{"id":2663,"date":"2024-09-13T00:16:29","date_gmt":"2024-09-13T00:16:29","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=2663"},"modified":"2025-09-10T01:45:08","modified_gmt":"2025-09-10T01:45:08","slug":"ro-ri-cua-influencers-moi-nguy-hiem-tang-cao-doi-voi-an-toan-truc-tuyen","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/vi\/ro-ri-du-lieu\/ro-ri-cua-influencers-moi-nguy-hiem-tang-cao-doi-voi-an-toan-truc-tuyen\/","title":{"rendered":"Nh\u1eefng ng\u01b0\u1eddi c\u00f3 s\u1ee9c \u1ea3nh h\u01b0\u1edfng b\u1ecb r\u00f2 r\u1ec9: M\u1ed1i nguy hi\u1ec3m ng\u00e0y c\u00e0ng t\u0103ng \u0111\u1ed1i v\u1edbi s\u1ef1 an to\u00e0n tr\u1ef1c tuy\u1ebfn"},"content":{"rendered":"<p>G\u1ea7n \u0111\u00e2y, ch\u00fang t\u00f4i nh\u1eadn th\u1ea5y s\u1ef1 gia t\u0103ng c\u1ee7a thu\u1eadt ng\u1eef \"l\u1ed9 th\u00f4ng tin influencer\" khi th\u00f4ng tin c\u00e1 nh\u00e2n t\u1eeb c\u00e1c ng\u00f4i sao m\u1ea1ng x\u00e3 h\u1ed9i li\u00ean t\u1ee5c b\u1ecb \u0111\u00e1nh c\u1eafp v\u00e0 c\u00f4ng khai cho m\u1ecdi ng\u01b0\u1eddi. T\u1eeb c\u00e1c cu\u1ed9c tr\u00f2 chuy\u1ec7n ri\u00eang t\u01b0 v\u00e0 th\u00f4ng tin c\u00e1 nh\u00e2n \u0111\u1ebfn v\u1ea5n \u0111\u1ec1 t\u00e0i ch\u00ednh, nh\u1eefng v\u1ee5 r\u00f2 r\u1ec9 n\u00e0y \u0111\u00e3 b\u1eaft \u0111\u1ea7u c\u00e1c cu\u1ed9c th\u1ea3o lu\u1eadn l\u1edbn v\u1ec1 an to\u00e0n tr\u1ef1c tuy\u1ebfn v\u00e0 quy\u1ec1n ri\u00eang t\u01b0. Khi c\u00e1c influencer tr\u1edf n\u00ean n\u1ed5i ti\u1ebfng tr\u00ean c\u00e1c trang web nh\u01b0 Instagram, TikTok v\u00e0 YouTube, h\u1ecd tr\u1edf th\u00e0nh m\u1ee5c ti\u00eau ch\u00ednh c\u1ee7a t\u1ed9i ph\u1ea1m m\u1ea1ng, \u0111i\u1ec1u n\u00e0y d\u1eabn \u0111\u1ebfn nhi\u1ec1u tr\u01b0\u1eddng h\u1ee3p m\u00e0 r\u00f2 r\u1ec9 d\u1eef li\u1ec7u c\u1ee7a influencer l\u00e0 m\u1ed9t m\u1ed1i lo ng\u1ea1i to\u00e0n c\u1ea7u.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"what-does-influencers-leaked-mean\"><strong>\u201cInfluencers Leaked\u201d ngh\u0129a l\u00e0 g\u00ec?<\/strong><\/h3>\n\n\n<p>C\u1ee5m t\u1eeb \"r\u00f2 r\u1ec9 th\u00f4ng tin c\u1ee7a ng\u01b0\u1eddi c\u00f3 \u1ea3nh h\u01b0\u1edfng\" n\u00f3i v\u1ec1 nh\u1eefng l\u00fac th\u00f4ng tin c\u00e1 nh\u00e2n ho\u1eb7c nh\u1ea1y c\u1ea3m c\u1ee7a nh\u1eefng ng\u01b0\u1eddi c\u00f3 \u1ea3nh h\u01b0\u1edfng tr\u00ean m\u1ea1ng x\u00e3 h\u1ed9i b\u1ecb l\u1ed9, do hacker c\u1ed1 t\u00ecnh ho\u1eb7c v\u00f4 t\u00ecnh b\u1edfi c\u00e1c \u0111i\u1ec3m y\u1ebfu tr\u00ean n\u1ec1n t\u1ea3ng. Th\u00f4ng tin n\u00e0y th\u01b0\u1eddng bao g\u1ed3m c\u00e1c cu\u1ed9c tr\u00f2 chuy\u1ec7n ri\u00eang t\u01b0, chi ti\u1ebft t\u00e0i ch\u00ednh, \u0111\u1ecba ch\u1ec9 nh\u00e0 v\u00e0 th\u1eadm ch\u00ed c\u1ea3 gi\u1ea5y t\u1edd t\u00f9y th\u00e2n. V\u1edbi s\u1ef1 hi\u1ec7n di\u1ec7n l\u1edbn v\u00e0 l\u01b0\u1ee3ng ng\u01b0\u1eddi theo d\u00f5i \u0111\u00f4ng \u0111\u1ea3o, nh\u1eefng ng\u01b0\u1eddi c\u00f3 \u1ea3nh h\u01b0\u1edfng l\u00e0 m\u1ee5c ti\u00eau h\u1ea5p d\u1eabn cho t\u1ed9i ph\u1ea1m m\u1ea1ng mu\u1ed1n l\u1ee3i d\u1ee5ng th\u00f4ng tin c\u1ee7a h\u1ecd \u0111\u1ec3 tr\u1ee5c l\u1ee3i, t\u1ed1ng ti\u1ec1n ho\u1eb7c ch\u1ec9 \u0111\u1ec3 g\u00e2y r\u1ed1i.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"how-do-influencers-data-get-leaked\"><strong>D\u1eef li\u1ec7u c\u1ee7a nh\u1eefng ng\u01b0\u1eddi c\u00f3 \u1ea3nh h\u01b0\u1edfng b\u1ecb r\u00f2 r\u1ec9 nh\u01b0 th\u1ebf n\u00e0o?