{"id":48521,"date":"2022-09-20T13:31:27","date_gmt":"2022-09-20T13:31:27","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/33857\/Shareholders-File-Suit-Against-Twitter-Following-Former-CISOs-Warnings.html"},"modified":"2022-09-20T13:31:27","modified_gmt":"2022-09-20T13:31:27","slug":"shareholders-file-suit-against-twitter-following-former-cisos-warnings","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/shareholders-file-suit-against-twitter-following-former-cisos-warnings\/","title":{"rendered":"Shareholders File Suit Against Twitter Following Former CISO&#8217;s Warnings"},"content":{"rendered":"<div>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/cdn.scmagazine.com\/wp-content\/uploads\/2022\/08\/080222_twitter_logo-1024x614.jpg\" alt=\"The Twitter logo, a blue bird in a white square, is displayed on a device screen.\" class=\"wp-image-417664\"><figcaption>Twitter shareholders are suing the social media company following a whistleblower complaint and public testimony from former chief information security officer Peiter \u201cMudge\u201d Zatko. (Photo by Bethany Clarke\/Getty Images)<\/figcaption><\/figure>\n<\/div>\n<p>Shareholders are suing Twitter following a whistleblower complaint and public testimony from former chief information security officer Peiter \u201cMudge\u201d Zatko, claiming the company deceived investors in public disclosures about the state of their security.<\/p>\n<p>The lawsuit, filed Sept. 13, <a href=\"https:\/\/www.scmagazine.com\/analysis\/application-security\/twitter-whistleblower-lack-of-access-data-controls-invite-exploitation\" target=\"_blank\" rel=\"noreferrer noopener\">the same day<\/a> Zatko testified about the security problems in front of the Senate Judiciary Committee, names Twitter along with former chief executive officer Jack Dorsey, current CEO Parag Agrawal and chief financial officer Ned Segal as defendants.<\/p>\n<p>According to the <a rel=\"noreferrer noopener\" href=\"https:\/\/www.documentcloud.org\/documents\/22418476-baker-v-twitter-complaint\" target=\"_blank\">complaint<\/a>, the shareholders argue that Twitter knew its security practices were deficient, putting user and advertiser information at risk and cite filings to the Securities and Exchange Commission between 2020 and 2022 that note \u201csecurity incidents \u2026 may expose us to a risk of loss of this information, litigation, increased security costs and potential liability.\u201d<\/p>\n<p>&nbsp;Such a breach \u2014 whether actual or perceived \u2014 could have a negative impact on the market\u2019s perception of the company\u2019s security posture, harm users and advertisers and decrease trust in the overall product.<\/p>\n<p>\u201cTwitter knew about security concerns on their platform; Twitter actively worked to hide the security concerns from the board, the investing public, and regulators; contrary to representations in SEC filings, Twitter did not take steps to improve security; Twitter\u2019s active refusal to address security issues increased the risk of loss of public goodwill; and as a result, Defendants\u2019 statements about Twitter\u2019s business, operations, and prospects, were materially false and misleading and\/or lacked a reasonable basis at all relevant times,\u201d the complaint states.<\/p>\n<p>The bulk of the evidence put forth by the plaintiffs are drawn from Zatko\u2019s whistleblower complaint, which alleged that Twitter\u2019s leadership misled its own board about security vulnerabilities, could not locate much of the data they collected and stored around users and, as a result, needed to provide broad administrative access to software engineers and developers.<\/p>\n<p>That left that data exposed to phishing and other credential-based attacks, like the kind that took place in 2020 when teenage hackers were able to hijack an administrative account and take control of high-profile Twitter accounts to advertise a cryptocurrency scam. Zakto also said that the company\u2019s lack of data center redundancy put it at risk of disruptions and shutdowns.<\/p>\n<p>The day Zatko\u2019s complaint was <a href=\"https:\/\/www.cnn.com\/2022\/08\/23\/tech\/twitter-whistleblower-peiter-zatko-security\/index.html\" target=\"_blank\" rel=\"noreferrer noopener\">made public<\/a>, Twitter\u2019s stock price dropped by 7%.<\/p>\n<p>Further, the shareholders claim that prior to Zatko\u2019s disclosures, Twitter should have already been on notice that its security practices were going to be under scrutiny due to a 2011 consent decree with the Federal Trade Commission that required it to put a robust information security program around non-public user information and required the company to undergo biennial security audits.<\/p>\n<p>\u201cAs a result of Defendants\u2019 wrongful acts and omissions, and the precipitous decline in the market value of the Company\u2019s common shares, Plaintiff and other Class members have suffered significant losses and damages,\u201d the complaint states.<\/p>\n<p>The core argument by the plaintiffs \u2014 that Twitter\u2019s public statements to the SEC and investors demonstrate that they knew a deficient security would be bad for business and led to shareholders paying for artificially inflated stock prices \u2014 is similar to what SolarWinds shareholders <a rel=\"noreferrer noopener\" href=\"https:\/\/www.scmagazine.com\/news\/supply-chain\/solarwinds-lawsuit-claims-private-equity-owners-sacrificed-cybersecurity-to-boost-short-term-profits\" target=\"_blank\">have claimed<\/a> in their own lawsuit following the Orion breach.