{"id":51198,"date":"2023-03-27T14:20:08","date_gmt":"2023-03-27T14:20:08","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/34465\/Twitter-Takes-Legal-Action-After-Source-Code-Leaked-Online.html"},"modified":"2023-03-27T14:20:08","modified_gmt":"2023-03-27T14:20:08","slug":"twitter-takes-legal-action-after-source-code-leaked-online","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/twitter-takes-legal-action-after-source-code-leaked-online\/","title":{"rendered":"Twitter Takes Legal Action After Source Code Leaked Online"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/i.guim.co.uk\/img\/media\/fb3889024177a7717367521f778a495ce73c2ae0\/0_0_7609_4568\/master\/7609.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=e7060d5f3a616f0423d99fdd9dcf4554\" class=\"ff-og-image-inserted\"><\/div>\n<p class=\"dcr-n6w1lc\">Twitter has revealed some of its source code has been released online and the social media platform owned by Elon Musk is taking legal action to identify the leaker.<\/p>\n<p class=\"dcr-n6w1lc\">According to a court filing made on Friday, Twitter is demanding that GitHub, a code-sharing service, identifies who released on the platform parts of its source code \u2013 the underlying software on which the service operates.<\/p>\n<p class=\"dcr-n6w1lc\">GitHub has taken down the leaked code but Twitter has asked a US court to order the Microsoft-owned business to \u201cidentify the alleged infringer or infringers who posted Twitter\u2019s source code on systems operated by GitHub without Twitter\u2019s authorisation\u201d.<\/p>\n<figure id=\"38c479a4-686a-4c56-b16e-9c9677250559\" data-spacefinder-role=\"richLink\" data-spacefinder-type=\"model.dotcomrendering.pageElements.RichLinkBlockElement\" class=\" dcr-11ra563\"><gu-island name=\"RichLinkComponent\" deferuntil=\"idle\" props=\"{&quot;richLinkIndex&quot;:3,&quot;element&quot;:{&quot;_type&quot;:&quot;model.dotcomrendering.pageElements.RichLinkBlockElement&quot;,&quot;url&quot;:&quot;https:\/\/www.theguardian.com\/technology\/2023\/mar\/26\/elon-musk-twitter-value-leaked-memo-less-than-half-paid&quot;,&quot;text&quot;:&quot;Elon Musk memo suggests Twitter worth less than half of what he paid for it&quot;,&quot;prefix&quot;:&quot;Related: &quot;,&quot;role&quot;:&quot;richLink&quot;,&quot;elementId&quot;:&quot;38c479a4-686a-4c56-b16e-9c9677250559&quot;},&quot;ajaxUrl&quot;:&quot;https:\/\/api.nextgen.guardianapps.co.uk&quot;,&quot;format&quot;:{&quot;display&quot;:0,&quot;theme&quot;:0,&quot;design&quot;:0}}\"><\/gu-island><\/figure>\n<p class=\"dcr-n6w1lc\">The code was posted online by a GitHub user who used the name FreeSpeechEnthusiast, in an apparent nod to Musk, referring to himself as a \u201cfree speech absolutist.\u201d<\/p>\n<p class=\"dcr-n6w1lc\">Musk is obsessed with the threat of Twitter being sabotaged by current and former staff, according to the tech newsletter Platformer, after a takeover that led to the immediate <a href=\"https:\/\/www.theguardian.com\/technology\/2022\/nov\/04\/twitter-layoffs-elon-musk-revenue-drop\" data-link-name=\"in body link\">firing of half of Twitter\u2019s 7,500 staff<\/a> and the reinstatement of formerly suspended rightwing accounts <a href=\"https:\/\/www.theguardian.com\/us-news\/2022\/nov\/20\/twitter-lifts-donald-trump-ban-after-elon-musks-poll\" data-link-name=\"in body link\">including that of Donald Trump<\/a>. Twitter\u2019s workforce now numbers fewer than 2,000 people.<\/p>\n<p class=\"dcr-n6w1lc\">In the court filing, Twitter\u2019s assistant general counsel, Julian Moore, said the request to identify the leaker was being made under the Digital Millennium Copyright Act, which came into force in 1998.<\/p>\n<p class=\"dcr-n6w1lc\">Leaking source code could allow security vulnerabilities, according to one expert.<\/p>\n<p class=\"dcr-n6w1lc\">\u201cLeaks of source code like this can allow security vulnerabilities to be identified and may disclose sensitive commercial information,\u201d Steven Murdoch, a professor of security engineering at University College London, said. \u201cHowever, Twitter\u2019s most valuable resources are its brand, customer base, and the skills of its employees. I would be surprised if this leak has any significant long-term effect on the company.\u201d<\/p>\n<p class=\"dcr-n6w1lc\">Twitter\u2019s cybersecurity setup was strongly criticised by a whistleblower before Musk completed his takeover. Twitter\u2019s former head of security, Peiter \u201cMudge\u201d Zatko, who was fired in January 2022, <a href=\"https:\/\/www.theguardian.com\/technology\/2022\/sep\/12\/twitter-peiter-mudge-zatko-us-data-information-security\" data-link-name=\"in body link\">claimed he had uncovered<\/a> \u201cextreme, egregious deficiencies by Twitter in every area of his mandate\u201d, including weak controls of employee access to user data and interference by foreign governments.