

Ed Bishop
CTO /*=$expert->feature_status*/ ?>
Tessian
Comments Dotted :
1
July 16, 2020
Twitter's description of the attack highlights the need to protect people within an organization at all costs.
Although this incident started with a social engineering attack, this is just the beginning. Once someone's account has been compromised, an attacker will often launch a horizontal attack within the organization to compromise more internal accounts, until they reach the account with the permissions they need. The attacker must have either known Twitter's systems, or spent time poking around, to learn how to backdoor into people's accounts and tweet on their behalf.
Twitter's description of.....Read More
