When we warned on Twitter yesterday about an attack that resulted in many VIPs starting to post a cryptocurrency scam on Twitter, we didn't know what was causing the attacks. Phishing? Malware? Twitter gap? Today it is known that someone made a phishing attack on Twitter employees and thus gained access to internal tools that allowed him to take over the accounts of dozens of prominent figures. How?
DISCLAIMER: The solutions presented on this page are the property of ACME LABS Sp. z o.o. and are subject to legal protection in Poland and abroad, on the basis of intellectual and industrial property rights.