• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Twitter C-Level Resignations Continue As Blue Program Creates New Cyber-Risks

You are here: Home / General Cyber Security News / Twitter C-Level Resignations Continue As Blue Program Creates New Cyber-Risks
November 11, 2022

Quite a few of Twitter’s C-level security and privacy executives have resigned next the chaos that ensued from the Elon Musk acquisition of the social media system.

“I have made the tricky conclusion to leave Twitter,” said the company’s now-previous chief info security officer Lea Kissner in a tweet on Thursday.

“I have experienced the possibility to operate with wonderful people, and I am so proud of the privacy, security, and IT teams and the get the job done we have accomplished.”

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Twitter’s main privacy officer and compliance officer have also still left the company in excess of the previous two times, quoting problems that the rollout of new options on the social media system without the security evaluations necessary by a Federal Trade Fee (FTC) consent decree could spark regulatory issues.

“We are monitoring new developments at Twitter with deep concern,” reported Douglas Farrar, the FTC’s director of public affairs, who had confirmed the issues.

“No CEO or organization is above the regulation, and firms ought to stick to our consent decrees. Our revised consent purchase presents us new resources to make certain compliance, and we are ready to use them.”

Furthermore, the massive reduction in the labor power and the recent resignations by C-degree cybersecurity and privacy executives will build a vacuum, in accordance to Tom Kellermann, senior VP of cyber method at Contrast Security.

“Absence of investment in cybersecurity and material moderation will make it possible for for cyber spies and cartels to launch specific cyber-attacks from the system,” Kellermann told Infosecurity.

“Confusion about security policies and new administration of the platform will be made use of by attackers to fall payloads and attacks, not just disinformation.”

One particular of the controversial features hastily introduced by Twitter is the now notorious Blue system, which grants people various advantages for $8 a month, including the significantly-sought blue badge (formerly utilized to confirm notable personalities and corporations).

“The new strategy of verification would make a mockery of the technique, and we are already looking at scammers take benefit of it,” reported Jake Moore, world wide cybersecurity advisor at ESET.

“Fraudsters can now quite conveniently dupe men and women into believing they are reliable, and several could slide for cons or spread misinformation very swiftly.”

Moore also advised Infosecurity that, apart from checking follower counts, it is now hard to have out even further due diligence on account holders, which locations a appreciable menace on customers and what is genuine.

“People will have to consider energetic caution when applying the website now and steer crystal clear of any requests for private data or qualifications. It is also truly worth noting that Twitter Blue will not contact you through an email requesting payment facts as this can only be carried out by using the app.”

Scenario in stage, earlier this thirty day period, Twitter end users with “confirmed” position have been bombarded by phishing attempts by way of email and on the system by itself.


Some areas of this short article are sourced from:
www.infosecurity-journal.com

Previous Post: «experts uncover two long running android spyware campaigns targeting uyghurs Experts Uncover Two Long-Running Android Spyware Campaigns Targeting Uyghurs
Next Post: Man Arrested in Ontario For Alleged LockBit Ransomware Involvement Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Qilin Ransomware Adds “Call Lawyer” Feature to Pressure Victims for Larger Ransoms
  • Iran’s State TV Hijacked Mid-Broadcast Amid Geopolitical Tensions; $90M Stolen in Crypto Heist
  • 6 Steps to 24/7 In-House SOC Success
  • Massive 7.3 Tbps DDoS Attack Delivers 37.4 TB in 45 Seconds, Targeting Hosting Provider
  • 67 Trojanized GitHub Repositories Found in Campaign Targeting Gamers and Developers
  • New Android Malware Surge Hits Devices via Overlays, Virtualization Fraud and NFC Theft
  • BlueNoroff Deepfake Zoom Scam Hits Crypto Employee with MacOS Backdoor Malware
  • Secure Vibe Coding: The Complete New Guide
  • Uncover LOTS Attacks Hiding in Trusted Tools — Learn How in This Free Expert Session
  • Russian APT29 Exploits Gmail App Passwords to Bypass 2FA in Targeted Phishing Campaign

Copyright © TheCyberSecurity.News, All Rights Reserved.