<\/p>\n<p>Earlier this year, a judge <a rel=\"noreferrer noopener\" href=\"https:\/\/www.scmagazine.com\/analysis\/incident-response\/solarwinds-lawsuits-can-proceed-texas-judge-rules\" target=\"_blank\">declined a request<\/a> by SolarWinds and its private equity owners to dismiss the suit, saying shareholders had sufficiently demonstrated that CISO Tim Brown and the company acted with \u201cat least, severe recklessness\u201d when touting the company\u2019s security environment in media interviews and public filings.<\/p>\n<p>Tyson Benson, an attorney with ZF Group, told SC Media that based on the complaint, the shareholders appear to be arguing that even as Twitter hired Zatko as CISO and were receiving new insights into the porous state of its cybersecurity, the language in SEC disclosures remained the same, using language this year that was identical to previous years\u2019 filings.<\/p>\n<p>One chief difference between this and the SolarWinds lawsuit: whereas SolarWinds argued that there was no proof that previous warnings about security holes made by a consultant prior to the Orion breach made it up to the CEO and other leadership, Zatko was Twitter\u2019s chief security official and his complaint makes it clear his concerns were relayed to the highest levels of the company.<\/p>\n<p>\u201cWhat has happened is because of the Zatko congressional hearing \u2014 it put a spotlight on \u2026 all of these filings and what the plaintiffs are alleging is, \u2018Hey, none of this information found its way into these reportings that are required from SEC \u2014 and so because of this active neglect or behavior \u2026 that consumers and stock investors were not properly being brought up to date on the actual security environment at Twitter,\u2019\u201d said Benson. &nbsp;<\/p>\n<p>The 2011 consent decree with the FTC may add to that argument and help \u201cset the stage\u201d for shareholders to demonstrate previous bad security,&nbsp;but ultimately Benson said the Twitter lawsuit will need to clear a similar bar, proving that company officials were aware that shortcomings listed in the whistleblower complaint made their previous SEC disclosures inaccurate and that they intended to deceive the government and public with identical statements this year.<\/p>\n<p>\u201cWhat the plaintiffs would be saying is at each time they\u2019re re-using the same statement, and even after Mudge came forward, nothing has changed in this statement,\u201d said Benson.<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/33857\/Shareholders-File-Suit-Against-Twitter-Following-Former-CISOs-Warnings.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":48522,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[10203],"class_list":["post-48521","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackergovernmentprivacydata-losscyberwarspywaretwitter"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Shareholders File Suit Against Twitter Following Former CISO&#039;s Warnings 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/shareholders-file-suit-against-twitter-following-former-cisos-warnings\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Shareholders File Suit Against Twitter Following Former CISO&#039;s Warnings 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/shareholders-file-suit-against-twitter-following-former-cisos-warnings\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-20T13:31:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.scmagazine.com\/wp-content\/uploads\/2022\/08\/080222_twitter_logo-1024x614.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/shareholders-file-suit-against-twitter-following-former-cisos-warnings\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/shareholders-file-suit-against-twitter-following-former-cisos-warnings\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Shareholders File Suit Against Twitter Following Former CISO&#8217;s Warnings\",\"datePublished\":\"2022-09-20T13:31:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/shareholders-file-suit-against-twitter-following-former-cisos-warnings\\\/\"},\"wordCount\":928,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/shareholders-file-suit-against-twitter-following-former-cisos-warnings\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/shareholders-file-suit-against-twitter-following-former-cisos-warnings.jpg\",\"keywords\":[\"headline,hacker,government,privacy,data loss,cyberwar,spyware,twitter\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/shareholders-file-suit-against-twitter-following-former-cisos-warnings\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/shareholders-file-suit-against-twitter-following-former-cisos-warnings\\\/\",\"name\":\"Shareholders File Suit Against Twitter Following Former CISO's Warnings 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/shareholders-file-suit-against-twitter-following-former-cisos-warnings\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/shareholders-file-suit-against-twitter-following-former-cisos-warnings\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/shareholders-file-suit-against-twitter-following-former-cisos-warnings.jpg\",\"datePublished\":\"2022-09-20T13:31:27+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/shareholders-file-suit-against-twitter-following-former-cisos-warnings\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/shareholders-file-suit-against-twitter-following-former-cisos-warnings\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/shareholders-file-suit-against-twitter-following-former-cisos-warnings\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/shareholders-file-suit-against-twitter-following-former-cisos-warnings.