1 min reading
Sun Aug 07 2022

Hackers exploit Twitter vulnerability and expose millions of user accounts

hackers-exploit-twitter-vulnerability-and-expose-millions-of-user-accounts

On Friday 5th of August it was disclosed that a zero-day vulnerability in Twitter's systems led to a significant data leakage.

"As a result of the vulnerability, if someone submitted an email address or phone number to Twitter's systems, Twitter's systems would tell the person what Twitter account the submitted email addresses or phone number was associated with, if any," according to a Twitter advisory.

Previously, in May 2022 Twitter agreed to pay a $150 million fine to settle a complaint from the U.S. Justice Department. The infringement was that between 2014 and 2019 the company used information account holders provided for security verification for advertising purposes without their consent.

Full article here

Hackers Exploit Twitter Vulnerability to Exposes 5.4 Million Accounts

Twitter reveals that hackers exploited a new zero-day vulnerability to expose 5.4 million user accounts by linking emails and phone numbers to them.

thn.webp

The Hacker NewsRavie Lakshmanan

twiter.jpg

Ceeyu is a  SaaS platform that can help assess the security of your vendors and other third parties. By using a platform to improve your third-party risk management process, your organization can easily and quickly identify areas of risk. This data will help improve the security of risky vendors, effectively increasing yours as well.

Contact us for a demo! [email protected]

Silvana Precup Ceeyu

Silvana Precup

Author

Cybersecurity professional experienced in cross-functional roles bridging between top management, risk functions, IT and security operations teams. With a knack for TPRM and digital footprint.

Other Blogposts

assessing-the-risks-of-your-third-parties-part-1-an-introduction

Assessing the risks of your third parties, part 1: an introduction.

Managing the risks of working with third parties go far beyond some shared assets on your digital footprint.

October 26, 2021

Pen testing or attack surface management

Attack Surface Management or Penetration testing, which one do I need?

Both penetration testing and attack surface management solutions are proactive cybersecurity measures that give customers visibility into ri...

March 29, 2023

Ceeyu UI

Managing supply chain risks: what are the key risk assessment criteria?

Supply chain attacks are escalating, and regulations like NIS2 and DORA now mandate robust risk management. This post outlines key assessmen...

January 22, 2025