Twitter offers more details on how hackers cracked its internal systems

CERT-LatestNews ThreatsCybercrime VulnerabilitiesAll VulnerabilitiesMicrosoft VulnerabilitiesNetwork
In a blog post and series of tweets, the company said the perpetrators began by targeting a small number of employees through a phone spear phishing attack. This involves a hacker calling a target and pretending to be a trusted person in order to extract specific information that ultimately enables them to gain entry to an internal computer system.