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/shareholders-file-suit-against-twitter-following-former-cisos-warnings.jpg\",\"width\":1024,\"height\":614},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/shareholders-file-suit-against-twitter-following-former-cisos-warnings\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,government,privacy,data loss,cyberwar,spyware,twitter\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackergovernmentprivacydata-losscyberwarspywaretwitter\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Shareholders File Suit Against Twitter Following Former CISO&#8217;s Warnings\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Shareholders File Suit Against Twitter Following Former CISO's Warnings 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/shareholders-file-suit-against-twitter-following-former-cisos-warnings\/","og_locale":"en_US","og_type":"article","og_title":"Shareholders File Suit Against Twitter Following Former CISO's Warnings 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/shareholders-file-suit-against-twitter-following-former-cisos-warnings\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-09-20T13:31:27+00:00","og_image":[{"url":"https:\/\/cdn.scmagazine.com\/wp-content\/uploads\/2022\/08\/080222_twitter_logo-1024x614.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/shareholders-file-suit-against-twitter-following-former-cisos-warnings\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/shareholders-file-suit-against-twitter-following-former-cisos-warnings\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Shareholders File Suit Against Twitter Following Former CISO&#8217;s Warnings","datePublished":"2022-09-20T13:31:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/shareholders-file-suit-against-twitter-following-former-cisos-warnings\/"},"wordCount":928,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/shareholders-file-suit-against-twitter-following-former-cisos-warnings\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/09\/shareholders-file-suit-against-twitter-following-former-cisos-warnings.jpg","keywords":["headline,hacker,government,privacy,data loss,cyberwar,spyware,twitter"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/shareholders-file-suit-against-twitter-following-former-cisos-warnings\/","url":"https:\/\/www.threatshub.org\/blog\/shareholders-file-suit-against-twitter-following-former-cisos-warnings\/","name":"Shareholders File Suit Against Twitter Following Former CISO's Warnings 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/shareholders-file-suit-against-twitter-following-former-cisos-warnings\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/shareholders-file-suit-against-twitter-following-former-cisos-warnings\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/09\/shareholders-file-suit-against-twitter-following-former-cisos-warnings.jpg","datePublished":"2022-09-20T13:31:27+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/shareholders-file-suit-against-twitter-following-former-cisos-warnings\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/shareholders-file-suit-against-twitter-following-former-cisos-warnings\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/shareholders-file-suit-against-twitter-following-former-cisos-warnings\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/09\/shareholders-file-suit-against-twitter-following-former-cisos-warnings.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/09\/shareholders-file-suit-against-twitter-following-former-cisos-warnings.jpg","width":1024,"height":614},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/shareholders-file-suit-against-twitter-following-former-cisos-warnings\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,government,privacy,data loss,cyberwar,spyware,twitter","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackergovernmentprivacydata-losscyberwarspywaretwitter\/"},{"@type":"ListItem","position":3,"name":"Shareholders File Suit Against Twitter Following Former CISO&#8217;s Warnings"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48521","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=48521"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48521\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/48522"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=48521"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=48521"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=48521"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}