{"id":2663,"date":"2024-09-13T00:16:29","date_gmt":"2024-09-13T00:16:29","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=2663"},"modified":"2025-09-10T01:45:08","modified_gmt":"2025-09-10T01:45:08","slug":"az-influencerek-kiszivarogtattak-egy-novekvo-veszelyt-az-online-biztonsagra","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/hu\/adatszivargasok\/az-influencerek-kiszivarogtattak-egy-novekvo-veszelyt-az-online-biztonsagra\/","title":{"rendered":"Kisziv\u00e1rgott influencerek: Egyre n\u00f6vekv\u0151 vesz\u00e9ly az online biztons\u00e1gra"},"content":{"rendered":"<p>Mostan\u00e1ban \u00e9szrevett\u00fck, hogy n\u00f6vekszik az \u201cinfluencerek kisziv\u00e1rogtat\u00e1sa\u201d kifejez\u00e9s haszn\u00e1lata, mivel a k\u00f6z\u00f6ss\u00e9gi m\u00e9dia szt\u00e1rjainak szem\u00e9lyes inform\u00e1ci\u00f3it folyamatosan ellopj\u00e1k \u00e9s mindenki sz\u00e1m\u00e1ra l\u00e1that\u00f3v\u00e1 teszik. A priv\u00e1t besz\u00e9lget\u00e9sekt\u0151l \u00e9s szem\u00e9lyes t\u00e9nyekt\u0151l a p\u00e9nz\u00fcgyi \u00fcgyekig ezek a sziv\u00e1rg\u00e1sok nagy besz\u00e9lget\u00e9seket ind\u00edtottak az online biztons\u00e1gr\u00f3l \u00e9s a mag\u00e1n\u00e9letr\u0151l. Ahogy az influencerek n\u00e9pszer\u0171v\u00e9 v\u00e1lnak olyan oldalakon, mint az Instagram, a TikTok \u00e9s a YouTube, f\u0151 c\u00e9lpontokk\u00e1 v\u00e1lnak a kiberb\u0171n\u00f6z\u0151k sz\u00e1m\u00e1ra, ami t\u00f6bb esethez vezet, ahol az influencerek adatainak sziv\u00e1rg\u00e1sa vil\u00e1gszerte aggodalomra ad okot.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"what-does-influencers-leaked-mean\"><strong>Mit jelent az \u201cinfluencerek kisziv\u00e1rogtat\u00e1sa\u201d?<\/strong><\/h3>\n\n\n<p>Az \u201cinfluencerek kisziv\u00e1rogtat\u00e1sa\u201d kifejez\u00e9s olyan eseteket t\u00e1rgyal, amikor a k\u00f6z\u00f6ss\u00e9gi m\u00e9dia influencerek priv\u00e1t vagy \u00e9rz\u00e9keny inform\u00e1ci\u00f3i ker\u00fclnek nyilv\u00e1noss\u00e1gra, ak\u00e1r sz\u00e1nd\u00e9kosan a hackerek \u00e1ltal, ak\u00e1r v\u00e9letlen\u00fcl, a platform gyenge pontjai miatt. Ezek az inform\u00e1ci\u00f3k gyakran tartalmaznak priv\u00e1t besz\u00e9lget\u00e9seket, p\u00e9nz\u00fcgyi r\u00e9szleteket, otthoni helyeket, s\u0151t, szem\u00e9lyazonos\u00edt\u00f3 okm\u00e1nyokat is. Nagy jelenl\u00e9t\u00fckkel \u00e9s nagy k\u00f6vet\u0151t\u00e1borukkal az influencerek vonz\u00f3 c\u00e9lpontok a kiberb\u0171n\u00f6z\u0151k sz\u00e1m\u00e1ra, akik ki akarj\u00e1k haszn\u00e1lni az adataikat nyeres\u00e9g, zsarol\u00e1s vagy csak zavarkelt\u00e9s c\u00e9lj\u00e1b\u00f3l.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"how-do-influencers-data-get-leaked\"><strong>Hogyan sziv\u00e1rognak ki az influencerek adatai?<\/strong><\/h3>\n\n\n<p>Van n\u00e9h\u00e1ny m\u00f3dja annak, ahogyan \u00e9szlelj\u00fck, hogy az influencerek adatai megoszt\u00e1sra ker\u00fclnek online. \u00cdme a leggyakoribb m\u00f3dszerek, amelyeket a t\u00e1mad\u00f3k haszn\u00e1lnak:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"translation-block\"><strong>Adathal\u00e1szat<\/strong>: Az egyik gyakori m\u00f3dja annak, hogy az influencerek inform\u00e1ci\u00f3i kisziv\u00e1rognak, az adathal\u00e1szat. A hackerek <a>hamis e-maileket vagy \u00fczeneteket<\/a> k\u00fcldenek, megt\u00e9vesztve az influencereket, hogy adj\u00e1k meg fi\u00f3kadataikat. Ha bejutnak, a kiberb\u0171n\u00f6z\u0151k hozz\u00e1f\u00e9rhetnek priv\u00e1t inform\u00e1ci\u00f3khoz, amelyek gyakran kisziv\u00e1rognak a nyilv\u00e1noss\u00e1g sz\u00e1m\u00e1ra.