Twitter Finds No Evidence of Vulnerability Exploitation in Recent Data Leaks By Orbit Brain January 12, 2023 0 383 viewsCyber Security News Dwelling › VulnerabilitiesTwitter Finds No Proof of Vulnerability Exploitation in Latest Knowledge LeaksBy Eduard Kovacs on January 12, 2023TweetTwitter says it has analyzed the lately marketed databases allegedly containing the data of a whole lot of thousands and thousands of its customers and located no proof {that a} vulnerability has been exploited.In August 2022, Twitter knowledgeable clients {that a} vulnerability in its programs had been exploited to acquire consumer information. The flaw, patched in January 2022, was used to find out whether or not a specified cellphone quantity or e-mail tackle have been tied to an current Twitter account.Twitter confirmed exploitation of the vulnerability after studies began circulating that the flaw had been leveraged to gather information on 5.four million customers.Just a few months later, a cybersecurity skilled mentioned he had obtained a database that appeared to point out the Twitter information breach was far larger than initially reported, with tens of thousands and thousands of impacted accounts.Twitter mentioned the information was the identical in each circumstances, but it surely by no means clarified precisely what number of customers are believed to be impacted.In December, simply earlier than Christmas, somebody provided to promote a database of 400 million Twitter consumer information allegedly obtained by the exploitation of the identical flaw.Just a few weeks later, in early January, a person leaked a database containing the data of roughly 235 million Twitter customers, together with identify, username, e-mail addresses, follower depend, and account creation date. Specialists who analyzed the publicly accessible information mentioned it probably got here from internet scraping.Twitter confirmed on Wednesday that the 200 million information weren’t obtained by the exploitation of the vulnerability patched in January 2022, nor different weaknesses in its programs.As well as, the social media large clarified that the 200 million information truly seem like the identical dataset because the beforehand bought 400 million information, however with duplicate entries eliminated.The corporate additionally clarified that not one of the leaked databases contained any passwords or different info that might result in passwords getting compromised.“Primarily based on info and intel analyzed to analyze the difficulty, there isn’t a proof that the information being bought on-line was obtained by exploiting a vulnerability of Twitter programs. The info is probably going a set of information already publicly accessible on-line by completely different sources,” Twitter mentioned.Eire’s Knowledge Safety Fee (DPC) introduced in December that it had launched an investigation in response to the information leak studies involving 5.four million Twitter customers.Within the assertion revealed this week, Twitter mentioned, “We’re in touch with Knowledge Safety Authorities and different related regulators from completely different nations to supply clarification in regards to the alleged incidents, and we’ll proceed to take action.”Similar to Fb, Twitter has its European headquarters in Eire. Fb and Instagram have been issued a whole lot of thousands and thousands of euros in fines up to now 12 months in Eire over information privateness violations.The person providing to promote the 400 million information was truly hoping that the huge fines issued to different social media corporations would persuade Twitter to purchase the information itself to stop it from getting leaked.Associated: Twitter Logs Out Some Customers Resulting from Safety Situation Associated to Password ResetsAssociated: Twitter Safety Chief Resigns as Musk Sparks ‘Deep Concern’Associated: Twitter Ex-Safety Chief Tells US Congress of Safety ConsiderationsGet the Each day Briefing Most LatestMost LearnTesla Returns as Pwn2Own Hacker Takeover GoalTwitter Finds No Proof of Vulnerability Exploitation in Latest Knowledge LeaksCisco Warns of Vital Vulnerability in EoL Small Enterprise RoutersThe Guardian Confirms Private Data Compromised in Ransomware AssaultThreema Beneath Fireplace After Downplaying Safety AnalysisSubtle ‘Darkish Pink’ APT Targets Authorities, Navy OrganizationsJust lately Disclosed Vulnerability Exploited to Hack A whole lot of SugarCRM ServersExtreme Vulnerabilities Permit Hacking of Asus Gaming RouterCyber Incident Hits UK Postal Service, Halts Abroad MailCrimson Hat Publicizes Normal Availability of Malware Detection ServiceOn the lookout for Malware in All of the Improper Locations?First Step For The Web’s subsequent 25 years: Including Safety to the DNSTattle Story: What Your Pc Says About YouBe in a Place to Act By means of Cyber Situational ConsciousnessReport Reveals Closely Regulated Industries Letting Social Networking Apps Run Rampant2010, A Nice 12 months To Be a Scammer.Do not Let DNS be Your Single Level of FailureEasy methods to Determine Malware in a BlinkDefining and Debating Cyber WarfareThe 5 A’s that Make Cybercrime so EngagingEasy methods to Defend Towards DDoS AssaultsSafety Budgets Not in Line with ThreatsAnycast – Three Causes Why Your DNS Community Ought to Use ItThe Evolution of the Prolonged Enterprise: Safety Methods for Ahead Considering OrganizationsUtilizing DNS Throughout the Prolonged Enterprise: It’s Dangerous EnterpriseSecurityWeek Podcast data leak exploited Twitter vulnerability Orbit Brainhttp://orbitbrain.com/ Orbit Brain is the senior science writer and technology expert. Our aim provides the best information about technology and web development designing SEO graphics designing video animation tutorials and how to use software easy waysand much more. Like Best Service Latest Technology, Information Technology, Personal Tech Blogs, Technology Blog Topics, Technology Blogs For Students, Futurism Blog.
Uber Investigating Data Breach After Hacker Claims Extensive CompromiseIntroducing the Cyber Security News Uber Investigating Data Breach After Hacker Claims Extensive Compromise.... September 16, 2022 Cyber Security News
Cyber Warfare Rife in Ukraine, But Impact Stays in ShadowsIntroducing the Cyber Security News Cyber Warfare Rife in Ukraine, But Impact Stays in Shadows.... September 28, 2022 Cyber Security News
Intel Introduces Protection Against Physical Fault Injection AttacksIntroducing the Cyber Security News Intel Introduces Protection Against Physical Fault Injection Attacks.... August 12, 2022 Cyber Security News
Google Releases Emergency Chrome 107 Update to Patch Actively Exploited Zero-DayIntroducing the Cyber Security News Google Releases Emergency Chrome 107 Update to Patch Actively Exploited Zero-Day.... October 28, 2022 Cyber Security News
Database Containing 235 Million Twitter User Records Available for FreeIntroducing the Cyber Security News Database Containing 235 Million Twitter User Records Available for Free.... January 5, 2023 Cyber Security News
Bolsters Raises $15M to Tackle Fakes and FraudsIntroducing the Cyber Security News Bolsters Raises $15M to Tackle Fakes and Frauds.... October 19, 2022 Cyber Security News