<\/strong><\/h3>\n\n\n<p>C\u00f3 m\u1ed9t v\u00e0i c\u00e1ch ch\u00fang t\u00f4i ph\u00e1t hi\u1ec7n nh\u1eefng ng\u01b0\u1eddi c\u00f3 \u1ea3nh h\u01b0\u1edfng \u0111\u01b0\u1ee3c chia s\u1ebb tr\u1ef1c tuy\u1ebfn. D\u01b0\u1edbi \u0111\u00e2y l\u00e0 nh\u1eefng c\u00e1ch ph\u1ed5 bi\u1ebfn nh\u1ea5t m\u00e0 k\u1ebb t\u1ea5n c\u00f4ng s\u1eed d\u1ee5ng:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"translation-block\"><strong>T\u1ea5n c\u00f4ng Phishing<\/strong>: M\u1ed9t trong nh\u1eefng c\u00e1ch ph\u1ed5 bi\u1ebfn m\u00e0 ch\u00fang t\u00f4i th\u1ea5y th\u00f4ng tin c\u1ee7a c\u00e1c influencer b\u1ecb r\u00f2 r\u1ec9 l\u00e0 qua phishing. Tin t\u1eb7c g\u1eedi <a href=\"https:\/\/www.securitymagazine.com\/articles\/92392-top-phishing-attack-techniques-used-by-hackers\" target=\"_blank\" rel=\"noopener\">email ho\u1eb7c tin nh\u1eafn gi\u1ea3 m\u1ea1o<\/a>, l\u1eeba c\u00e1c influencer cung c\u1ea5p th\u00f4ng tin t\u00e0i kho\u1ea3n. Sau khi x\u00e2m nh\u1eadp, t\u1ed9i ph\u1ea1m m\u1ea1ng c\u00f3 th\u1ec3 truy c\u1eadp v\u00e0o th\u00f4ng tin c\u00e1 nh\u00e2n, th\u01b0\u1eddng b\u1ecb r\u00f2 r\u1ec9 ra c\u00f4ng ch\u00fang.<\/li>\n\n\n\n<li class=\"translation-block\"><strong>M\u00e1nh kh\u00f3e x\u00e3 h\u1ed9i<\/strong>: Nh\u1eefng ng\u01b0\u1eddi x\u1ea5u th\u01b0\u1eddng s\u1eed d\u1ee5ng <a href=\"https:\/\/medium.com\/@qqqqemer\/10-dark-psychology-tricks-that-always-works-f3be3027a211\" target=\"_blank\" rel=\"noreferrer noopener\">m\u00e1nh kh\u00f3e x\u00e3 h\u1ed9i<\/a> \u0111\u1ec3 l\u1eeba tr\u1ee3 l\u00fd ho\u1eb7c nh\u00f3m c\u1ee7a h\u1ecd ti\u1ebft l\u1ed9 th\u00f4ng tin c\u00e1 nh\u00e2n. V\u00ed d\u1ee5, k\u1ebb t\u1ea5n c\u00f4ng c\u00f3 th\u1ec3 gi\u1ea3 l\u00e0m \u0111\u1ed3ng nghi\u1ec7p ho\u1eb7c \u0111\u1ea1i di\u1ec7n n\u1ec1n t\u1ea3ng \u0111\u1ec3 l\u1ea5y \u0111\u01b0\u1ee3c th\u00f4ng tin b\u00ed m\u1eadt, sau \u0111\u00f3 c\u00f3 th\u1ec3 d\u1eabn \u0111\u1ebfn vi\u1ec7c ng\u01b0\u1eddi c\u00f3 \u1ea3nh h\u01b0\u1edfng ti\u1ebft l\u1ed9 t\u00e0i li\u1ec7u ho\u1eb7c cu\u1ed9c tr\u00f2 chuy\u1ec7n.<\/li>\n\n\n\n<li class=\"translation-block\"><strong>\u0110i\u1ec3m y\u1ebfu c\u1ee7a trang web<\/strong>: Th\u1ec9nh tho\u1ea3ng, b\u1ea3n th\u00e2n c\u00e1c trang web l\u1ea1i y\u1ebfu. Ch\u00fang t\u00f4i \u0111\u00e3 th\u1ea5y m\u1ed9t s\u1ed1 tr\u01b0\u1eddng h\u1ee3p <a href=\"https:\/\/www.bitdefender.com\/blog\/hotforsecurity\/5-common-privacy-and-security-mistakes-youre-making-on-social-media\/?srsltid=AfmBOoq84j3OwVNI4kgS3l-hzrajldv7T79uZ5xCm-RTIykb1SRQLt_l\" target=\"_blank\" rel=\"noreferrer noopener\">sai l\u1ea7m b\u1ea3o m\u1eadt tr\u00ean m\u1ea1ng x\u00e3 h\u1ed9i<\/a> nh\u01b0 Instagram ho\u1eb7c X cho ph\u00e9p t\u1ed9i ph\u1ea1m m\u1ea1ng l\u1ee3i d\u1ee5ng c\u00e1c l\u1ed7 h\u1ed5ng, g\u00e2y ra r\u00f2 r\u1ec9 d\u1eef li\u1ec7u khi\u1ebfn th\u00f4ng tin c\u1ee7a c\u00e1c influencer b\u1ecb c\u00f4ng khai.<\/li>\n\n\n\n<li><strong>T\u00e0i kho\u1ea3n b\u1ecb hack<\/strong>: When a person\u2019s social media account is compromised, hackers can go into private notes, planned posts, and even secret pictures that were not meant for the public to see. This kind of information is often very useful to cybercriminals, mainly if they want to <a href=\"https:\/\/www.aura.com\/learn\/dark-web\" target=\"_blank\" rel=\"noreferrer noopener\">sell or swap influencer\u2019s leaked stuff<\/a> tr\u00ean web \u0111en.<\/li>\n<\/ul>\n\n\n\n<blockquote class=\"twitter-tweet\"><p lang=\"en\" dir=\"ltr\">More private celebrity photos stolen and leaked online with 'more yet to come'. <a href=\"https:\/\/t.co\/ejGgxUOX7A\">https:\/\/t.co\/ejGgxUOX7A<\/a> <a href=\"https:\/\/t.co\/BCiaB63ryM\">pic.twitter.com\/BCiaB63ryM<\/a><\/p>\u2014 LADbible (@ladbible) <a href=\"https:\/\/twitter.com\/ladbible\/status\/842306768420110341?ref_src=twsrc%5Etfw\">Ng\u00e0y 16 th\u00e1ng 3, 2017<\/a><\/blockquote> <script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n\n\n<h3 class=\"wp-block-heading\" id=\"highprofile-cases-of-influencers-leaked\"><strong>C\u00e1c tr\u01b0\u1eddng h\u1ee3p n\u1ed5i b\u1eadt c\u1ee7a ng\u01b0\u1eddi \u1ea3nh h\u01b0\u1edfng b\u1ecb r\u00f2 r\u1ec9<\/strong><\/h3>\n\n\n<p>Nhi\u1ec1u s\u1ef1 ki\u1ec7n n\u1ed5i ti\u1ebfng \u0111\u00e3 l\u00e0m r\u00f5 v\u1ea5n \u0111\u1ec1 r\u00f2 r\u1ec9 d\u1eef li\u1ec7u c\u1ee7a c\u00e1c influencer. V\u00ed d\u1ee5:<\/p>\n\n\n\n<p class=\"translation-block\">Trong m\u1ed9t <a href=\"https:\/\/www.bbc.com\/news\/world-asia-india-48347592\" target=\"_blank\" rel=\"noreferrer noopener\">tr\u01b0\u1eddng h\u1ee3p n\u1ed5i ti\u1ebfng<\/a>, m\u1ed9t v\u1ee5 r\u00f2 r\u1ec9 l\u1edbn \u0111\u00e3 ti\u1ebft l\u1ed9 nh\u1eefng ghi ch\u00fa v\u00e0 email ri\u00eang t\u01b0 c\u1ee7a m\u1ed9t ng\u00f4i sao Instagram n\u1ed5i ti\u1ebfng. C\u00e1c cu\u1ed9c tr\u00f2 chuy\u1ec7n v\u1edbi c\u00e1c ng\u00f4i sao v\u00e0 \u0111\u1ed3ng nghi\u1ec7p \u0111\u00e3 b\u1ecb chia s\u1ebb tr\u1ef1c tuy\u1ebfn, g\u00e2y thi\u1ec7t h\u1ea1i l\u1edbn cho danh ti\u1ebfng v\u00e0 m\u1ea5t ni\u1ec1m tin.