<\/p>\n<p class=\"dcr-n6w1lc\">The filing on Friday was made as Musk revealed to employees that the business he bought for $44bn (\u00a336bn) in October is <a href=\"https:\/\/www.theguardian.com\/technology\/2023\/mar\/26\/elon-musk-twitter-value-leaked-memo-less-than-half-paid\" data-link-name=\"in body link\">now worth less than half that<\/a>, according to a memo seen by the New York Times. The memo said Twitter, which has debts of $13bn related to the financing of the takeover, had been four months away from running out of money. The platform, which makes most its revenue from advertising, has been hit by an advertiser boycott after Musk\u2019s acquisition, amid concerns over issues including moderation standards and the impact of job cuts.<\/p>\n<p class=\"dcr-n6w1lc\">GitHub has been contacted for comment. A request for comment from Twitter\u2019s press office was met with an automated reply containing a poo emoji, a new policy announced by Musk this month.<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/34465\/Twitter-Takes-Legal-Action-After-Source-Code-Leaked-Online.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[10441],"class_list":["post-51198","post","type-post","status-publish","format-standard","hentry","category-packet-storm","tag-headlinedata-losstwitter"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Twitter Takes Legal Action After Source Code Leaked Online 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/twitter-takes-legal-action-after-source-code-leaked-online\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Twitter Takes Legal Action After Source Code Leaked Online 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/twitter-takes-legal-action-after-source-code-leaked-online\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-27T14:20:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i.guim.co.uk\/img\/media\/fb3889024177a7717367521f778a495ce73c2ae0\/0_0_7609_4568\/master\/7609.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=e7060d5f3a616f0423d99fdd9dcf4554\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/twitter-takes-legal-action-after-source-code-leaked-online\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/twitter-takes-legal-action-after-source-code-leaked-online\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Twitter Takes Legal Action After Source Code Leaked Online\",\"datePublished\":\"2023-03-27T14:20:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/twitter-takes-legal-action-after-source-code-leaked-online\\\/\"},\"wordCount\":496,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/twitter-takes-legal-action-after-source-code-leaked-online\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i.guim.co.uk\\\/img\\\/media\\\/fb3889024177a7717367521f778a495ce73c2ae0\\\/0_0_7609_4568\\\/master\\\/7609.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=e7060d5f3a616f0423d99fdd9dcf4554\",\"keywords\":[\"headline,data loss,twitter\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/twitter-takes-legal-action-after-source-code-leaked-online\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/twitter-takes-legal-action-after-source-code-leaked-online\\\/\",\"name\":\"Twitter Takes Legal Action After Source Code Leaked Online 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/twitter-takes-legal-action-after-source-code-leaked-online\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/twitter-takes-legal-action-after-source-code-leaked-online\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i.guim.co.uk\\\/img\\\/media\\\/fb3889024177a7717367521f778a495ce73c2ae0\\\/0_0_7609_4568\\\/master\\\/7609.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=e7060d5f3a616f0423d99fdd9dcf4554\",\"datePublished\":\"2023-03-27T14:20:08+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/twitter-takes-legal-action-after-source-code-leaked-online\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/twitter-takes-legal-action-after-source-code-leaked-online\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/twitter-takes-legal-action-after-source-code-leaked-online\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i.guim.co.uk\\\/img\\\/media\\\/fb3889024177a7717367521f778a495ce73c2ae0\\\/0_0_7609_4568\\\/master\\\/7609.