<\/li>\n\n\n\n<li class=\"translation-block\"><strong>Szoci\u00e1lis tr\u00fckk\u00f6k<\/strong>: Rossz emberek gyakran haszn\u00e1lnak <a href=\"https:\/\/medium.com\/@qqqqemer\/10-dark-psychology-tricks-that-always-works-f3be3027a211\" target=\"_blank\" rel=\"noreferrer noopener\">szoci\u00e1lis tr\u00fckk\u00f6ket<\/a>, hogy megt\u00e9vessz\u00e9k a seg\u00edt\u0151ket vagy csoportjaikat, hogy adj\u00e1k ki priv\u00e1t inform\u00e1ci\u00f3ikat. P\u00e9ld\u00e1ul a t\u00e1mad\u00f3k \u00fagy tehetnek, mintha munkat\u00e1rsak vagy platform k\u00e9pvisel\u0151k lenn\u00e9nek, hogy megszerezz\u00e9k a titkos r\u00e9szleteket, ami k\u00e9s\u0151bb az influencerek f\u00e1jljainak vagy besz\u00e9lget\u00e9seinek kisziv\u00e1rg\u00e1s\u00e1hoz vezethet.<\/li>\n\n\n\n<li class=\"translation-block\"><strong>Oldal gyenges\u00e9gei<\/strong>: Id\u0151nk\u00e9nt maguk az oldalak is gyeng\u00e9k. L\u00e1ttunk m\u00e1r olyan eseteket, amikor a <a href=\"https:\/\/www.bitdefender.com\/blog\/hotforsecurity\/5-common-privacy-and-security-mistakes-youre-making-on-social-media\/?srsltid=AfmBOoq84j3OwVNI4kgS3l-hzrajldv7T79uZ5xCm-RTIykb1SRQLt_l\" target=\"_blank\" rel=\"noreferrer noopener\">k\u00f6z\u00f6ss\u00e9gi m\u00e9dia biztons\u00e1gi hib\u00e1i<\/a>, mint az Instagram vagy az X, lehet\u0151v\u00e9 tett\u00e9k a kiberb\u0171n\u00f6z\u0151k sz\u00e1m\u00e1ra, hogy kihaszn\u00e1lj\u00e1k a r\u00e9seket, adatokat sziv\u00e1rogtatva, ahol az influencerek inform\u00e1ci\u00f3i nyilv\u00e1noss\u00e1 v\u00e1lnak.<\/li>\n\n\n\n<li><strong>Fi\u00f3kok felt\u00f6r\u00e9se<\/strong>: Amikor egy szem\u00e9ly k\u00f6z\u00f6ss\u00e9gi m\u00e9dia fi\u00f3kja kompromitt\u00e1l\u00f3dik, a hackerek hozz\u00e1f\u00e9rhetnek priv\u00e1t jegyzetekhez, tervezett bejegyz\u00e9sekhez, s\u0151t, titkos k\u00e9pekhez is, amelyek nem voltak sz\u00e1nva a nyilv\u00e1noss\u00e1gnak. Az ilyen t\u00edpus\u00fa inform\u00e1ci\u00f3k gyakran nagyon \u00e9rt\u00e9kesek a kiberb\u0171n\u00f6z\u0151k sz\u00e1m\u00e1ra, f\u0151leg, ha el akarj\u00e1k <a href=\"https:\/\/www.aura.com\/learn\/dark-web\" target=\"_blank\" rel=\"noreferrer noopener\">adni vagy cser\u00e9lni az influencerek kisziv\u00e1rgott dolgait<\/a> a s\u00f6t\u00e9t weben.<\/li>\n<\/ul>\n\n\n\n<blockquote class=\"twitter-tweet\"><p lang=\"en\" dir=\"ltr\">M\u00e9g t\u00f6bb priv\u00e1t h\u00edress\u00e9gfot\u00f3 lopva \u00e9s kisziv\u00e1rogtatva online, \u00e9s m\u00e9g t\u00f6bb v\u00e1rhat\u00f3. <a href=\"https:\/\/t.co\/ejGgxUOX7A\">https:\/\/t.co\/ejGgxUOX7A<\/a> <a href=\"https:\/\/t.co\/BCiaB63ryM\">k\u00e9p.twitter.com\/BCiaB63ryM<\/a><\/p>\u2014 LADbible (@ladbible) <a href=\"https:\/\/twitter.com\/ladbible\/status\/842306768420110341?ref_src=twsrc%5Etfw\">2017. m\u00e1rcius 16.