<\/p>\n\n\n\n<p class=\"translation-block\">T\u01b0\u01a1ng t\u1ef1, \u0111\u00e3 c\u00f3 nh\u1eefng l\u1ea7n <a href=\"https:\/\/forcreators.com\/instagram-influencer-salary\/\" target=\"_blank\" rel=\"noreferrer noopener\">nh\u1eefng ng\u01b0\u1eddi c\u00f3 nhi\u1ec1u ng\u01b0\u1eddi theo d\u00f5i<\/a> chia s\u1ebb c\u00e1c chi ti\u1ebft v\u1ec1 ti\u1ec1n b\u1ea1c, nh\u01b0 thu nh\u1eadp t\u1eeb c\u00e1c th\u1ecfa thu\u1eadn v\u1edbi th\u01b0\u01a1ng hi\u1ec7u v\u00e0 c\u00e1c c\u00e1ch kh\u00e1c \u0111\u1ec3 ki\u1ebfm ti\u1ec1n, \u0111i\u1ec1u n\u00e0y \u0111\u01b0\u1ee3c hi\u1ec3n th\u1ecb cho t\u1ea5t c\u1ea3 m\u1ecdi ng\u01b0\u1eddi. \u0110i\u1ec1u n\u00e0y kh\u00f4ng ch\u1ec9 ti\u1ebft l\u1ed9 c\u00f4ng vi\u1ec7c ri\u00eang t\u01b0 c\u1ee7a h\u1ecd m\u00e0 c\u00f2n khi\u1ebfn h\u1ecd tr\u1edf th\u00e0nh m\u1ee5c ti\u00eau c\u1ee7a tr\u1ed9m c\u1eafp danh t\u00ednh v\u00e0 l\u1eeba \u0111\u1ea3o.<\/p>\n\n\n\n<p>Nh\u1eefng s\u1ef1 ki\u1ec7n n\u00e0y cho th\u1ea5y k\u1ebft qu\u1ea3 c\u00f3 th\u1ec3 l\u1edbn nh\u01b0 th\u1ebf n\u00e0o khi nh\u1eefng ng\u01b0\u1eddi c\u00f3 \u1ea3nh h\u01b0\u1edfng \u0111\u1ec3 l\u1ed9 th\u00f4ng tin c\u1ee7a h\u1ecd, khi\u1ebfn t\u1eeb \"influencers b\u1ecb r\u00f2 r\u1ec9\" tr\u1edf th\u00e0nh m\u1ed9t m\u1ed1i lo ng\u1ea1i l\u1edbn \u0111\u1ed1i v\u1edbi c\u1ed9ng \u0111\u1ed3ng tr\u1ef1c tuy\u1ebfn.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"the-impact-of-influencers-leaked-data\"><strong>T\u00e1c \u0111\u1ed9ng c\u1ee7a d\u1eef li\u1ec7u b\u1ecb r\u00f2 r\u1ec9 c\u1ee7a nh\u1eefng ng\u01b0\u1eddi \u1ea3nh h\u01b0\u1edfng<\/strong><\/h3>\n\n\n<p>T\u00e1c \u0111\u1ed9ng c\u1ee7a vi\u1ec7c l\u1ed9 th\u00f4ng tin c\u1ee7a c\u00e1c influencer c\u00f3 th\u1ec3 r\u1ea5t l\u1edbn, c\u1ea3 v\u1ec1 m\u1eb7t c\u00e1 nh\u00e2n v\u00e0 chuy\u00ean nghi\u1ec7p:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>T\u1ed5n h\u1ea1i \u0111\u1ebfn danh ti\u1ebfng<\/strong>: Khi c\u00e1c cu\u1ed9c tr\u00f2 chuy\u1ec7n ri\u00eang t\u01b0 ho\u1eb7c n\u1ed9i dung kh\u00f4ng ph\u00f9 h\u1ee3p c\u1ee7a ng\u01b0\u1eddi n\u1ed5i ti\u1ebfng b\u1ecb l\u1ed9, n\u00f3 c\u00f3 th\u1ec3 g\u00e2y ra th\u1ea3m h\u1ecda quan h\u1ec7 c\u00f4ng ch\u00fang. nh\u01b0 \u0111\u01b0\u1ee3c khuy\u00ean b\u1edfi <a href=\"https:\/\/celebrity-news.us\/\">tin t\u1ee9c ng\u01b0\u1eddi n\u1ed5i ti\u1ebfng M\u1ef9<\/a> C\u00e1c th\u01b0\u01a1ng hi\u1ec7u c\u00f3 th\u1ec3 ch\u1ecdn c\u00e1ch xa l\u00e1nh ng\u01b0\u1eddi \u1ea3nh h\u01b0\u1edfng, d\u1eabn \u0111\u1ebfn m\u1ea5t c\u00e1c h\u1ee3p \u0111\u1ed3ng v\u00e0 c\u01a1 h\u1ed9i kinh doanh.<\/li>\n\n\n\n<li class=\"translation-block\"><strong>M\u1ea5t ni\u1ec1m tin<\/strong>: Ng\u01b0\u1eddi h\u00e2m m\u1ed9 v\u00e0 ng\u01b0\u1eddi theo d\u00f5i c\u00f3 th\u1ec3 ng\u1eebng tin t\u01b0\u1edfng v\u00e0o nh\u1eefng ng\u01b0\u1eddi \u1ea3nh h\u01b0\u1edfng n\u1ebfu h\u1ecd ngh\u0129 r\u1eb1ng ng\u01b0\u1eddi m\u00e0 h\u1ecd \u0111ang theo d\u00f5i \u0111ang che gi\u1ea5u s\u1ef1 th\u1eadt ho\u1eb7c h\u00e0nh \u0111\u1ed9ng theo c\u00e1ch kh\u00f4ng ph\u00f9 h\u1ee3p v\u1edbi h\u00ecnh \u1ea3nh c\u00f4ng khai c\u1ee7a h\u1ecd. <a href=\"https:\/\/www.thedrum.com\/news\/2023\/06\/06\/nearly-90-consumers-no-longer-trust-influencers-new-study-finds\" target=\"_blank\" rel=\"noreferrer noopener\">M\u1ea5t ni\u1ec1m tin<\/a> n\u00e0y c\u00f3 th\u1ec3 l\u00e0m gi\u1ea3m t\u1ef7 l\u1ec7 t\u01b0\u01a1ng t\u00e1c c\u1ee7a ng\u01b0\u1eddi \u1ea3nh h\u01b0\u1edfng v\u00e0 m\u1ee9c \u0111\u1ed9 ph\u1ed5 bi\u1ebfn c\u1ee7a h\u1ecd.