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=e7060d5f3a616f0423d99fdd9dcf4554\",\"contentUrl\":\"https:\\\/\\\/i.guim.co.uk\\\/img\\\/media\\\/fb3889024177a7717367521f778a495ce73c2ae0\\\/0_0_7609_4568\\\/master\\\/7609.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=e7060d5f3a616f0423d99fdd9dcf4554\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/twitter-takes-legal-action-after-source-code-leaked-online\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,data loss,twitter\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinedata-losstwitter\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Twitter Takes Legal Action After Source Code Leaked Online\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Twitter Takes Legal Action After Source Code Leaked Online 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/twitter-takes-legal-action-after-source-code-leaked-online\/","og_locale":"en_US","og_type":"article","og_title":"Twitter Takes Legal Action After Source Code Leaked Online 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/twitter-takes-legal-action-after-source-code-leaked-online\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-03-27T14:20:08+00:00","og_image":[{"url":"https:\/\/i.guim.co.uk\/img\/media\/fb3889024177a7717367521f778a495ce73c2ae0\/0_0_7609_4568\/master\/7609.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=e7060d5f3a616f0423d99fdd9dcf4554","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/twitter-takes-legal-action-after-source-code-leaked-online\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/twitter-takes-legal-action-after-source-code-leaked-online\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Twitter Takes Legal Action After Source Code Leaked Online","datePublished":"2023-03-27T14:20:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/twitter-takes-legal-action-after-source-code-leaked-online\/"},"wordCount":496,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/twitter-takes-legal-action-after-source-code-leaked-online\/#primaryimage"},"thumbnailUrl":"https:\/\/i.guim.co.uk\/img\/media\/fb3889024177a7717367521f778a495ce73c2ae0\/0_0_7609_4568\/master\/7609.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=e7060d5f3a616f0423d99fdd9dcf4554","keywords":["headline,data loss,twitter"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/twitter-takes-legal-action-after-source-code-leaked-online\/","url":"https:\/\/www.threatshub.org\/blog\/twitter-takes-legal-action-after-source-code-leaked-online\/","name":"Twitter Takes Legal Action After Source Code Leaked Online 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/twitter-takes-legal-action-after-source-code-leaked-online\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/twitter-takes-legal-action-after-source-code-leaked-online\/#primaryimage"},"thumbnailUrl":"https:\/\/i.guim.co.uk\/img\/media\/fb3889024177a7717367521f778a495ce73c2ae0\/0_0_7609_4568\/master\/7609.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=e7060d5f3a616f0423d99fdd9dcf4554","datePublished":"2023-03-27T14:20:08+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/twitter-takes-legal-action-after-source-code-leaked-online\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/twitter-takes-legal-action-after-source-code-leaked-online\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/twitter-takes-legal-action-after-source-code-leaked-online\/#primaryimage","url":"https:\/\/i.guim.co.uk\/img\/media\/fb3889024177a7717367521f778a495ce73c2ae0\/0_0_7609_4568\/master\/7609.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=e7060d5f3a616f0423d99fdd9dcf4554","contentUrl":"https:\/\/i.guim.co.uk\/img\/media\/fb3889024177a7717367521f778a495ce73c2ae0\/0_0_7609_4568\/master\/7609.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=e7060d5f3a616f0423d99fdd9dcf4554"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/twitter-takes-legal-action-after-source-code-leaked-online\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,data loss,twitter","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinedata-losstwitter\/"},{"@type":"ListItem","position":3,"name":"Twitter Takes Legal Action After Source Code Leaked Online"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51198","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=51198"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51198\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=51198"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=51198"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=51198"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}