1 min reading
Sun Aug 07 2022

Hackers exploit Twitter vulnerability and expose millions of user accounts

hackers-exploit-twitter-vulnerability-and-expose-millions-of-user-accounts

On Friday 5th of August it was disclosed that a zero-day vulnerability in Twitter's systems led to a significant data leakage.

"As a result of the vulnerability, if someone submitted an email address or phone number to Twitter's systems, Twitter's systems would tell the person what Twitter account the submitted email addresses or phone number was associated with, if any," according to a Twitter advisory.

Previously, in May 2022 Twitter agreed to pay a $150 million fine to settle a complaint from the U.S. Justice Department. The infringement was that between 2014 and 2019 the company used information account holders provided for security verification for advertising purposes without their consent.

Full article here

Hackers Exploit Twitter Vulnerability to Exposes 5.4 Million Accounts

Twitter reveals that hackers exploited a new zero-day vulnerability to expose 5.4 million user accounts by linking emails and phone numbers to them.

thn.webp

The Hacker NewsRavie Lakshmanan

twiter.jpg

Ceeyu is a  SaaS platform that can help assess the security of your vendors and other third parties. By using a platform to improve your third-party risk management process, your organization can easily and quickly identify areas of risk. This data will help improve the security of risky vendors, effectively increasing yours as well.

Contact us for a demo! [email protected]

Silvana Precup Ceeyu

Silvana Precup

Author

Cybersecurity professional experienced in cross-functional roles bridging between top management, risk functions, IT and security operations teams. With a knack for TPRM and digital footprint.

Other Blogposts

Ceeyu UI

NIS2: Essential entities vs Important entities, what’s the difference?

The impact of NIS2 for essential and important entities is not much different when it comes to implementing controls to comply, as they are ...

December 11, 2023

Ceeyu UI

Does NIS2 also apply to companies regulated under DORA?

Does NIS2 also apply to companies covered by the DORA? If so, which subject is covered by which regulation? What is the difference and where...

November 13, 2024

the-eu-dora-regulation-and-third-party-risk

The EU DORA regulation and third party risk

With the DORA regulation that the EU aims to strengthen the IT security of financial services and industries. This means banks, insurance co...

July 17, 2022