<\/li>\n\n\n\n<li class=\"translation-block\"><strong>H\u1ec7 l\u1ee5y t\u00e0i ch\u00ednh<\/strong>: Trong nh\u1eefng tr\u01b0\u1eddng h\u1ee3p r\u1ea5t nghi\u00eam tr\u1ecdng, c\u00e1c chi ti\u1ebft t\u00e0i ch\u00ednh b\u1ecb r\u00f2 r\u1ec9 c\u1ee7a ng\u01b0\u1eddi \u1ea3nh h\u01b0\u1edfng \u0111\u00e3 d\u1eabn \u0111\u1ebfn c\u00e1c giao d\u1ecbch gian l\u1eadn, tr\u1ed9m c\u1eafp danh t\u00ednh, ho\u1eb7c th\u1eadm ch\u00ed l\u00e0 hacker \u0111e d\u1ecda y\u00eau c\u1ea7u ti\u1ec1n chu\u1ed9c cho th\u00f4ng tin b\u1ecb l\u1ed9.<\/li>\n\n\n\n<li class=\"translation-block\"><strong>H\u1eadu qu\u1ea3 ph\u00e1p l\u00fd<\/strong>: T\u00f9y thu\u1ed9c v\u00e0o lo\u1ea1i th\u00f4ng tin b\u1ecb r\u00f2 r\u1ec9, c\u00f3 th\u1ec3 c\u00f3 h\u1eadu qu\u1ea3 ph\u00e1p l\u00fd \u0111\u1ed1i v\u1edbi nh\u1eefng ng\u01b0\u1eddi \u1ea3nh h\u01b0\u1edfng v\u00e0 c\u00e1c n\u1ec1n t\u1ea3ng h\u1ecd s\u1eed d\u1ee5ng. Nh\u1eefng ng\u01b0\u1eddi \u1ea3nh h\u01b0\u1edfng c\u00f3 th\u1ec3 ph\u1ea3i \u0111\u1ed1i m\u1eb7t v\u1edbi c\u00e1c v\u1ee5 ki\u1ec7n ho\u1eb7c ph\u1ea1t ti\u1ec1n t\u1eeb c\u00e1c c\u01a1 quan qu\u1ea3n l\u00fd n\u1ebfu h\u1ecd b\u1ecb ph\u00e1t hi\u1ec7n l\u01a1 l\u00e0 trong vi\u1ec7c b\u1ea3o v\u1ec7 d\u1eef li\u1ec7u c\u1ee7a m\u00ecnh ho\u1eb7c n\u1ebfu th\u00f4ng tin b\u1ecb r\u00f2 r\u1ec9 g\u00e2y h\u1ea1i cho ng\u01b0\u1eddi kh\u00e1c.<\/li>\n<\/ul>\n\n\n\n<blockquote class=\"twitter-tweet\"><p lang=\"en\" dir=\"ltr\">Drake ph\u1ea3n h\u1ed3i sau khi m\u1ed9t video X-rated b\u1ecb r\u00f2 r\u1ec9 \u0111\u01b0\u1ee3c cho l\u00e0 c\u1ee7a anh \u1ea5y v\u1edbi \u2018t\u00ean l\u1eeda\u2019 c\u1ee7a m\u00ecnh lan truy\u1ec1n <a href=\"https:\/\/t.co\/4AKsTET3dN\">https:\/\/t.co\/4AKsTET3dN<\/a> <a href=\"https:\/\/t.co\/XiWAZQivp7\">pic.twitter.com\/XiWAZQivp7<\/a><\/p>\u2014 New York Post (@nypost) <a href=\"https:\/\/twitter.com\/nypost\/status\/1755396308024574029?ref_src=twsrc%5Etfw\">Ng\u00e0y 8 th\u00e1ng 2, 2024<\/a><\/blockquote> <script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n\n\n<h3 class=\"wp-block-heading\" id=\"protecting-against-influencers-leaked-incidents\"><strong>B\u1ea3o v\u1ec7 ch\u1ed1ng l\u1ea1i c\u00e1c s\u1ef1 c\u1ed1 b\u1ecb r\u00f2 r\u1ec9 t\u1eeb ng\u01b0\u1eddi \u1ea3nh h\u01b0\u1edfng<\/strong><\/h3>\n\n\n<p>Do s\u1ef1 gia t\u0103ng c\u00e1c tr\u01b0\u1eddng h\u1ee3p d\u1eef li\u1ec7u c\u1ee7a ng\u01b0\u1eddi \u1ea3nh h\u01b0\u1edfng b\u1ecb chia s\u1ebb, nh\u1eefng ng\u01b0\u1eddi \u1ea3nh h\u01b0\u1edfng ph\u1ea3i th\u1ef1c hi\u1ec7n c\u00e1c b\u01b0\u1edbc ngay l\u1eadp t\u1ee9c \u0111\u1ec3 b\u1ea3o v\u1ec7 kh\u00f4ng gian tr\u1ef1c tuy\u1ebfn c\u1ee7a h\u1ecd.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"translation-block\"><strong>X\u00e1c th\u1ef1c hai y\u1ebfu t\u1ed1 (2FA)<\/strong>: M\u1ed9t trong nh\u1eefng c\u00e1ch \u0111\u01a1n gi\u1ea3n nh\u01b0ng hi\u1ec7u qu\u1ea3 nh\u1ea5t \u0111\u1ec3 b\u1ea3o v\u1ec7 kh\u1ecfi c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng m\u1ea1ng l\u00e0 k\u00edch ho\u1ea1t \u0111\u0103ng nh\u1eadp hai b\u01b0\u1edbc. \u0110i\u1ec1u n\u00e0y th\u00eam m\u1ed9t l\u1edbp b\u1ea3o m\u1eadt b\u1ed5 sung, khi\u1ebfn hacker kh\u00f3 ti\u1ebfp c\u1eadn t\u00e0i kho\u1ea3n c\u1ee7a ng\u01b0\u1eddi c\u00f3 \u1ea3nh h\u01b0\u1edfng.<\/li>\n\n\n\n<li class=\"translation-block\"><strong>M\u1eadt kh\u1ea9u M\u1ea1nh v\u00e0 \u0110\u1ed9c \u0111\u00e1o<\/strong>: Nh\u1eefng ng\u01b0\u1eddi c\u00f3 \u1ea3nh h\u01b0\u1edfng n\u00ean tr\u00e1nh s\u1eed d\u1ee5ng c\u00f9ng m\u1ed9t m\u1eadt kh\u1ea9u tr\u00ean nhi\u1ec1u trang web. M\u1eadt kh\u1ea9u m\u1ea1nh v\u00e0 \u0111\u1ed9c \u0111\u00e1o c\u00f3 th\u1ec3 gi\u1ea3m \u0111\u00e1ng k\u1ec3 kh\u1ea3 n\u0103ng t\u00e0i kho\u1ea3n c\u1ee7a h\u1ecd b\u1ecb hack, ng\u0103n ch\u1eb7n th\u00f4ng tin c\u00e1 nh\u00e2n b\u1ecb r\u00f2 r\u1ec9.