<\/a><\/blockquote> <script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n\n\n<h3 class=\"wp-block-heading\" id=\"highprofile-cases-of-influencers-leaked\"><strong>Magas profil\u00fa esetek az influencerek kisziv\u00e1rogtat\u00e1s\u00e1r\u00f3l<\/strong><\/h3>\n\n\n<p>Sz\u00e1mos j\u00f3l ismert esem\u00e9ny tette vil\u00e1gosabb\u00e1 az influencerek adatainak kisziv\u00e1rg\u00e1s\u00e1nak probl\u00e9m\u00e1j\u00e1t. P\u00e9ld\u00e1ul:<\/p>\n\n\n\n<p class=\"translation-block\">Egy <a href=\"https:\/\/www.bbc.com\/news\/world-asia-india-48347592\" target=\"_blank\" rel=\"noreferrer noopener\">j\u00f3l ismert esetben<\/a> egy nagy sziv\u00e1rg\u00e1s mutatta meg egy h\u00edres Instagram szt\u00e1r priv\u00e1t jegyzeteit \u00e9s e-mailjeit. Besz\u00e9lget\u00e9sek szt\u00e1rokkal \u00e9s munkat\u00e1rsakkal ker\u00fcltek fel az internetre, ami sok k\u00e1rt okozott a h\u00edrn\u00e9vnek \u00e9s a bizalom elveszt\u00e9s\u00e9hez vezetett.<\/p>\n\n\n\n<p class=\"translation-block\">Hasonl\u00f3k\u00e9ppen, voltak esetek, amikor <a href=\"https:\/\/forcreators.com\/instagram-influencer-salary\/\" target=\"_blank\" rel=\"noreferrer noopener\">nagy k\u00f6vet\u0151kkel rendelkez\u0151 emberek<\/a> osztott\u00e1k meg p\u00e9nz\u00fcgyi r\u00e9szleteiket, mint p\u00e9ld\u00e1ul a m\u00e1rkameg\u00e1llapod\u00e1sokb\u00f3l sz\u00e1rmaz\u00f3 j\u00f6vedelmet \u00e9s m\u00e1s kereseti m\u00f3dokat, amelyeket mindenki l\u00e1thatott. Ez nemcsak a priv\u00e1t munk\u00e1jukat tette ki, hanem c\u00e9lpontokk\u00e1 is tette \u0151ket szem\u00e9lyazonoss\u00e1g-lop\u00e1s \u00e9s csal\u00e1sok sz\u00e1m\u00e1ra.<\/p>\n\n\n\n<p>Ezek az esem\u00e9nyek megmutatj\u00e1k, milyen nagyok lehetnek a k\u00f6vetkezm\u00e9nyek, amikor azoknak az embereknek, akik befoly\u00e1solnak, az inform\u00e1ci\u00f3i kisziv\u00e1rognak, ami az \u201cinfluencerek kisziv\u00e1rogtat\u00e1sa\u201d kifejez\u00e9st kulcsfontoss\u00e1g\u00fa aggodalomm\u00e1 teszi az online k\u00f6z\u00f6ss\u00e9g sz\u00e1m\u00e1ra.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"the-impact-of-influencers-leaked-data\"><strong>Az influencerek kisziv\u00e1rogtatott adatainak hat\u00e1sa<\/strong><\/h3>\n\n\n<p>Az influencerek inform\u00e1ci\u00f3inak kisziv\u00e1rg\u00e1s\u00e1nak hat\u00e1sai jelent\u0151sek lehetnek, mind szem\u00e9lyes, mind szakmai szempontb\u00f3l:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>H\u00edrn\u00e9v k\u00e1rosod\u00e1sa<\/strong>: Amikor h\u00edres emberek priv\u00e1t besz\u00e9lget\u00e9sei vagy nem megfelel\u0151 dolgai ker\u00fclnek nyilv\u00e1noss\u00e1gra, az k\u00f6z\u00f6ns\u00e9gkapcsolati katasztr\u00f3f\u00e1t okozhat. ahogy azt tan\u00e1csolja <a href=\"https:\/\/celebrity-news.us\/\">h\u00edress\u00e9gek h\u00edrei USA<\/a> A m\u00e1rk\u00e1k \u00fagy d\u00f6nthetnek, hogy t\u00e1vols\u00e1got tartanak az influencert\u0151l, ami elveszett meg\u00e1llapod\u00e1sokhoz \u00e9s \u00fczleti lehet\u0151s\u00e9gekhez vezethet.<\/li>\n\n\n\n<li class=\"translation-block\"><strong>Bizalomveszt\u00e9s<\/strong>: A rajong\u00f3k \u00e9s k\u00f6vet\u0151k elvesz\u00edthetik a bizalmukat az influencerekben, ha \u00fagy gondolj\u00e1k, hogy az \u00e1ltaluk figyelt szem\u00e9ly elrejti a t\u00e9nyeket vagy olyan m\u00f3don viselkedik, ami nem egyezik a nyilv\u00e1nos k\u00e9p\u00e9vel. Ez a <a href=\"https:\/\/www.thedrum.com\/news\/2023\/06\/06\/nearly-90-consumers-no-longer-trust-influencers-new-study-finds\" target=\"_blank\" rel=\"noreferrer noopener\">bizalomveszt\u00e9s<\/a> jelent\u0151sen cs\u00f6kkentheti egy influencer elk\u00f6telezetts\u00e9gi ar\u00e1ny\u00e1t \u00e9s n\u00e9pszer\u0171s\u00e9g\u00e9t.