Tuesday, March 4, 2025
HomeUncategorizedTwitter mistakenly suspended its own CEO’s Twitter account

Twitter mistakenly suspended its own CEO’s Twitter account

Published on

SIEM as a Service

Follow Us on Google News

Twitter co-founder and CEO Jack Dorsey found his account on the micro-blogging site briefly suspended Tuesday. For about 30 minutes, starting 8:45 p.m. EST, his account status showed as “suspended.”

jack

Dorsey’s account was restored about half hour later, and at 9:15 p.m. EST, he had around 200 followers. Eventually, all his 3.8 million followers on the social network were restored.

Dorsey later tweeted the suspension was an “internal mistake.” He even joked by posting his first tweet — “just setting up my twttr.”

The service has been slow to suspend people for hate speech and harassment in the past, but is usually quick to remove accounts that post obscene images or videos. Speculating entirely, it could be that Dorsey was the target of a hacking attempt, and his account was taken down to preemptively halt any kind of public performance, while Twitter worked to get it back into his hands.

filll2
flll

Twitter generally suspends hacked accounts or those which have been flagged for sending abusive or spam tweets. The social network has been actively suspending accounts recently, including many accounts last week related to the white nationalist “alt-right” movement. The heads of various companies have suffered from hacking in the past. In August this year, Wikipedia co-founder Jimmy Wales’ Twitter account was hacked, while in April 2015, Tesla CEO Elon Musk’s account was hacked.

The company also issued new developer policies Tuesday prohibiting surveillance using the social network.

“We prohibit developers using the Public APIs and Gnip data products from allowing law enforcement — or any other entity — to use Twitter data for surveillance purposes. Period.” Chris Moody, general manager, Data & Enterprise Solutions, posted on the Twitter blog Tuesday.

He further added: “If developers violate our policies, we will take appropriate action, which can include suspension and termination of access to Twitter’s Public APIs and data products.”

Social-media accounts of tech executives are a ripe target for hackers. In July, both Mr. Dorsey’s Twitter and Vine accounts were compromised, and Facebook Inc. Chief Executive Mark Zuckerberg’s accounts on both Twitter and Pinterest were hacked in June.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Pathfinder AI – Hunters Announces New AI Capabilities for Smarter SOC Automation

Pathfinder AI expands Hunters' vision for AI-driven SOCs, introducing Agentic AI for autonomous investigation...

Google Secretly Tracks Android Devices Even Without User-Opened Apps

A recent technical study conducted by researchers at Trinity College Dublin has revealed that...

LLMjacking – Hackers Abuse GenAI With AWS NHIs to Hijack Cloud LLMs

In a concerning development, cybercriminals are increasingly targeting cloud-based generative AI (GenAI) services in...

Microsoft Strengthens Trust Boundary for VBS Enclaves

Microsoft has introduced a series of technical recommendations to bolster the security of Virtualization-Based...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

PostgreSQL Vulnerability Allows Hackers To Execute Arbitrary SQL Functions

A critical vulnerability identified as CVE-2024-7348 has been discovered in PostgreSQL, enabling attackers to...

Security Risk Advisors Announces Launch of VECTR Enterprise Edition

Security Risk Advisors (SRA) announces the launch of VECTR Enterprise Edition, a premium version...

4 Leading Methods of Increasing Business Efficiency 

The more efficient your core business operations, the more motivated and productive your employees...