Abortion disinformation is growing and dangerously divisive, experts say

Written by Suzanne Smalley Jul 5, 2022 | CYBERSCOOP Rep. Marjorie Taylor Greene’s Twitter account struck an urgent tone the Sunday after the Supreme Court’s historic abortion ruling. She implored…

Twitter may have given user's private data to a ransomware hacker, who then ran a researcher offline

Written by AJ Vicens May 2, 2022 | CYBERSCOOP A man living in Russia whom the U.S. government accused of being involved in multiple REvil ransomware attacks may be involved…

Elon Musk Wants to Make Twitter DMs End-to-End Encrypted

The SpaceX CEO and Tesla, the Twitter owner, seem to be very impressed by the encrypted instant messaging service Signal. Elon Musk recently acquired Twitter for a whopping $44 billion…

Venezuelan leftists took to Twitter in attempt to swing Colombian presidential election

Written by Suzanne Smalley Mar 21, 2022 | CYBERSCOOP Venezuelan leftist organizations orchestrated a disinformation campaign to drive social media narratives supporting a leftist Colombian presidential candidate who is currently…

Twitter Goes on Tor with New Dark Web Domain to Evade Censorship

Twitter is now available on the dark web with its first-ever .Onion domain accessible through Tor browser for those facing government censorship. While Russia is blocking and banning social media…

Facebook, Twitter, Google move to intercept Russian propaganda, disinformation about Ukraine

Written by Tim Starks Feb 28, 2022 | CYBERSCOOP In recent days, social media companies have gotten more active in stemming the flow of official Russian propaganda, as well tackling…

Twitter down – You are not alone Twitter is down for many

The social networking and online news site Twitter is down right now for many around the world. This comes as a surprise since Twitter has a proven track record of…

The Best Twitter Cybersecurity Accounts You Should Follow [Updated 2021]

Security experts, researchers, and cyber enthusiasts abound on Twitter, eager to share their ideas, news, and research on information security, industry best practices, and the most recent dangers. If you’re…

NSO zero-click iMessage exploit hacks iPhone without need to click links

The IT security researchers at Google have declared the NSO zero-click iMessage exploit as “Terrifying.” Google Project Zero’s (GPZ) Ian Beer and Samuel Groß have shared details on a new…

The Log4j Vulnerability Is Now Used by State-Backed Hackers

The vulnerability, officially tagged as CVE-2021-44228 and called Log4Shell or LogJam, is an unauthenticated RCE vulnerability that allows total system takeover on systems running Log4j 2.0-beta9 through 2.14.1. What Happened? Nation-state hackers…