<\/li>\n\n\n\n<li class=\"translation-block\"><strong>P\u00e9nz\u00fcgyi k\u00f6vetkezm\u00e9nyek<\/strong>: Nagyon s\u00falyos esetekben az influencerek kisziv\u00e1rgott p\u00e9nz\u00fcgyi adatai csal\u00e1rd \u00fcgyletekhez, szem\u00e9lyazonoss\u00e1g-lop\u00e1shoz vagy ak\u00e1r zsarol\u00e1shoz is vezettek, amikor a hackerek v\u00e1lts\u00e1gd\u00edjat k\u00f6veteltek a kisziv\u00e1rgott inform\u00e1ci\u00f3k\u00e9rt.<\/li>\n\n\n\n<li class=\"translation-block\"><strong>Jogi k\u00f6vetkezm\u00e9nyek<\/strong>: A kisziv\u00e1rgott inform\u00e1ci\u00f3 t\u00edpus\u00e1t\u00f3l f\u00fcgg\u0151en jogi k\u00f6vetkezm\u00e9nyek is lehetnek az influencerek \u00e9s az \u00e1ltaluk haszn\u00e1lt platformok sz\u00e1m\u00e1ra. Az influencerek peres elj\u00e1r\u00e1sokkal vagy b\u00edrs\u00e1gokkal szembes\u00fclhetnek a szab\u00e1lyoz\u00f3 hat\u00f3s\u00e1gokt\u00f3l, ha gondatlannak tal\u00e1lj\u00e1k \u0151ket az adataik v\u00e9delm\u00e9ben, vagy ha a kisziv\u00e1rgott inform\u00e1ci\u00f3k m\u00e1soknak \u00e1rtanak.<\/li>\n<\/ul>\n\n\n\n<blockquote class=\"twitter-tweet\"><p lang=\"en\" dir=\"ltr\">Drake reag\u00e1l, miut\u00e1n egy \u00e1ll\u00edt\u00f3lagos kisziv\u00e1rgott X-besorol\u00e1s\u00fa vide\u00f3ja a \u2018rak\u00e9t\u00e1j\u00e1r\u00f3l\u2019 v\u00edrusk\u00e9nt terjed <a href=\"https:\/\/t.co\/4AKsTET3dN\">https:\/\/t.co\/4AKsTET3dN<\/a> <a href=\"https:\/\/t.co\/XiWAZQivp7\">k\u00e9p.twitter.com\/XiWAZQivp7<\/a><\/p>\u2014 New York Post (@nypost) <a href=\"https:\/\/twitter.com\/nypost\/status\/1755396308024574029?ref_src=twsrc%5Etfw\">2024. febru\u00e1r 8.<\/a><\/blockquote> <script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n\n\n<h3 class=\"wp-block-heading\" id=\"protecting-against-influencers-leaked-incidents\"><strong>V\u00e9dekez\u00e9s az influencerek kisziv\u00e1rogtat\u00e1si incidensei ellen<\/strong><\/h3>\n\n\n<p>Az influencerek adatainak megoszt\u00e1sa eseteinek n\u00f6veked\u00e9se miatt az influencereknek azonnali l\u00e9p\u00e9seket kell tenni\u00fck online tereik biztons\u00e1g\u00e1nak meg\u0151rz\u00e9se \u00e9rdek\u00e9ben.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"translation-block\"><strong>K\u00e9tfaktoros hiteles\u00edt\u00e9s (2FA)<\/strong>: Az egyik legegyszer\u0171bb, m\u00e9gis leghat\u00e9konyabb m\u00f3dja a kibert\u00e1mad\u00e1sok elleni v\u00e9dekez\u00e9snek a k\u00e9tl\u00e9pcs\u0151s bejelentkez\u00e9s enged\u00e9lyez\u00e9se. Ez egy extra biztons\u00e1gi r\u00e9teget ad hozz\u00e1, megnehez\u00edtve a hackerek sz\u00e1m\u00e1ra az influencer fi\u00f3kj\u00e1hoz val\u00f3 hozz\u00e1f\u00e9r\u00e9st.<\/li>\n\n\n\n<li class=\"translation-block\"><strong>Er\u0151s, egyedi jelszavak<\/strong>: Az influencereknek ker\u00fclni\u00fck kell ugyanazon jelsz\u00f3 haszn\u00e1lat\u00e1t t\u00f6bb oldalon. Az er\u0151s, egyedi jelszavak jelent\u0151sen cs\u00f6kkenthetik annak es\u00e9ly\u00e9t, hogy fi\u00f3kjaikat felt\u00f6rj\u00e9k, megel\u0151zve priv\u00e1t inform\u00e1ci\u00f3ik kisziv\u00e1rg\u00e1s\u00e1t.<\/li>\n\n\n\n<li class=\"translation-block\"><strong>Rendszeres biztons\u00e1gi auditok<\/strong>: Rendszeres biztons\u00e1gi auditok v\u00e9grehajt\u00e1sa, p\u00e9ld\u00e1ul az alkalmaz\u00e1sok \u00e9s m\u00e1s szolg\u00e1ltat\u00e1sok \u00e1ttekint\u00e9se, amelyek hozz\u00e1f\u00e9rnek a fi\u00f3kjaikhoz, seg\u00edthet azonos\u00edtani a potenci\u00e1lis sebezhet\u0151s\u00e9geket, miel\u0151tt azokat kihaszn\u00e1ln\u00e1k.