Thursday, March 6, 2025
HomeCyber Security NewsRussia Blocked Access to Facebook, Twitter, Foreign News Outlets

Russia Blocked Access to Facebook, Twitter, Foreign News Outlets

Published on

SIEM as a Service

Follow Us on Google News

Lots of things have been happening ever since the invasion of Russia on Ukraine. People all over the world have been supporting both Russia and Ukraine.

The Russian government came to know that social media has been spreading a lot of fake news about the Ukrainian territory. 

Following this, the Federal Service for Supervision of Communications Information Technology and Mass Media (Roskomnadzor) has blocked the social media Twitter and so many other media operating outside of Russia.

Roskomnadzor said that the Prosecutor general’s office demanded twitter.com to be restricted across Russia. Previously Facebook and many other news channels were completely blocked.

The Russian government said that “the purposeful and systematic publishing of materials containing false information with the essence of the special military operation in Ukrainian territory, methods of military operations and the number of casualties in the Russian armed forces and the civilian population.”

Other media outlets like BBC, DW, Medusa, Radio-Free Europe / Radio Liberty, and a number of other information resources were also blocked.

Russian telecommunications regulator, Roskomnadzor, said that “blocking Facebook was made in response to the platform’s alleged “discrimination” against Russian media, citing 26 cases since October 2020″.

Some of the users also reported that Internet speeds are slow when entering sites from Russian IP addresses and websites not accessible.

Meta took down 40 accounts, pages, and groups on Facebook and Instagram, Nathaniel Gleicher and David Agranovich, Meta’s head of security policy said that the networks were run from Russia and Ukraine.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

InvokeADCheck – New Powershell Module for Active Directory Assessment

Orange Cyberdefense has announced the development of InvokeADCheck, a new PowerShell module designed to...

Detecting Malicious Activities With Traffic Distribution Systems

Traffic Distribution Systems (TDS) have emerged as critical tools for both legitimate and malicious...

Hackers Deploy Advanced Social Engineering Tactics in Phishing Attacks

Cybercriminals are evolving their phishing methods, employing more sophisticated social engineering tactics to deceive...

Cybercriminals Exploit Compromised Email Servers for Fraudulent Campaigns

Trend Micro's Managed XDR team has recently investigated a sophisticated Business Email Compromise (BEC)...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

InvokeADCheck – New Powershell Module for Active Directory Assessment

Orange Cyberdefense has announced the development of InvokeADCheck, a new PowerShell module designed to...

Detecting Malicious Activities With Traffic Distribution Systems

Traffic Distribution Systems (TDS) have emerged as critical tools for both legitimate and malicious...

Hackers Deploy Advanced Social Engineering Tactics in Phishing Attacks

Cybercriminals are evolving their phishing methods, employing more sophisticated social engineering tactics to deceive...