<\/li>\n\n\n\n<li class=\"translation-block\"><strong>Ki\u1ec3m to\u00e1n b\u1ea3o m\u1eadt \u0111\u1ecbnh k\u1ef3<\/strong>: Ti\u1ebfn h\u00e0nh ki\u1ec3m to\u00e1n b\u1ea3o m\u1eadt \u0111\u1ecbnh k\u1ef3, nh\u01b0 ki\u1ec3m tra c\u00e1c \u1ee9ng d\u1ee5ng v\u00e0 d\u1ecbch v\u1ee5 kh\u00e1c c\u00f3 quy\u1ec1n truy c\u1eadp v\u00e0o t\u00e0i kho\u1ea3n c\u1ee7a h\u1ecd, c\u00f3 th\u1ec3 gi\u00fap x\u00e1c \u0111\u1ecbnh c\u00e1c l\u1ed7 h\u1ed5ng ti\u1ec1m \u1ea9n tr\u01b0\u1edbc khi ch\u00fang b\u1ecb khai th\u00e1c.<\/li>\n\n\n\n<li class=\"translation-block\"><strong>H\u1ed7 tr\u1ee3 b\u1ea3o m\u1eadt chuy\u00ean nghi\u1ec7p<\/strong>: Khi nh\u1eefng ng\u01b0\u1eddi c\u00f3 \u1ea3nh h\u01b0\u1edfng ng\u00e0y c\u00e0ng l\u1edbn, h\u1ecd c\u00f3 th\u1ec3 c\u1ea7n ph\u1ea3i \u0111\u1ea7u t\u01b0 v\u00e0o h\u1ed7 tr\u1ee3 b\u1ea3o m\u1eadt chuy\u00ean nghi\u1ec7p \u0111\u1ec3 b\u1ea3o v\u1ec7 t\u00e0i kho\u1ea3n v\u00e0 th\u00f4ng tin c\u1ee7a m\u00ecnh, gi\u1ea3m kh\u1ea3 n\u0103ng x\u1ea3y ra s\u1ef1 c\u1ed1 r\u00f2 r\u1ec9 d\u1eef li\u1ec7u.<\/li>\n<\/ul>\n\n\n<h3 class=\"wp-block-heading\" id=\"the-role-of-social-media-platforms-in-preventing-data-leaks\"><strong>Vai tr\u00f2 c\u1ee7a c\u00e1c n\u1ec1n t\u1ea3ng m\u1ea1ng x\u00e3 h\u1ed9i trong vi\u1ec7c ng\u0103n ch\u1eb7n r\u00f2 r\u1ec9 d\u1eef li\u1ec7u<\/strong><\/h3>\n\n\n<p>Trong khi nh\u1eefng ng\u01b0\u1eddi \u1ea3nh h\u01b0\u1edfng c\u00f3 tr\u00e1ch nhi\u1ec7m b\u1ea3o v\u1ec7 t\u00e0i kho\u1ea3n c\u1ee7a m\u00ecnh, c\u00e1c n\u1ec1n t\u1ea3ng m\u1ea1ng x\u00e3 h\u1ed9i c\u0169ng \u0111\u00f3ng m\u1ed9t vai tr\u00f2 quan tr\u1ecdng trong vi\u1ec7c ng\u0103n ch\u1eb7n r\u00f2 r\u1ec9. C\u00e1c n\u1ec1n t\u1ea3ng nh\u01b0 Instagram, TikTok v\u00e0 YouTube ph\u1ea3i li\u00ean t\u1ee5c c\u1eadp nh\u1eadt c\u00e1c bi\u1ec7n ph\u00e1p b\u1ea3o m\u1eadt c\u1ee7a m\u00ecnh, s\u1eeda c\u00e1c l\u1ed7 h\u1ed5ng v\u00e0 cung c\u1ea5p cho ng\u01b0\u1eddi d\u00f9ng c\u00e1c c\u00f4ng c\u1ee5 t\u1ed1t h\u01a1n \u0111\u1ec3 b\u1ea3o v\u1ec7 th\u00f4ng tin c\u1ee7a h\u1ecd.<\/p>\n\n\n\n<p class=\"translation-block\"><span style=\"margin: 0px;padding: 0px\">C\u00e1c n\u1ec1n t\u1ea3ng c\u0169ng n\u00ean h\u00e0nh \u0111\u1ed9ng nhanh ch\u00f3ng khi c\u00f3 s\u1ef1 c\u1ed1 r\u00f2 r\u1ec9, h\u1ed7 tr\u1ee3 nh\u1eefng ng\u01b0\u1eddi b\u1ecb \u1ea3nh h\u01b0\u1edfng b\u1edfi <a href=\"https:\/\/www.engmanagement.engineering.cornell.edu\/economicgrowthslows\/social-media-influencer-leaks.html\" target=\"_blank\" rel=\"noreferrer noopener\">th\u00f4ng tin b\u1ecb r\u00f2 r\u1ec9 c\u1ee7a nh\u1eefng ng\u01b0\u1eddi c\u00f3 \u1ea3nh h\u01b0\u1edfng<\/a> v\u00e0 \u0111\u1ea3m b\u1ea3o r\u1eb1ng b\u1ea5t k\u1ef3 n\u1ed9i dung n\u00e0o b\u1ecb x\u00e2m ph\u1ea1m \u0111\u1ec1u \u0111\u01b0\u1ee3c x\u00f3a nhanh ch\u00f3ng \u0111\u1ec3 h\u1ea1n ch\u1ebf thi\u1ec7t h\u1ea1i th\u00eam.<\/span><\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"the-future-of-privacy-for-influencers\"><strong>T\u01b0\u01a1ng lai c\u1ee7a quy\u1ec1n ri\u00eang t\u01b0 d\u00e0nh cho ng\u01b0\u1eddi \u1ea3nh h\u01b0\u1edfng<\/strong><\/h2>\n\n\n<p>Thu\u1eadt ng\u1eef \"influencers leaked\" ng\u00e0y c\u00e0ng tr\u1edf n\u00ean ph\u1ed5 bi\u1ebfn trong th\u1ebf gi\u1edbi tr\u1ef1c tuy\u1ebfn hi\u1ec7n nay, nh\u1ea5n m\u1ea1nh s\u1ef1 c\u1ea7n thi\u1ebft c\u1ee7a vi\u1ec7c n\u00e2ng cao c\u00e1c bi\u1ec7n ph\u00e1p b\u1ea3o m\u1eadt tr\u00ean m\u1ecdi l\u0129nh v\u1ef1c. Khi c\u00e1c influencer ti\u1ebfp t\u1ee5c gia t\u0103ng s\u1ef1 n\u1ed5i ti\u1ebfng v\u00e0 \u1ea3nh h\u01b0\u1edfng, h\u1ecd ph\u1ea3i lu\u00f4n c\u1ea3nh gi\u00e1c trong vi\u1ec7c b\u1ea3o v\u1ec7 th\u00f4ng tin c\u1ee7a m\u00ecnh. C\u0169ng quan tr\u1ecdng kh\u00f4ng k\u00e9m l\u00e0 vai tr\u00f2 m\u00e0 c\u00e1c n\u1ec1n t\u1ea3ng m\u1ea1ng x\u00e3 h\u1ed9i \u0111\u00f3ng trong vi\u1ec7c b\u1ea3o v\u1ec7 quy\u1ec1n ri\u00eang t\u01b0 c\u1ee7a ng\u01b0\u1eddi d\u00f9ng.