<\/li>\n\n\n\n<li class=\"translation-block\"><strong>Professzion\u00e1lis biztons\u00e1gi seg\u00edts\u00e9g<\/strong>: Ahogy az influencerek egyre nagyobb\u00e1 v\u00e1lnak, sz\u00fcks\u00e9g\u00fck lehet arra, hogy befektessenek professzion\u00e1lis biztons\u00e1gi seg\u00edts\u00e9gbe, hogy megv\u00e9dj\u00e9k fi\u00f3kjaikat \u00e9s inform\u00e1ci\u00f3ikat, cs\u00f6kkentve az influencerek kisziv\u00e1rgott eseteinek val\u00f3sz\u00edn\u0171s\u00e9g\u00e9t.<\/li>\n<\/ul>\n\n\n<h3 class=\"wp-block-heading\" id=\"the-role-of-social-media-platforms-in-preventing-data-leaks\"><strong>A k\u00f6z\u00f6ss\u00e9gi m\u00e9dia platformok szerepe az adatsziv\u00e1rg\u00e1sok megel\u0151z\u00e9s\u00e9ben<\/strong><\/h3>\n\n\n<p>M\u00edg az influencereknek felel\u0151ss\u00e9g\u00fck van fi\u00f3kjaik biztons\u00e1g\u00e1nak meg\u0151rz\u00e9s\u00e9ben, a k\u00f6z\u00f6ss\u00e9gi m\u00e9dia platformoknak is jelent\u0151s szerep\u00fck van a sziv\u00e1rg\u00e1sok megel\u0151z\u00e9s\u00e9ben. Az olyan platformoknak, mint az Instagram, a TikTok \u00e9s a YouTube, folyamatosan friss\u00edteni\u00fck kell biztons\u00e1gi int\u00e9zked\u00e9seiket, jav\u00edtaniuk kell a sebezhet\u0151s\u00e9geket, \u00e9s jobb eszk\u00f6z\u00f6ket kell biztos\u00edtaniuk a felhaszn\u00e1l\u00f3knak inform\u00e1ci\u00f3ik v\u00e9delm\u00e9re.<\/p>\n\n\n\n<p class=\"translation-block\">A platformoknak is gyorsan kell cselekedni\u00fck, amikor sziv\u00e1rg\u00e1sok t\u00f6rt\u00e9nnek, seg\u00edtve azokat, akiket \u00e9rint az <a href=\"https:\/\/www.engmanagement.engineering.cornell.edu\/economicgrowthslows\/social-media-influencer-leaks.html\" target=\"_blank\" rel=\"noreferrer noopener\">influencerek kisziv\u00e1rgott inform\u00e1ci\u00f3i<\/a>, \u00e9s biztos\u00edtva, hogy b\u00e1rmilyen kompromitt\u00e1lt tartalom gyorsan elt\u00e1vol\u00edt\u00e1sra ker\u00fclj\u00f6n, hogy korl\u00e1tozz\u00e1k a tov\u00e1bbi k\u00e1rokat.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"the-future-of-privacy-for-influencers\"><strong>Az influencerek mag\u00e1n\u00e9let\u00e9nek j\u00f6v\u0151je<\/strong><\/h2>\n\n\n<p>Az \u201cinfluencerek kisziv\u00e1rogtat\u00e1sa\u201d kifejez\u00e9s egyre gyakoribb\u00e1 v\u00e1lik a mai online vil\u00e1gban, hangs\u00falyozva a fokozott biztons\u00e1gi gyakorlatok sz\u00fcks\u00e9gess\u00e9g\u00e9t minden ter\u00fcleten. Ahogy az influencerek tov\u00e1bbra is n\u00f6vekednek h\u00edrn\u00e9vben \u00e9s befoly\u00e1sban, \u00e9bernek kell maradniuk inform\u00e1ci\u00f3ik v\u00e9delm\u00e9ben. Ugyanilyen fontos a k\u00f6z\u00f6ss\u00e9gi m\u00e9dia platformok szerepe a felhaszn\u00e1l\u00f3ik mag\u00e1n\u00e9let\u00e9nek v\u00e9delm\u00e9ben.<\/p>\n\n\n\n<p>Az adatv\u00e9delem \u00e9s a biztons\u00e1g proakt\u00edv megk\u00f6zel\u00edt\u00e9s\u00e9nek alkalmaz\u00e1s\u00e1val mind az influencerek, mind az \u00e1ltaluk haszn\u00e1lt platformok egy\u00fcttm\u0171k\u00f6dhetnek annak \u00e9rdek\u00e9ben, hogy cs\u00f6kkents\u00e9k a szem\u00e9lyes inform\u00e1ci\u00f3k kisziv\u00e1rg\u00e1s\u00e1nak kock\u00e1zat\u00e1t, \u00e9s megakad\u00e1lyozz\u00e1k, hogy ez a n\u00f6vekv\u0151 fenyeget\u00e9s tov\u00e1bb fokoz\u00f3djon.