{"id":51816,"date":"2023-05-08T14:36:51","date_gmt":"2023-05-08T14:36:51","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/34589\/Twitter-Admits-To-Security-Incident-Involving-Circles-Tweets.html"},"modified":"2023-05-08T14:36:51","modified_gmt":"2023-05-08T14:36:51","slug":"twitter-admits-to-security-incident-involving-circles-tweets","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/twitter-admits-to-security-incident-involving-circles-tweets\/","title":{"rendered":"Twitter Admits To Security Incident Involving Circles Tweets"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/i.guim.co.uk\/img\/media\/8bfd923e478e20ada903f20932efcdc3b81d00fd\/0_0_5663_3400\/master\/5663.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=8f1a0e62bb7f6a0a76696880206df090\" class=\"ff-og-image-inserted\"><\/div>\n<p class=\"dcr-n6w1lc\">A privacy breach at <a href=\"https:\/\/www.theguardian.com\/technology\/twitter\" data-component=\"auto-linked-tag\" data-link-name=\"in body link\">Twitter<\/a> published tweets that were never supposed to be seen by anyone but the poster\u2019s closest friends to the site at large, the company has admitted after weeks of stonewalling reports.<\/p>\n<p class=\"dcr-n6w1lc\">The site\u2019s Circles feature allows users to set an exclusive list of friends and post tweets that only they can read. Similar to Instagram\u2019s Close Friends setting, it allows users to share private thoughts, explicit images or unprofessional statements without risking sharing them with their wider network.<\/p>\n<p class=\"dcr-n6w1lc\">But, in an email to affected users seen by the Guardian, Twitter admitted tweets had escaped this containment. \u201cA security incident that occurred earlier this year,\u201d the email says, \u201cmay have allowed users outside of your Twitter Circle to see tweets that should have otherwise been limited to the Circle to which you were posting.\u201d<\/p>\n<figure id=\"dd8a9ccc-695b-4877-9b25-04f8233f75d4\" data-spacefinder-role=\"richLink\" data-spacefinder-type=\"model.dotcomrendering.pageElements.RichLinkBlockElement\" class=\" dcr-11ra563\"><gu-island name=\"RichLinkComponent\" deferuntil=\"idle\" props=\"{&quot;richLinkIndex&quot;:3,&quot;element&quot;:{&quot;_type&quot;:&quot;model.dotcomrendering.pageElements.RichLinkBlockElement&quot;,&quot;url&quot;:&quot;https:\/\/www.theguardian.com\/media\/2023\/apr\/11\/row-between-twitter-and-substack-ends-with-uneasy-truce&quot;,&quot;text&quot;:&quot;Row between Twitter and Substack ends with uneasy truce&quot;,&quot;prefix&quot;:&quot;Related: &quot;,&quot;role&quot;:&quot;richLink&quot;,&quot;elementId&quot;:&quot;dd8a9ccc-695b-4877-9b25-04f8233f75d4&quot;},&quot;ajaxUrl&quot;:&quot;https:\/\/api.nextgen.guardianapps.co.uk&quot;,&quot;format&quot;:{&quot;display&quot;:0,&quot;theme&quot;:0,&quot;design&quot;:0}}\"><\/gu-island><\/figure>\n<p class=\"dcr-n6w1lc\"><a href=\"https:\/\/www.theguardian.com\/media\/2023\/apr\/11\/row-between-twitter-and-substack-ends-with-uneasy-truce\" data-link-name=\"in body link\">For weeks<\/a>, users had been reporting Circles tweets receiving likes and views from accounts that should not have been able to see them. Twitter, whose press office has been largely destaffed and set to autoreply to requests for comment with a poo emoji, did not acknowledge the reports.<\/p>\n<p class=\"dcr-n6w1lc\">Now, the company says the issue \u201cwas identified by our security team and immediately fixed so that these tweets were no longer visible outside of your Circle\u201d.<\/p>\n<p class=\"dcr-n6w1lc\">\u201cTwitter is committed to protecting the privacy of the people who use our service, and we understand the risks that an incident like this can introduce and we deeply regret this happened,\u201d the company said.<\/p>\n<p class=\"dcr-n6w1lc\">The email did not address separate reports that similar privacy breaches were occurring to \u201cprivate\u201d accounts, whose tweets should not be displayed to anyone save for their approved followers.<\/p>\n<p class=\"dcr-n6w1lc\">Since Elon Musk acquired the company in late 2022, Twitter has shed at least 60% of its headcount, with wave after wave of layoffs stripping teams to the bone. Over the same period, the site has <a href=\"https:\/\/www.theguardian.com\/technology\/2023\/mar\/08\/spike-in-twitter-outages-since-musk-takeover-hint-at-more-systemic-problems\" data-link-name=\"in body link\">experienced numerous outages<\/a>, leading Musk to declare that it would not be stable until a \u201ccomplete rewrite\u201d of the site\u2019s underlying code was completed.