Cybersecurity Weekly: Whistleblower hits Twitter cybersecurity, LastPass data breach, Twilio hack leads to Authy 2FA access
Cybersecurity bombshell from whistleblower puts Twitter on its heels, LastPass data breach leaks source code, and Twilio breach leads to Authy 2FA account access. All these and more in this week's edition of Cybersecurity Weekly.
1. Ex-Twitter exec blows the whistle, alleging reckless and negligent cybersecurity policies
Twitter has major security problems that pose a threat to its own users’ personal information, to company shareholders, to national security, and to democracy, according to an explosive whistleblower disclosure
2. LastPass suffers data breach, source code stolen
Researchers warned that cyberattackers will be probing the code for weaknesses to exploit later.
3. Twilio breach let hackers gain access to Authy 2FA accounts
Twilio’s investigation into the attack on August 4 reveals that hackers gained access to some Authy user accounts and registered unauthorized devices.
4. Plex imposes password reset after hackers steal data for >15 million users
Intruders access personal information for the majority of its 30 million users.
5. Two-thirds of security pros says their cloud apps and infrastructures are vulnerable
Two-thirds of CISOs say their organizations are vulnerable when it comes to cloud applications and infrastructure, such as Google Cloud, new research by Nuspire found.
Sean's Test Ad
- Sean's
- Test
- Ad
In this series
- Cybersecurity Weekly: Whistleblower hits Twitter cybersecurity, LastPass data breach, Twilio hack leads to Authy 2FA access
- How to become a cybercrime investigator
- CEH version comparison: V12 to V13 evolution guide
- ISC2 CSSLP certification overview: What you need to know
- ISC2 CGRC: Overview & career path
- CRISC certification: Overview & career path [updated 2021]
- PMP certification: Overview and career path [updated 2021]
- ISACA CDPSE certification: Overview of the new ISACA privacy certification
- CGEIT certification: Overview and career path [updated 2021]
- What is a cyber range?
- Microsoft azure certification: Overview And career path
- CEH salary guide: What Certified Ethical Hackers really earn
- CCSP salary: How much can you make as a cloud security professional?
- Average CGRC (Certified in Governance, Risk and Compliance) salary
- CRISC Frequently Asked Questions (FAQ) [updated 2022]
- Average CSSLP Salary in 2021
- ISACA CDPSE exam details and process
- How To Become CGEIT Certified – Certification Requirements [updated 2021]
- How to pick the best cyber range for your cybersecurity training needs and budget
- CEH exam eligibility: Application process & requirements guide
- CISSP domains overview: Your complete preparation guide
- CCSP exam and CBK changes in August 2024
- Average CRISC Salary [2023 update]
- CGRC certification job titles and career outlook
- ISC2 CSSLP exam details and process
- ISACA CDPSE certification exam: Overview of domains
- An Introduction to the PMP: Exam Details and Process [updated 2021]
- CGEIT certification exam: overview of domains [Updated 2021]
- 10 Success Tips: How to Pass Your Certified Ethical Hacker (CEH) Exam
- How to become CCSP certified: Certification requirements
- Certified in Risk & Information Systems Control (CRISC) Exam Overview [updated 2022]
- ISC2 CGRC exam details and process
- Best CSSLP study resources and training materials
- ISACA CDPSE domain 1: Privacy governance
- 10 Tips for PMP Certification Exam Success [updated 2021]
- CGEIT certification exam details and process [updated 2021]
- Certified Ethical Hacker (CEH) study guides & resources [updated 2025]
- CCSP exam details and process in 2025: Your guide to cybersecurity certification success
- Top 20 project management interview questions in 2024
- ISC2 CGRC certification exam: Overview of domains
- CRISC: Exam details & process [updated 2021]
- Maintaining your CSSLP: CPE and renewal requirements
- CGEIT Frequently Asked Questions (FAQ) [updated 2021]
- Scalability & elasticity: Technical considerations when selecting a cyber range
- Certified Ethical Hacker (CEH) job outlook [updated 2025]
- Test your cloud knowledge with these CCSP sample questions
- Best CGRC certification study resources and training materials
- CRISC: Overview of domains [updated 2021]
- ISACA CDPSE domain 3: Data lifecycle
- ISC2 CSSLP job titles and career outlook
- PMP®️ domain information & overview [updated 2021]
Cybercrime investigator
Cybercrime has hit record levels, with an expected $7 trillion USD to be made from cybercriminal activity by 2021. Investigating these sorts of crimes can be
September 9, 2020
Susan Morrow
EC-Council CEH
CEH v13 is the world's first AI-powered ethical hacking certification. Discover what's new, how it compares to v12/v11 and why it's a career game-changer.
September 15, 2025
Graeme Messina
ISC2 CSSLP
Becoming a Certified Secure Software Lifecycle Professional (CSSLP) validates your knowledge and skills around developing secure code and software.
January 28, 2025
Daniel Brecht
ISC2 CGRC
Earning the Certified in Governance, Risk and Compliance certification can help prove to employers that you stand well above the rest.
March 16, 2022
Dan Virgillito