1 min reading
Mon Aug 15 2022

Another technology company bites the data leakage dust

another technology provider bites the dust with data leak

San-Francisco based Twilio is a cloud communication platform as a service (CPaaS). It helps create customer experiences via building blocks—APIs. Twilio is trusted by over 200,000 active corporate customers, among which companies like Spotify, Twitter, Netflix, and Airbnb.

It seems that following a phishing attack on employees, a data leakage occurred which may have affected millions of end-users.

For the full story, Security Boulevard tells it best

Twilio Fails Simple Test — Leaks Private Data via Phishing

Twilio (NYSE:TWLO) customer data has leaked—after a simple phishing attack on employees.

Security BoulevardRichi Jennings

twilio-ceo-jeff-lawson-john-phillips-cc-by.png

Ceeyu is a SaaS platform that can help assess the security of your vendors and other third parties. By using a platform to improve your third-party risk management process, your organization can easily and quickly identify areas of risk. This data will help improve the security of risky vendors, effectively increasing yours as well.

Contact us for a demo! [email protected]

Silvana Precup Ceeyu

Silvana Precup

Author

Cybersecurity professional experienced in cross-functional roles bridging between top management, risk functions, IT and security operations teams. With a knack for TPRM and digital footprint.

Other Blogposts

assessing-the-risks-of-your-third-parties-part-1-an-introduction

Assessing the risks of your third parties, part 1: an introduction.

Managing the risks of working with third parties go far beyond some shared assets on your digital footprint.

October 26, 2021

Pen testing or attack surface management

Attack Surface Management or Penetration testing, which one do I need?

Both penetration testing and attack surface management solutions are proactive cybersecurity measures that give customers visibility into ri...

March 29, 2023

Ceeyu UI

Managing supply chain risks: what are the key risk assessment criteria?

Supply chain attacks are escalating, and regulations like NIS2 and DORA now mandate robust risk management. This post outlines key assessmen...

January 22, 2025