Sign in
  • News
  • Interviews
  • Articles
  • Podcasts
  • Insights
    • Future Ready
    • Guest Post
    • Use Cases
    • Events
  • Quick Bytes
  • RESOURCES
Sign in
Welcome!Log into your account
Forgot your password?
Privacy Policy
Password recovery
Recover your password
Search
Tuesday, February 7, 2023
  • Sign in / Join
Sign in
Welcome! Log into your account
Forgot your password? Get help
Privacy Policy
Password recovery
Recover your password
A password will be e-mailed to you.
ITSECURITYWIRE FAVCON ITSECURITYWIRE FAVCON ITSecurityWire
  • News
  • Interviews
  • Articles
  • Podcasts
  • Insights
    • Future Ready
    • Guest Post
    • Use Cases
    • Events
  • Quick Bytes
  • RESOURCES
Home Quick Bytes Twitter and Meta Remove Accounts Connected to U.S. Influence Operations
  • Quick Bytes

Twitter and Meta Remove Accounts Connected to U.S. Influence Operations

By
ITsec Bureau
-
August 29, 2022
27
Twitter
Twitter-Tests New-Professional-Account-Options

A recent analysis from Graphika and the Stanford Internet Observatory (SIO) indicates that hundreds of Twitter, Facebook, and Instagram accounts engaged in manipulation and spam that supported pro-Western narratives for years.

The troll farms were utilizing dishonest strategies as part of numerous covert attempts to spread pro-Western narratives to social media users in the Middle East and Central Asia. Twitter and Facebook parent Meta purportedly deleted two overlapping groups of accounts in July and August 2022, according to Graphika and SIO.

The majority of the troll farms’ tweets received only a few likes or retweets, which suggests that their influence was very minimal, according to Graphika and SIO. The most popular accounts were overt ones that claimed to be affiliated with the US military, even though 19% of covert accounts had more than 1,000 followers.

Read More: Twitter, Meta Remove Accounts Linked to US Influence Operations: Report

For more such updates follow us on Google News ITsecuritywire News

  • TAGS
  • Meta
  • Stanford Internet Observatory
  • troll farms
  • Twitter
  • Twitter Account
  • U.S. Influence Operations
Previous articleAtlassian Releases Critical Patch for Bitbucket Vulnerability
Next articleDoorDash Announces Data Breach Associated with Twilio Attack
ITsec Bureau
https://itsecuritywire.com/

RELATED ARTICLESMORE FROM AUTHOR

Oracle E-Business Suite Vulnerability Exploitation Commences After PoC Publication

Oracle E-Business Suite Vulnerability Exploitation Commences After PoC Publication

Jira Service Management Vulnerability Reported by Atlassian

Jira Service Management Vulnerability Reported by Atlassian

Google Pays OSS-Fuzz Project Integrations $600,000

Google Pays OSS-Fuzz Project Integrations $600,000

Latest posts

Cyber Security Culture

The Step to Create a Cyber Security Culture Starts from the Team Itself

October 7, 2020
Very Good Security (VGS) Hires Chandar Venkataraman as Chief Product Officer-01

Very Good Security (VGS) Hires Chandar Venkataraman as Chief Product Officer

September 3, 2021
Google Pays

Google Pays Over USD 50,000 for Security Vulnerabilities Chrome 107 patted

October 27, 2022
FINRA, broker-finra.org, phishing mails, cyber-attacks, Microsoft word, SharePoint

Cyber Fraudsters Imitate FINRA Authorities in a New Phishing Emails Scam

May 19, 2020
Securing the Future of Payments PCI SSC Publishes PCI Data Security Standard v4.0-01 (1)

Securing the Future of Payments: PCI SSC Publishes PCI Data Security Standard v4.0

April 1, 2022


An invaluable resource for all your IT security initiatives and assets.

Knowledge sharing platform for all IT security needs and plans. Peer to peer conversations that leverage industry experts and leaders for ideas, opinions and business insights.

Media@ITSecurityWire.com
Sales@ITSecurityWire.com

Recent Posts

  • LAC Collaborates With Sygnia To Improve Their Cyber Emergency Center’s Incident Response Capabilities
  • Industrial Defender Teams With Nozomi Networks To Strengthen Endpoint Security Capabilities In Industrial Environments
  • Oracle E-Business Suite Vulnerability Exploitation Commences After PoC Publication
  • Jira Service Management Vulnerability Reported by Atlassian
  • Top Four Reasons to Adopt CIEM in Cloud Security Strategy

Visit Our Other Publication

Quick Links

  • About Us
  • News
  • Featured Articles
  • Featured Interview
  • Guest Post
  • Privacy Policy
  • Do Not Sell My Information
  • About Us
  • News
  • Featured Articles
  • Featured Interview
  • Guest Post
  • Privacy Policy
  • Do Not Sell My Information
An Imprint of OnDot ® Media © | All rights reserved | Privacy Policy