#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News

HootSuite | Breaking Cybersecurity News | The Hacker News

Category — HootSuite
Security breach at OAuth based applications can cause Social Media Disaster

Security breach at OAuth based applications can cause Social Media Disaster

Oct 28, 2013
With all the popular social networking websites there on the web, managing them from several different internet browser tabs or windows can get frustrated very quickly. Besides our own Facebook Page, Twitter account, and Google+ profile, I also manage several others and, YES, I feel the " time management " pain! To make social media management and monitoring easier for users, some very innovative desktop applications and mobile apps were developed to help organize multiple platforms and information sharing across selected networks. Using online tools like TweetDeck, Seesmic, Hootsuite , Feedly, Twuffer and Buffer App for scheduling and posting directly from a web page has become an absolute necessity especially where Twitter is concerned. Additionally these apps gives you the ability to post on one or all of your connected accounts together i.e Multiple Facebook, Twitter or Google+ profiles. These applications don't require your passwords for social me...
HootSuite technical issue exposed emails of thousands of users

HootSuite technical issue exposed emails of thousands of users

Nov 12, 2012
Social Media Management tool HootSuite today face technical issue and expose email address's of thousands of users. Due of error lots of people receive email reminders with warning that their free 60-day HootSuite Pro trial was about to end, but also included the names and email addresses of other people using the service. Image Source : TNW According to Hootsuite, the incident occurred to under 4000 emails and many of the users who are getting the email spam were not even signed up for HootSuite's Pro trial. In a blog post HootSuite said, " At this time, we are requesting that recipients destroy the messages in order to help us contain the issue. Privacy is a paramount concern for HootSuite and this is in no way a reflection of the respect we have for our users and their privacy ." " Given HootSuite's recent acquisition of Seesmic, we could speculate that the mass of emails could be down to a failed import of user accounts. We have, of course, re...
Want to Grow Vulnerability Management into Exposure Management? Start Here!

Want to Grow Vulnerability Management into Exposure Management? Start Here!

Dec 05, 2024Attack Surface / Exposure Management
Vulnerability Management (VM) has long been a cornerstone of organizational cybersecurity. Nearly as old as the discipline of cybersecurity itself, it aims to help organizations identify and address potential security issues before they become serious problems. Yet, in recent years, the limitations of this approach have become increasingly evident.  At its core, Vulnerability Management processes remain essential for identifying and addressing weaknesses. But as time marches on and attack avenues evolve, this approach is beginning to show its age. In a recent report, How to Grow Vulnerability Management into Exposure Management (Gartner, How to Grow Vulnerability Management Into Exposure Management, 8 November 2024, Mitchell Schneider Et Al.), we believe Gartner® addresses this point precisely and demonstrates how organizations can – and must – shift from a vulnerability-centric strategy to a broader Exposure Management (EM) framework. We feel it's more than a worthwhile read an...
Expert Insights / Articles Videos
Cybersecurity Resources