1 min reading
Sun Aug 07 2022

Hackers exploit Twitter vulnerability and expose millions of user accounts

hackers-exploit-twitter-vulnerability-and-expose-millions-of-user-accounts

On Friday 5th of August it was disclosed that a zero-day vulnerability in Twitter's systems led to a significant data leakage.

"As a result of the vulnerability, if someone submitted an email address or phone number to Twitter's systems, Twitter's systems would tell the person what Twitter account the submitted email addresses or phone number was associated with, if any," according to a Twitter advisory.

Previously, in May 2022 Twitter agreed to pay a $150 million fine to settle a complaint from the U.S. Justice Department. The infringement was that between 2014 and 2019 the company used information account holders provided for security verification for advertising purposes without their consent.

Full article here

Hackers Exploit Twitter Vulnerability to Exposes 5.4 Million Accounts

Twitter reveals that hackers exploited a new zero-day vulnerability to expose 5.4 million user accounts by linking emails and phone numbers to them.

thn.webp

The Hacker NewsRavie Lakshmanan

twiter.jpg

Ceeyu is a  SaaS platform that can help assess the security of your vendors and other third parties. By using a platform to improve your third-party risk management process, your organization can easily and quickly identify areas of risk. This data will help improve the security of risky vendors, effectively increasing yours as well.

Contact us for a demo! [email protected]

Silvana Precup Ceeyu

Silvana Precup

Author

Cybersecurity professional experienced in cross-functional roles bridging between top management, risk functions, IT and security operations teams. With a knack for TPRM and digital footprint.

Other Blogposts

Ceeyu UI

NIS2: Essential entities vs Important entities, what’s the difference?

The impact of NIS2 for essential and important entities is not much different when it comes to implementing controls to comply, as they are ...

December 11, 2023

the-eu-dora-regulation-and-third-party-risk

The EU DORA regulation and third party risk

With the DORA regulation that the EU aims to strengthen the IT security of financial services and industries. This means banks, insurance co...

July 17, 2022

how-to-manage-the-third-party-risks-posed-by-your-critical-suppliers

How to manage the third party risks posed by your critical suppliers

This blog post walks you through some ideas on how to navigate the complex web of third-party risks, focusing on critical suppliers.

June 27, 2022