Security threats

UPDATED

NOV 22, 2022

We know that no single company can solve various global threats alone. We share findings about threats we detect with our industry peers and security researchers to help our entire defender community better understand and counter internet-wide challenges, like the ones below.

COORDINATED INAUTHENTIC BEHAVIOR

Coordinated efforts to manipulate public debate for a strategic goal, in which fake accounts are central to such covert influence operations.

BRIGADING

Coordinated efforts to harass people in attempt to intimidate and silence them, often through repetitive direct messages or mass-commenting on their posts.

CYBER ESPIONAGE

Covert efforts to target people to collect intelligence and/or compromise their devices and online accounts for a strategic goal.

MASS REPORTING

Coordinated efforts to abuse our reporting systems to get accounts or content incorrectly taken down, typically with the intent of silencing people.