left many shocked and speculating about the reasons behind it.

Speculations have arisen, suggesting that Governor Simon Lalong’s exclusion might be linked to recent crises in the States Party Structure. Reports indicate that some party stakeholders and leaders, such as Senator Nora Daddut, CJ Dakas, and Hon. Komsol Alphonsus Longgap, the immediate past Federal House of Representatives Member representing Mikang, Qua’an-Pan Shendam Federal, have expressed interest in the Ministerial Slot.

Other factors like loyalty to the ruling platform and recommendations from ex-governors and state chapters might also have influenced the selection process with, Governor Lalong holding a high level State APC meeting days before the announcement of the list in an effort to straighten out issues.

Some have speculated that the party’s decision focused on rewarding most of the states where the APC secured their presidential votes, potentially leaving out states that faced challenges in delivering results or dealing with internal party struggles.

States like Adamawa, Bayelsa, Gombe, Kano, Kebbi, Kogi, Lagos, Osun, Plateau, Yobe, and Zamfara are yet to receive ministerial nominations. Prominent figures missing from the list have further fueled speculation, leading to discussions about the possibility of a second list being submitted later.

As the nominees prepare to undergo Senate screening, their past affiliations and actions, particularly those like Nyesome Wike, who were perceived to have worked against their party during crucial elections, may come under scrutiny.

While the Tinubu Ministerial List has been commended for its commitment to gender representation, evident with the inclusion of seven women, many Nigerians have raised questions about the list, suspecting that some politicians may have been selected solely to receive rewards from the President.

Chief of Staff to the President, Femi Gbajabiamila, delivered the letter to the President of the Senate, Senator Godswill Akpabio, emphasizing that Tinubu’s list aims to establish a government of inclusion and competence, prioritizing quality, inclusivity, professionalism, and geo-political balance.

As the nation eagerly awaits the unfolding of events, the speculations surrounding the ministerial list continue to fuel discussions in political circles and among citizens alike.

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

News

Man who hacked US Supreme Court filing system sentenced to probation

info

Published

on

By

GettyImages 1197513966.jpeg

Nicholas Moore, who pleaded guilty to hacking the U.S. Supreme Court’s electronic document filing system dozens of times over several months, was sentenced on Friday to a year of probation.

Moore had also hacked into the network of AmeriCorps, a government agency that runs stipend volunteer programs, and the systems of the Department of Veterans Affairs, which provides healthcare and welfare to military veterans. 

The man bragged about his feats on an Instagram account named @ihackedthegovernment, where he posted the personal information of the people he had hacked. Moore used one of his victim’s credentials to then access the U.S. Supreme Court’s electronic document filing system, AmeriCorps, and the Department of Veteran Affairs.

He was facing a year in prison and a fine of $100,000 in damages. Prosecutors later asked for only probation. 

“I made a mistake,” Moore said during the sentencing hearing on Friday, according to The Hill. “I am truly sorry. I respect laws, and I want to be a good citizen.” 

Continue Reading

News

Hackers are abusing unpatched Windows security flaws to hack into organizations

info

Published

on

By

Photo mosh getty windows logo.jpg

Hackers have broken into at least one organization using Windows vulnerabilities published online by a disgruntled security researcher over the last two weeks, according to a cybersecurity firm.

On Friday, cybersecurity company Huntress said in a series of posts on X that its researchers have seen hackers taking advantage of three Windows security flaws, dubbed BlueHammer, UnDefend, and RedSun. 

It’s unclear who the target of this attack is, and who the hackers are.

BlueHammer is the only bug among the three vulnerabilities being exploited that Microsoft has patched so far. A fix for BlueHammer was rolled out earlier this week. 

It appears that the hackers are exploiting the bugs by using exploit code that the security researcher published online. 

Earlier this month, a researcher who goes by Chaotic Eclipse published on their blog what they said was code to exploit an unpatched vulnerability in Windows. The researcher alluded to some conflict with Microsoft as the motivation behind publishing the code. 

“I was not bluffing Microsoft and I’m doing it again,” they wrote. “Huge thanks to MSRC leadership for making this possible,” they added, referring to Microsoft’s Security Response Center, the company’s team that investigates cyberattacks and handles reports of vulnerabilities.

Techcrunch event

San Francisco, CA
|
October 13-15, 2026

Days later, Chaotic Eclipse published UnDefend, and then earlier this week published RedSun. The researcher published code to exploit all three vulnerabilities on their GitHub page

All three vulnerabilities affect the Microsoft-made antivirus Windows Defender, allowing a hacker to gain high-level or administrator access to an affected Windows computer.

TechCunch could not reach Chaotic Eclipse for comment.

In response to a series of specific questions, Microsoft’s communications director Ben Hope said in a statement that the company supports “coordinated vulnerability disclosure, a widely adopted industry practice that helps ensure issues are carefully investigated and addressed before public disclosure, supporting both customer protection and the security research community.”

This is a case of what the cybersecurity industry calls “full disclosure.” When researchers find a flaw, they can report it to the affected software maker to help them fix it. At that point, usually the company acknowledges receipt, and if the vulnerability is legitimate, the company works to patch it. Often, the company and researchers agree on a timeline that establishes when the researcher can publicly explain their findings. 

Sometimes, for a variety of reasons, that communication breaks down and researchers publicly disclose details of the bug. In some cases, in part to prove the existence or severity of a flaw, researchers go a step further and publish “proof-of concept” code capable of abusing that bug.

When that happens, cybercriminals, government hackers, and others can then take the code and use it for their attacks, which prompts cybersecurity defenders to rush to deal with the fallout. 

“With these being so easily available now, and already weaponized for easy use, for better or for worse I think that ultimately puts us in another tug-of-war match between defenders and cybercriminals,” John Hammond, one of the researchers at Huntress who has been tracking the case, told TechCrunch. 

“Scenarios like these cause us to race with our adversaries; defenders frantically try to protect against ill-intended actors who rapidly take advantage of these exploits… especially now as it is just ready-made attacker tooling,” said Hammond.

Continue Reading

Trending