<\/p>\n\n\n\n<p>B\u1eb1ng c\u00e1ch \u00e1p d\u1ee5ng m\u1ed9t c\u00e1ch ti\u1ebfp c\u1eadn ch\u1ee7 \u0111\u1ed9ng \u0111\u1ed1i v\u1edbi quy\u1ec1n ri\u00eang t\u01b0 v\u00e0 b\u1ea3o m\u1eadt, c\u1ea3 nh\u1eefng ng\u01b0\u1eddi c\u00f3 \u1ea3nh h\u01b0\u1edfng v\u00e0 c\u00e1c n\u1ec1n t\u1ea3ng m\u00e0 h\u1ecd d\u1ef1a v\u00e0o c\u00f3 th\u1ec3 l\u00e0m vi\u1ec7c c\u00f9ng nhau \u0111\u1ec3 gi\u1ea3m thi\u1ec3u r\u1ee7i ro th\u00f4ng tin c\u00e1 nh\u00e2n b\u1ecb r\u00f2 r\u1ec9 v\u00e0 ng\u1eebng m\u1ed1i \u0111e d\u1ecda ng\u00e0y c\u00e0ng t\u0103ng n\u00e0y kh\u00f4ng \u0111\u1ec3 leo thang th\u00eam.<\/p>","protected":false},"excerpt":{"rendered":"<p>G\u1ea7n \u0111\u00e2y, ch\u00fang t\u00f4i nh\u1eadn th\u1ea5y thu\u1eadt ng\u1eef \u201cng\u01b0\u1eddi c\u00f3 s\u1ee9c \u1ea3nh h\u01b0\u1edfng b\u1ecb r\u00f2 r\u1ec9\u201d ng\u00e0y c\u00e0ng t\u0103ng v\u00ec th\u00f4ng tin c\u00e1 nh\u00e2n c\u1ee7a c\u00e1c ng\u00f4i sao m\u1ea1ng x\u00e3 h\u1ed9i li\u00ean t\u1ee5c b\u1ecb \u0111\u00e1nh c\u1eafp v\u00e0 hi\u1ec3n th\u1ecb cho m\u1ecdi ng\u01b0\u1eddi. T\u1eeb c\u00e1c cu\u1ed9c tr\u00f2 chuy\u1ec7n ri\u00eang t\u01b0 v\u00e0 c\u00e1 nh\u00e2n\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/vi\/ro-ri-du-lieu\/ro-ri-cua-influencers-moi-nguy-hiem-tang-cao-doi-voi-an-toan-truc-tuyen\/\">Ti\u1ebfp t\u1ee5c \u0111\u1ecdc <span class=\"screen-reader-text\">Nh\u1eefng ng\u01b0\u1eddi c\u00f3 s\u1ee9c \u1ea3nh h\u01b0\u1edfng b\u1ecb r\u00f2 r\u1ec9: M\u1ed1i nguy hi\u1ec3m ng\u00e0y c\u00e0ng t\u0103ng \u0111\u1ed1i v\u1edbi s\u1ef1 an to\u00e0n tr\u1ef1c tuy\u1ebfn<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":2664,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15,42,17,23,31],"tags":[],"class_list":["post-2663","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-data-leaks","category-data-privacy","category-news","category-technology","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Influencers Leaked: A Rising Danger to Online Safety | Security Briefing<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/vi\/ro-ri-du-lieu\/ro-ri-cua-influencers-moi-nguy-hiem-tang-cao-doi-voi-an-toan-truc-tuyen\/\" \/>\n<meta property=\"og:locale\" content=\"vi_VN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Influencers Leaked: A Rising Danger to Online Safety | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Lately, we have noticed a rise in the term &#8220;influencers leaked&#8221; as personal info from social media stars keeps getting stolen and shown to everyone. From private chats and personal&hellip; Continue reading Influencers Leaked: A Rising Danger to Online Safety\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/vi\/ro-ri-du-lieu\/ro-ri-cua-influencers-moi-nguy-hiem-tang-cao-doi-voi-an-toan-truc-tuyen\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-13T00:16:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-10T01:45:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Influencers-Leaked-A-Rising-Danger-to-Online-Safety.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1265\" \/>\n\t<meta property=\"og:image:height\" content=\"422\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u0110\u01b0\u1ee3c vi\u1ebft b\u1edfi\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u01af\u1edbc t\u00ednh th\u1eddi gian \u0111\u1ecdc\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 ph\u00fat\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/data-leaks\/influencers-leaked-a-rising-danger-to-online-safety\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/data-leaks\/influencers-leaked-a-rising-danger-to-online-safety\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"Influencers Leaked: A Rising Danger to Online Safety\",\"datePublished\":\"2024-09-13T00:16:29+00:00\",\"dateModified\":\"2025-09-10T01:45:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/data-leaks\/influencers-leaked-a-rising-danger-to-online-safety\/\"},\"wordCount\":1083,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/data-leaks\/influencers-leaked-a-rising-danger-to-online-safety\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Influencers-Leaked-A-Rising-Danger-to-Online-Safety.jpg\",\"articleSection\":[\"cybersecurity\",\"Data