1 min reading
Sun Aug 07 2022

Hackers exploit Twitter vulnerability and expose millions of user accounts

On Friday 5th of August it was disclosed that a zero-day vulnerability in Twitter's systems led to a significant data leakage.

"As a result of the vulnerability, if someone submitted an email address or phone number to Twitter's systems, Twitter's systems would tell the person what Twitter account the submitted email addresses or phone number was associated with, if any," according to a Twitter advisory.

Previously, in May 2022 Twitter agreed to pay a $150 million fine to settle a complaint from the U.S. Justice Department. The infringement was that between 2014 and 2019 the company used information account holders provided for security verification for advertising purposes without their consent.

Full article here

Hackers Exploit Twitter Vulnerability to Exposes 5.4 Million Accounts

Twitter reveals that hackers exploited a new zero-day vulnerability to expose 5.4 million user accounts by linking emails and phone numbers to them.


The Hacker NewsRavie Lakshmanan


Ceeyu is a  SaaS platform that can help assess the security of your vendors and other third parties. By using a platform to improve your third-party risk management process, your organization can easily and quickly identify areas of risk. This data will help improve the security of risky vendors, effectively increasing yours as well.

Contact us for a demo! [email protected]

Silvana Precup


Cybersecurity professional experienced in cross-functional roles bridging between top management, risk functions, IT and security operations teams. With a knack for TPRM and digital footprint.

Other Blogposts

The EU DORA regulation and third party risk

With the DORA regulation that the EU aims to strengthen the IT security of financial services and industries. This means banks, insurance co...

July 17, 2022

How to manage the third party risks posed by your critical suppliers

This blog post walks you through some ideas on how to navigate the complex web of third-party risks, focusing on critical suppliers.

June 27, 2022

Assessing the risks of your third parties, part 2: setting up a third party risk management process (TPRM)

How to set up a TPRM, or third party risk management, process. What to include, and how it fits in your risk management process.

November 10, 2021