<\/p>","protected":false},"excerpt":{"rendered":"<p>Lately, we have noticed a rise in the term \u201cinfluencers leaked\u201d as personal info from social media stars keeps getting stolen and shown to everyone. From private chats and personal\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/hu\/adatszivargasok\/az-influencerek-kiszivarogtattak-egy-novekvo-veszelyt-az-online-biztonsagra\/\">Folytat\u00e1s <span class=\"screen-reader-text\">Kisziv\u00e1rgott influencerek: Egyre n\u00f6vekv\u0151 vesz\u00e9ly az online biztons\u00e1gra<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":2664,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15,42,17,23,31],"tags":[],"class_list":["post-2663","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-data-leaks","category-data-privacy","category-news","category-technology","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Influencers Leaked: A Rising Danger to Online Safety | Security Briefing<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/hu\/adatszivargasok\/az-influencerek-kiszivarogtattak-egy-novekvo-veszelyt-az-online-biztonsagra\/\" \/>\n<meta property=\"og:locale\" content=\"hu_HU\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Influencers Leaked: A Rising Danger to Online Safety | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Lately, we have noticed a rise in the term &#8220;influencers leaked&#8221; as personal info from social media stars keeps getting stolen and shown to everyone. From private chats and personal&hellip; Continue reading Influencers Leaked: A Rising Danger to Online Safety\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/hu\/adatszivargasok\/az-influencerek-kiszivarogtattak-egy-novekvo-veszelyt-az-online-biztonsagra\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-13T00:16:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-10T01:45:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Influencers-Leaked-A-Rising-Danger-to-Online-Safety.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1265\" \/>\n\t<meta property=\"og:image:height\" content=\"422\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Szerz\u0151:\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Becs\u00fclt olvas\u00e1si id\u0151\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 perc\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/data-leaks\/influencers-leaked-a-rising-danger-to-online-safety\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/data-leaks\/influencers-leaked-a-rising-danger-to-online-safety\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"Influencers Leaked: A Rising Danger to Online Safety\",\"datePublished\":\"2024-09-13T00:16:29+00:00\",\"dateModified\":\"2025-09-10T01:45:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/data-leaks\/influencers-leaked-a-rising-danger-to-online-safety\/\"},\"wordCount\":1083,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/data-leaks\/influencers-leaked-a-rising-danger-to-online-safety\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Influencers-Leaked-A-Rising-Danger-to-Online-Safety.jpg\",\"articleSection\":[\"cybersecurity\",\"Data Leaks\",\"data privacy\",\"News\",\"Technology\"],\"inLanguage\":\"hu\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/data-leaks\/influencers-leaked-a-rising-danger-to-online-safety\/\",\"url\":\"https:\/\/securitybriefing.net\/data-leaks\/influencers-leaked-a-rising-danger-to-online-safety\/\",\"name\":\"Influencers Leaked: A Rising Danger to Online Safety | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/data-leaks\/influencers-leaked-a-rising-danger-to-online-safety\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/data-leaks\/influencers-leaked-a-rising-danger-to-online-safety\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Influencers-Leaked-A-Rising-Danger-to-Online-Safety.jpg\",\"datePublished\":\"2024-09-13T00:16:29+00:00\",\"dateModified\":\"2025-09-10T01:45:08+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/data-leaks\/influencers-leaked-a-rising-danger-to-online-safety\/#breadcrumb\"},\"inLanguage\":\"hu\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/data-leaks\/influencers-leaked-a-rising-danger-to-online-safety\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/data-leaks\/influencers-leaked-a-rising-danger-to-online-safety\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Influencers-Leaked-A-Rising-Danger-to-Online-Safety.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Influencers-Leaked-A-Rising-Danger-to-Online-Safety.jpg\",\"width\":1265,\"height\":422,\"caption\":\"Influencers Leaked A Rising Danger to Online Safety\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/data-leaks\/influencers-leaked-a-rising-danger-to-online-safety\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Influencers Leaked: A Rising Danger to Online Safety\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"hu\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/hu\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Influencerek kisziv\u00e1rogtatva: N\u00f6vekv\u0151 vesz\u00e9ly az online biztons\u00e1gra | Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/hu\/adatszivargasok\/az-influencerek-kiszivarogtattak-egy-novekvo-veszelyt-az-online-biztonsagra\/","og_locale":"hu_HU","og_type":"article","og_title":"Influencers Leaked: A Rising Danger to Online Safety | Security Briefing","og_description":"Lately, we have noticed a rise in the term &#8220;influencers leaked&#8221; as personal info from social media stars keeps getting stolen and shown to everyone. From private chats and personal&hellip; Continue reading Influencers Leaked: A Rising Danger to Online Safety","og_url":"https:\/\/securitybriefing.net\/hu\/adatszivargasok\/az-influencerek-kiszivarogtattak-egy-novekvo-veszelyt-az-online-biztonsagra\/","og_site_name":"Security Briefing","article_published_time":"2024-09-13T00:16:29+00:00","article_modified_time":"2025-09-10T01:45:08+00:00","og_image":[{"width":1265,"height":422,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Influencers-Leaked-A-Rising-Danger-to-Online-Safety.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"Szerz\u0151:":"C\u00e9sar Daniel Barreto","Becs\u00fclt olvas\u00e1si id\u0151":"5 perc"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/data-leaks\/influencers-leaked-a-rising-danger-to-online-safety\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/data-leaks\/influencers-leaked-a-rising-danger-to-online-safety\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"Influencers Leaked: A Rising Danger to Online Safety","datePublished":"2024-09-13T00:16:29+00:00","dateModified":"2025-09-10T01:45:08+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/data-leaks\/influencers-leaked-a-rising-danger-to-online-safety\/"},"wordCount":1083,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/data-leaks\/influencers-leaked-a-rising-danger-to-online-safety\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Influencers-Leaked-A-Rising-Danger-to-Online-Safety.jpg","articleSection":["cybersecurity","Data