Mastering X and Twitter Takedowns: How to Handle Brand Impersonations

Mastering X and Twitter Takedowns: How to Handle Brand Impersonations

Table of Contents Distinguishing brand impersonations in the world of X/Twitter can sometimes be perplexing. Unlike LinkedIn, which enforces more stringent measures against misrepresentation, X tends to take a more flexible stance ...
app, sideloading, MDM, Apple, IoS, SEC SIM swap X account

SEC X Account Hack is a Case of SIM Swapping

| | SEC, SIM swap scams, Twitter, X
The bad actor who hacked into the X account of the Securities and Exchange Commission (SEC) earlier this month gained access through a SIM swapping attack on the agency’s phone linked to ...
Security Boulevard
2023 Cybersecurity Predictions: What We Got Right and Wrong

The Year in Review and 2024 Predictions

In our last episode of the year, we replay our predictions for 2023 reviewing what we got right and what we didn’t. We cover various topics, such as Twitter’s influence, the future ...
Meta TikTok disinformation EU

EU Wants Details from Meta, TikTok About Disinformation Measures

| | disinformation, eu, Hamas, israel, X
The European Union is putting more pressure on social media companies to crack down on disinformation that has been spreading rapidly on their platforms since the start of fighting between Israel and ...
Security Boulevard

Content Creation, Mental Health in Cyber, The MGM Ransomware Attack

In this episode Matt Johansen, Security Architect at Reddit and Vulnerable U newsletter and YouTube content creator, joins host Tom Eston to discuss Matt’s background as one of the original “Security Twits”, ...
Back to School Cybersecurity, Phishing Pitfalls and Strategies, X's (Twitter) Blocking Overhaul

Back to School Cybersecurity, Phishing Pitfalls and Strategies, X’s (Twitter) Blocking Overhaul

In this episode, we discuss essential cybersecurity tips for students and educational institutions as they gear up for the school season. From software updates to strong passwords and cybersecurity education, we explore ...

Application Security Check Up