Leaks\",\"data privacy\",\"News\",\"Technology\"],\"inLanguage\":\"vi\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/data-leaks\/influencers-leaked-a-rising-danger-to-online-safety\/\",\"url\":\"https:\/\/securitybriefing.net\/data-leaks\/influencers-leaked-a-rising-danger-to-online-safety\/\",\"name\":\"Influencers Leaked: A Rising Danger to Online Safety | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/data-leaks\/influencers-leaked-a-rising-danger-to-online-safety\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/data-leaks\/influencers-leaked-a-rising-danger-to-online-safety\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Influencers-Leaked-A-Rising-Danger-to-Online-Safety.jpg\",\"datePublished\":\"2024-09-13T00:16:29+00:00\",\"dateModified\":\"2025-09-10T01:45:08+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/data-leaks\/influencers-leaked-a-rising-danger-to-online-safety\/#breadcrumb\"},\"inLanguage\":\"vi\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/data-leaks\/influencers-leaked-a-rising-danger-to-online-safety\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/data-leaks\/influencers-leaked-a-rising-danger-to-online-safety\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Influencers-Leaked-A-Rising-Danger-to-Online-Safety.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Influencers-Leaked-A-Rising-Danger-to-Online-Safety.jpg\",\"width\":1265,\"height\":422,\"caption\":\"Influencers Leaked A Rising Danger to Online Safety\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/data-leaks\/influencers-leaked-a-rising-danger-to-online-safety\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Influencers Leaked: A Rising Danger to Online Safety\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"vi\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/vi\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Nh\u1eefng Ng\u01b0\u1eddi \u1ea2nh H\u01b0\u1edfng B\u1ecb R\u00f2 R\u1ec9: M\u1ed9t M\u1ed1i Nguy Hi\u1ec3m \u0110ang T\u0103ng L\u00ean \u0110\u1ed1i V\u1edbi An To\u00e0n Tr\u1ef1c Tuy\u1ebfn | B\u00e1o C\u00e1o An Ninh","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/vi\/ro-ri-du-lieu\/ro-ri-cua-influencers-moi-nguy-hiem-tang-cao-doi-voi-an-toan-truc-tuyen\/","og_locale":"vi_VN","og_type":"article","og_title":"Influencers Leaked: A Rising Danger to Online Safety | Security Briefing","og_description":"Lately, we have noticed a rise in the term &#8220;influencers leaked&#8221; as personal info from social media stars keeps getting stolen and shown to everyone. From private chats and personal&hellip; Continue reading Influencers Leaked: A Rising Danger to Online Safety","og_url":"https:\/\/securitybriefing.net\/vi\/ro-ri-du-lieu\/ro-ri-cua-influencers-moi-nguy-hiem-tang-cao-doi-voi-an-toan-truc-tuyen\/","og_site_name":"Security Briefing","article_published_time":"2024-09-13T00:16:29+00:00","article_modified_time":"2025-09-10T01:45:08+00:00","og_image":[{"width":1265,"height":422,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Influencers-Leaked-A-Rising-Danger-to-Online-Safety.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"\u0110\u01b0\u1ee3c vi\u1ebft b\u1edfi":"C\u00e9sar Daniel Barreto","\u01af\u1edbc t\u00ednh th\u1eddi gian \u0111\u1ecdc":"5 ph\u00fat"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/data-leaks\/influencers-leaked-a-rising-danger-to-online-safety\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/data-leaks\/influencers-leaked-a-rising-danger-to-online-safety\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"Influencers Leaked: A Rising Danger to Online