News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Kaspersky: Expert opinion on the Twitter hack
Kaspersky_news

Cyber ​​criminals have succeeded in taking over the Twitter accounts of famous people like Barack Obama or Elon Musk and promoting a supposed cryptocurrency deal in order to steal bitcoins. Twitter is now assuming a social engineering attack on its own employees, which led to the hacked accounts of Elon Musk and Co., as Dmitry Bestuzhev, cybersecurity expert at Kaspersky, had already suspected. Costin Raiu, head of the Global Research and Analysis Team (GReAT) at Kaspersky, assesses the new findings as follows: "Yesterday's attack is possibly one of the worst security incidents on Twitter, if not ...

Read more

Twitter hack: Insiders remain the greatest risk
Exabeam_n

“The key to successfully uncovering such an attack is to be able to identify changes in user behavior.” Comment by Egon Kando, Exabeam “The coordinated social engineering attack on Twitter is unprecedented. What seems clear at this point is that it is an attack based on compromised user data, either by unsuspecting employees or via an allegedly malicious insider on the network. Both of these things often happen, as almost half of all data breaches are caused, consciously or unconsciously, by some type of insider threat. You cannot always trust your own employees. Almost all ...

Read more

Twitter: Did the attackers take advantage of the home work situation?
Bitdefender_News

"Twitter hackers could have done more damage, but wanted a quick buck." Commentary by Liviu Arsene, Senior Digital Threat Analyst at Bitdefender The spectacular attack on prominent Twitter accounts, which are likely to be secured by two-factor authentication, can only indicate a coordinated cyber attack on Twitter's employees and systems. It can be assumed that the attackers exploited the home office context: Employees here are much more likely to fall victim to fraud and spam emails, which then compromise devices and ultimately corporate systems. The Twitter breach could be the result of a spray-and-pray spearphishing campaign that cybercriminals successfully…

Read more