On August 5, Twitter announced a cyberattack in which the data of 5.4 million users of the platform was stolen and shared. Although no passwords were revealed, the cybercriminals are using stolen email addresses and phone numbers to launch further attacks.

Twitter users will be informed

confirmed the incident in a blog post Accordingly, the error was already in the relevant code in June 2021. However, in January 2022, when Twitter learned of the vulnerability, the company was unable to discover any evidence of unauthorized data access. The data sets that appeared in July 2022 have now been analyzed and their authenticity has been confirmed!

To limit the damage, Check Point® Software Technologies Ltd. warns. all Twitter users from the dangers posed by the data leak.

1. Beware of phishing

In cyberattacks of this type, the leaked email addresses are often reused to send phishing campaigns with fraudulent links or malware-laden attachments. Therefore, you should exercise extreme caution and under no circumstances click on any emails that contain links or attachments.

2. Use unique and strong passwords

It's important to use different passwords for every account, platform, and device you use. Because if one is stolen, the perpetrator will have access to all your other accounts and can cause much more damage than expected. Additionally, make sure to change your passwords regularly and that all passwords are robust and contain a mix of upper and lower case letters as well as numbers and symbols.

3. Enable two-factor authentication

This additional layer of security means that in order to access a service, in addition to entering the password, a security code or key must also be entered on the user's personal device. This achieves a much higher level of protection.

4. Current software

To prevent cyber threats from accessing systems, it is very important that all applications and device tools are up to date. Ultimately, it is crucial to have a robust cybersecurity solution to combat any type of threat.

Source: Check Point Software Technologies Ltd.

Related to the topic: Twitter makes data protection guidelines more understandable


If you enjoyed this post and value the importance of well-founded information, become part of the exclusive Mimikama Club! Support our work and help us promote awareness and combat misinformation. As a club member you receive:

📬 Special Weekly Newsletter: Get exclusive content straight to your inbox.
🎥 Exclusive video* “Fact Checker Basic Course”: Learn from Andre Wolf how to recognize and combat misinformation.
📅 Early access to in-depth articles and fact checks: always be one step ahead.
📄 Bonus articles, just for you: Discover content you won't find anywhere else.
📝 Participation in webinars and workshops : Join us live or watch the recordings.
✔️ Quality exchange: Discuss safely in our comment function without trolls and bots.

Join us and become part of a community that stands for truth and clarity. Together we can make the world a little better!

* In this special course, Andre Wolf will teach you how to recognize and effectively combat misinformation. After completing the video, you have the opportunity to join our research team and actively participate in the education - an opportunity that is exclusively reserved for our club members!


Notes:
1) This content reflects the current state of affairs at the time of publication. The reproduction of individual images, screenshots, embeds or video sequences serves to discuss the topic. 2) Individual contributions were created through the use of machine assistance and were carefully checked by the Mimikama editorial team before publication. ( Reason )