Leaks","data privacy","News","Technology"],"inLanguage":"hu"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/data-leaks\/influencers-leaked-a-rising-danger-to-online-safety\/","url":"https:\/\/securitybriefing.net\/data-leaks\/influencers-leaked-a-rising-danger-to-online-safety\/","name":"Influencerek kisziv\u00e1rogtatva: N\u00f6vekv\u0151 vesz\u00e9ly az online biztons\u00e1gra | Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/data-leaks\/influencers-leaked-a-rising-danger-to-online-safety\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/data-leaks\/influencers-leaked-a-rising-danger-to-online-safety\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Influencers-Leaked-A-Rising-Danger-to-Online-Safety.jpg","datePublished":"2024-09-13T00:16:29+00:00","dateModified":"2025-09-10T01:45:08+00:00","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/data-leaks\/influencers-leaked-a-rising-danger-to-online-safety\/#breadcrumb"},"inLanguage":"hu","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/data-leaks\/influencers-leaked-a-rising-danger-to-online-safety\/"]}]},{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/data-leaks\/influencers-leaked-a-rising-danger-to-online-safety\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Influencers-Leaked-A-Rising-Danger-to-Online-Safety.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Influencers-Leaked-A-Rising-Danger-to-Online-Safety.jpg","width":1265,"height":422,"caption":"Influencers Leaked A Rising Danger to Online Safety"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/data-leaks\/influencers-leaked-a-rising-danger-to-online-safety\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Influencers Leaked: A Rising Danger to Online Safety"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"hu"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"C\u00e9sar D\u00e1niel Barreto","image":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto elismert kiberbiztons\u00e1gi \u00edr\u00f3 \u00e9s szak\u00e9rt\u0151, aki m\u00e9lyrehat\u00f3 tud\u00e1s\u00e1r\u00f3l \u00e9s k\u00e9pess\u00e9g\u00e9r\u0151l ismert, hogy egyszer\u0171s\u00edtse a bonyolult kiberbiztons\u00e1gi t\u00e9m\u00e1kat. Kiterjedt h\u00e1l\u00f3zatbiztons\u00e1gi \u00e9s adatv\u00e9delmi tapasztalattal rendelkezik, rendszeresen k\u00f6z\u00f6l betekint\u0151 cikkeket \u00e9s elemz\u00e9seket a leg\u00fajabb kiberbiztons\u00e1gi trendekr\u0151l, oktatva mind a szakembereket, mind a nagyk\u00f6z\u00f6ns\u00e9get.","url":"https:\/\/securitybriefing.net\/hu\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/2663","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/comments?post=2663"}],"version-history":[{"count":1,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/2663\/revisions"}],"predecessor-version":[{"id":4548,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/2663\/revisions\/4548"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media\/2664"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media?parent=2663"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/categories?post=2663"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/tags?post=2663"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}