<\/p>\n<p class=\"dcr-n6w1lc\">Similar cost-cutting measures have led the service to stop paying bills for office space, janitorial supplies and web hosting, with mixed success. Even as Musk attempted to institute a full return-to-the-office mandate, Twitter employees in countries including Singapore and London faced eviction from their workplaces over unpaid rent bills.<\/p>\n<p class=\"dcr-n6w1lc\">More pressingly, layoffs in site-wide moderation teams have opened the company up to massive fines in <a href=\"https:\/\/techcrunch.com\/2023\/04\/06\/elon-musk-twitter-germany-hate-speech-takedowns\/\" data-link-name=\"in body link\">countries including Germany<\/a>, where effective content moderation is a legal requirement. The \u201csystematic failure\u201d of the social network to moderate well allows for fines of up to \u20ac50m (\u00a344m) a case, the German lawyer Chan-jo Jun told TechCrunch last month.<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/34589\/Twitter-Admits-To-Security-Incident-Involving-Circles-Tweets.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[5195],"class_list":["post-51816","post","type-post","status-publish","format-standard","hentry","category-packet-storm","tag-headlineprivacyflawtwitter"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Twitter Admits To Security Incident Involving Circles Tweets 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/twitter-admits-to-security-incident-involving-circles-tweets\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Twitter Admits To Security Incident Involving Circles Tweets 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/twitter-admits-to-security-incident-involving-circles-tweets\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-08T14:36:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i.guim.co.uk\/img\/media\/8bfd923e478e20ada903f20932efcdc3b81d00fd\/0_0_5663_3400\/master\/5663.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=8f1a0e62bb7f6a0a76696880206df090\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/twitter-admits-to-security-incident-involving-circles-tweets\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/twitter-admits-to-security-incident-involving-circles-tweets\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Twitter Admits To Security Incident Involving Circles Tweets\",\"datePublished\":\"2023-05-08T14:36:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/twitter-admits-to-security-incident-involving-circles-tweets\\\/\"},\"wordCount\":454,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/twitter-admits-to-security-incident-involving-circles-tweets\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i.guim.co.uk\\\/img\\\/media\\\/8bfd923e478e20ada903f20932efcdc3b81d00fd\\\/0_0_5663_3400\\\/master\\\/5663.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=8f1a0e62bb7f6a0a76696880206df090\",\"keywords\":[\"headline,privacy,flaw,twitter\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/twitter-admits-to-security-incident-involving-circles-tweets\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/twitter-admits-to-security-incident-involving-circles-tweets\\\/\",\"name\":\"Twitter Admits To Security Incident Involving Circles Tweets 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/twitter-admits-to-security-incident-involving-circles-tweets\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/twitter-admits-to-security-incident-involving-circles-tweets\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i.guim.co.uk\\\/img\\\/media\\\/8bfd923e478e20ada903f20932efcdc3b81d00fd\\\/0_0_5663_3400\\\/master\\\/5663.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=8f1a0e62bb7f6a0a76696880206df090\",\"datePublished\":\"2023-05-08T14:36:51+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/twitter-admits-to-security-incident-involving-circles-tweets\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/twitter-admits-to-security-incident-involving-circles-tweets\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/twitter-admits-to-security-incident-involving-circles-tweets\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i.guim.co.uk\\\/img\\\/media\\\/8bfd923e478e20ada903f20932efcdc3b81d00fd\\\/0_0_5663_3400\\\/master\\\/5663.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=8f1a0e62bb7f6a0a76696880206df090\",\"contentUrl\":\"https:\\\/\\\/i.guim.co.uk\\\/img\\\/media\\\/8bfd923e478e20ada903f20932efcdc3b81d00fd\\\/0_0_5663_3400\\\/master\\\/5663.