Safety","datePublished":"2024-09-13T00:16:29+00:00","dateModified":"2025-09-10T01:45:08+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/data-leaks\/influencers-leaked-a-rising-danger-to-online-safety\/"},"wordCount":1083,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/data-leaks\/influencers-leaked-a-rising-danger-to-online-safety\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Influencers-Leaked-A-Rising-Danger-to-Online-Safety.jpg","articleSection":["cybersecurity","Data Leaks","data privacy","News","Technology"],"inLanguage":"vi"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/data-leaks\/influencers-leaked-a-rising-danger-to-online-safety\/","url":"https:\/\/securitybriefing.net\/data-leaks\/influencers-leaked-a-rising-danger-to-online-safety\/","name":"Nh\u1eefng Ng\u01b0\u1eddi \u1ea2nh H\u01b0\u1edfng B\u1ecb R\u00f2 R\u1ec9: M\u1ed9t M\u1ed1i Nguy Hi\u1ec3m \u0110ang T\u0103ng L\u00ean \u0110\u1ed1i V\u1edbi An To\u00e0n Tr\u1ef1c Tuy\u1ebfn | B\u00e1o C\u00e1o An Ninh","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/data-leaks\/influencers-leaked-a-rising-danger-to-online-safety\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/data-leaks\/influencers-leaked-a-rising-danger-to-online-safety\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Influencers-Leaked-A-Rising-Danger-to-Online-Safety.jpg","datePublished":"2024-09-13T00:16:29+00:00","dateModified":"2025-09-10T01:45:08+00:00","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/data-leaks\/influencers-leaked-a-rising-danger-to-online-safety\/#breadcrumb"},"inLanguage":"vi","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/data-leaks\/influencers-leaked-a-rising-danger-to-online-safety\/"]}]},{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/data-leaks\/influencers-leaked-a-rising-danger-to-online-safety\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Influencers-Leaked-A-Rising-Danger-to-Online-Safety.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Influencers-Leaked-A-Rising-Danger-to-Online-Safety.jpg","width":1265,"height":422,"caption":"Influencers Leaked A Rising Danger to Online Safety"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/data-leaks\/influencers-leaked-a-rising-danger-to-online-safety\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Influencers Leaked: A Rising Danger to Online Safety"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"B\u00e1o C\u00e1o An Ninh","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"vi"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"B\u00e1o C\u00e1o An Ninh","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"<\/section>","image":{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto l\u00e0 m\u1ed9t nh\u00e0 v\u0103n v\u00e0 chuy\u00ean gia an ninh m\u1ea1ng \u0111\u01b0\u1ee3c k\u00ednh tr\u1ecdng, n\u1ed5i ti\u1ebfng v\u1edbi ki\u1ebfn th\u1ee9c s\u00e2u r\u1ed9ng v\u00e0 kh\u1ea3 n\u0103ng \u0111\u01a1n gi\u1ea3n h\u00f3a c\u00e1c ch\u1ee7 \u0111\u1ec1 an ninh m\u1ea1ng ph\u1ee9c t\u1ea1p. V\u1edbi kinh nghi\u1ec7m s\u00e2u r\u1ed9ng v\u1ec1 b\u1ea3o m\u1eadt m\u1ea1ng v\u00e0 b\u1ea3o v\u1ec7 d\u1eef li\u1ec7u, \u00f4ng th\u01b0\u1eddng xuy\u00ean \u0111\u00f3ng g\u00f3p c\u00e1c b\u00e0i vi\u1ebft v\u00e0 ph\u00e2n t\u00edch s\u00e2u s\u1eafc v\u1ec1 c\u00e1c xu h\u01b0\u1edbng an ninh m\u1ea1ng m\u1edbi nh\u1ea5t, gi\u00e1o d\u1ee5c c\u1ea3 chuy\u00ean gia v\u00e0 c\u00f4ng ch\u00fang.","url":"https:\/\/securitybriefing.net\/vi\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts\/2663","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/comments?post=2663"}],"version-history":[{"count":1,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts\/2663\/revisions"}],"predecessor-version":[{"id":4548,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts\/2663\/revisions\/4548"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/media\/2664"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/media?parent=2663"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/categories?post=2663"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/tags?post=2663"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}