What Could Have Prevented 2020's Massive Twitter Hack?

What Could Have Prevented 2020's Massive Twitter Hack?

Enterprises must implement biometric multi-factor authentication to ensure that only the right users have access to the right systems at all times.

Attacks and account take-overs like the recent Twitter hack are completely avoidable. Enterprises must implement biometric multi-factor authentication to ensure that only the right users have access to the right systems at all times. If they don’t, users will continue being vulnerable to hacks and scams.

“A New York Times report that has yet to be confirmed by Twitter said that _**_hackers breached employee Slack accounts and found credentials for the Twitter backend pinned inside a Slack channel,**_” — [ZDNet_](https://www.zdnet.com/article/twitter-says-hackers-downloaded-the-data-of-eight-users-in-wednesdays-hack/?ref=hackernoon.com)

The hackers responsible for last week’s attack were able to breach Twitter’s backend systems by *stealing credentials *from within the social media platform’s private employee Slack channel. Once inside Twitter’s systems, the attackers were then free to take over at least 103 accounts and download the personal data of at least 8 accounts.

In light of this unprecedented attack, we have to ask ourselves some serious questions — what were login credentials doing on the public Slack channel in the first place? Why were they posted there publicly for ease of access? How did the hackers get access to Twitter’s slack? Were those credentials phished out of an employee in an advanced social engineering attack?

If there’s one thing that’s certain, it’s that *passwords are inherently insecure, and failing us. *Despite the known security risks, even the world’s biggest companies still struggle with enforcing proper password hygiene.

security

Bootstrap 5 Complete Course with Examples

Bootstrap 5 Tutorial - Bootstrap 5 Crash Course for Beginners

Nest.JS Tutorial for Beginners

Hello Vue 3: A First Look at Vue 3 and the Composition API

Building a simple Applications with Vue 3

Deno Crash Course: Explore Deno and Create a full REST API with Deno

How to Build a Real-time Chat App with Deno and WebSockets

Convert HTML to Markdown Online

HTML entity encoder decoder Online

Best Custom Web & Mobile App Development Company

Top Web & Mobile Application Development Company in India & USA. We specialize in Golang, Ruby on Rails, Symfony, Laravel PHP, Python, Angular, Mobile Apps, Blockchain, & Chatbots

10 Cyber Security Tools to Watch Out for in 2021 - DZone Security

In this article, take a look at ten cyber security tools to watch out for in 2021, including NMap, Wireshark, Metasploit, and more!

How to Keep Your Java Applications Secure - DZone Security

The solution to keeping your Java applications secure is simple: make sure they stay up to date. Check out the details within.

What are the top Cyber Security Threats in 2020?

Learn Cyber Defense programming by Cyber Security Training. Know how to stop tactics of ransomware, malware, social engineering, phishing by hacking course.

Cloud Security: Is it Worth it?

Storing and managing corporate data by applying the cloud is becoming more and more popular. Companies grow, and it gets too expensive, and resources consuming to store their data on traditional servers. To prove it, look at the research conducted by Google in 2019 that includes insights for the cloud computing market for the next 10 years.