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=8f1a0e62bb7f6a0a76696880206df090\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/twitter-admits-to-security-incident-involving-circles-tweets\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,privacy,flaw,twitter\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlineprivacyflawtwitter\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Twitter Admits To Security Incident Involving Circles Tweets\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Twitter Admits To Security Incident Involving Circles Tweets 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/twitter-admits-to-security-incident-involving-circles-tweets\/","og_locale":"en_US","og_type":"article","og_title":"Twitter Admits To Security Incident Involving Circles Tweets 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/twitter-admits-to-security-incident-involving-circles-tweets\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-05-08T14:36:51+00:00","og_image":[{"url":"https:\/\/i.guim.co.uk\/img\/media\/8bfd923e478e20ada903f20932efcdc3b81d00fd\/0_0_5663_3400\/master\/5663.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=8f1a0e62bb7f6a0a76696880206df090","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/twitter-admits-to-security-incident-involving-circles-tweets\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/twitter-admits-to-security-incident-involving-circles-tweets\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Twitter Admits To Security Incident Involving Circles Tweets","datePublished":"2023-05-08T14:36:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/twitter-admits-to-security-incident-involving-circles-tweets\/"},"wordCount":454,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/twitter-admits-to-security-incident-involving-circles-tweets\/#primaryimage"},"thumbnailUrl":"https:\/\/i.guim.co.uk\/img\/media\/8bfd923e478e20ada903f20932efcdc3b81d00fd\/0_0_5663_3400\/master\/5663.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=8f1a0e62bb7f6a0a76696880206df090","keywords":["headline,privacy,flaw,twitter"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/twitter-admits-to-security-incident-involving-circles-tweets\/","url":"https:\/\/www.threatshub.org\/blog\/twitter-admits-to-security-incident-involving-circles-tweets\/","name":"Twitter Admits To Security Incident Involving Circles Tweets 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/twitter-admits-to-security-incident-involving-circles-tweets\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/twitter-admits-to-security-incident-involving-circles-tweets\/#primaryimage"},"thumbnailUrl":"https:\/\/i.guim.co.uk\/img\/media\/8bfd923e478e20ada903f20932efcdc3b81d00fd\/0_0_5663_3400\/master\/5663.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=8f1a0e62bb7f6a0a76696880206df090","datePublished":"2023-05-08T14:36:51+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/twitter-admits-to-security-incident-involving-circles-tweets\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/twitter-admits-to-security-incident-involving-circles-tweets\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/twitter-admits-to-security-incident-involving-circles-tweets\/#primaryimage","url":"https:\/\/i.guim.co.uk\/img\/media\/8bfd923e478e20ada903f20932efcdc3b81d00fd\/0_0_5663_3400\/master\/5663.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=8f1a0e62bb7f6a0a76696880206df090","contentUrl":"https:\/\/i.guim.co.uk\/img\/media\/8bfd923e478e20ada903f20932efcdc3b81d00fd\/0_0_5663_3400\/master\/5663.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=8f1a0e62bb7f6a0a76696880206df090"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/twitter-admits-to-security-incident-involving-circles-tweets\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,privacy,flaw,twitter","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlineprivacyflawtwitter\/"},{"@type":"ListItem","position":3,"name":"Twitter Admits To Security Incident Involving Circles Tweets"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51816","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=51816"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51816\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=51816"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=51816"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=51816"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}