{"id":31879,"date":"2020-11-17T12:28:11","date_gmt":"2020-11-17T10:28:11","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=31879"},"modified":"2025-08-28T05:53:34","modified_gmt":"2025-08-28T02:53:34","slug":"twitter-to-appoint-one-of-the-worlds-most-famous-hackers-as-head-of-security","status":"publish","type":"post","link":"https:\/\/u1f987.com\/en\/twitter-to-appoint-one-of-the-worlds-most-famous-hackers-as-head-of-security\/","title":{"rendered":"Twitter to appoint one of the world&#8217;s most famous hackers as head of security"},"content":{"rendered":"<p><span style=\\\"font-weight: 400;\\\">Twitter is preparing to appoint cyber-security expert and hacker Peter Zatko as head of security, according to <\/span><a href=\\\"https:\/\/www.reuters.com\/article\/idUSKBN27W2MB\\\" target=\\\"_blank\\\" rel=\\\"noopener noreferrer\\\"><span style=\\\"font-weight: 400;\\\">Reuters<\/span><\/a><span style=\\\"font-weight: 400;\\\">.<\/span><!--more--><\/p>\n<p>\\n<\/p>\n<p><span style=\\\"font-weight: 400;\\\">It is expected that Zatko will assume duties after a background check lasting about two months.<\/span><\/p>\n<p>\\n<\/p>\n<p><span style=\\\"font-weight: 400;\\\">He will report directly to Twitter CEO Jack Dorsey and will be able to initiate changes in the network\u2019s structure and operating methods.<\/span><\/p>\n<p>\\n<\/p>\n<p><span style=\\\"font-weight: 400;\\\">In the 1990s, Zatko was one of the leaders of the hacker group Cult of the Dead Cow, which developed tools for hacking Windows. The aim was to spur Microsoft to improve security. At the same time, he carried out assignments for contractors working with the U.S. government.<\/span><\/p>\n<p>\\n<\/p>\n<p><span style=\\\"font-weight: 400;\\\">Until recently he worked on security at Stripe. Prior to that, Zatko worked on special projects at Google and oversaw grant funding for cybersecurity projects at a Pentagon agency.<\/span><\/p>\n<p>\\n<\/p>\n<p><span style=\\\"font-weight: 400;\\\">Earlier in July, hackers compromised the Twitter accounts of many well-known individuals and posted messages about a fake 5,000 BTC giveaway from an unknown site Cryptoforhealth.<\/span><\/p>\n<p>\\n<\/p>\n<blockquote class=\\\"wp-embedded-content\\\" data-secret=\\\"e6GLprVa3G\\\">\n<p>Unknown hackers hacked the Twitter accounts of Changpeng Zhao, Elon Musk, Jeff Bezos and Bill Gates<\/p>\n<\/blockquote>\n<p>\\n<\/p>\n<p><iframe loading=\\\"lazy\\\" class=\\\"wp-embedded-content\\\" sandbox=\\\"allow-scripts\\\" security=\\\"restricted\\\" style=\\\"position: absolute; visibility: hidden;\\\" title=\\\"Unknown hackers hacked the Twitter accounts of Changpeng Zhao, Elon Musk, Jeff Bezos and Bill Gates \u2014 ForkLog\\\" src=\\\"https:\/\/u1f987.com\/news\/neizvestnye-vzlomali-twitter-akkaunty-chanpena-chzhao-binance-i-gemini\/embed#?secret=6mJEgoaSnG#?secret=e6GLprVa3G\\\" data-secret=\\\"e6GLprVa3G\\\" width=\\\"500\\\" height=\\\"282\\\" frameborder=\\\"0\\\" marginwidth=\\\"0\\\" marginheight=\\\"0\\\" scrolling=\\\"no\\\"><\/iframe><\/p>\n<p>\\n<\/p>\n<p><span style=\\\"font-weight: 400;\\\">According to Twitter&#8217;s investigation, the attack targeted 130 celebrity accounts, 45 of which were compromised through password resets.<\/span><\/p>\n<p>\\n<\/p>\n<p><span style=\\\"font-weight: 400;\\\">Later, in connection with the hack, <a href=\"https:\/\/u1f987.com\/en\/news\/17-year-old-twitter-hacker-charged-with-30-counts\"><span style=\\\"font-weight: 400;\\\">blamed<\/span><\/a><span style=\\\"font-weight: 400;\\\"> a 17-year-old from Florida.<\/span><\/p>\n<p>\\n<\/p>\n<p>Follow ForkLog news on <a href=\\\"https:\/\/twitter.com\/ForkLog\\\" target=\\\"_blank\\\" rel=\\\"nofollow noopener noreferrer\\\">Twitter<\/a>!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Twitter is set to appoint Peter Zatko, a cyber-security expert and hacker, as head of security, Reuters reports.<\/p>\n","protected":false},"author":1,"featured_media":31880,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"","cryptorium_level":"","_short_excerpt_text":"","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1111,40],"class_list":["post-31879","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-cybersecurity","tag-twitter"],"aioseo_notices":[],"amp_enabled":true,"views":"14","promo_type":"1","layout_type":"","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/31879","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/comments?post=31879"}],"version-history":[{"count":1,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/31879\/revisions"}],"predecessor-version":[{"id":31881,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/31879\/revisions\/31881"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/media\/31880"}],"wp:attachment":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/media?parent=31879"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/categories?post=31879"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/tags?post=31879"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}