Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Tea App Takes Messaging System Offline After Second Security Issue Reported

Tea App Takes Messaging System Offline After Second Security Issue Reported

Posted on July 30, 2025July 30, 2025 By CWS

Tea, a relationship dialogue app that just lately suffered a high-profile cybersecurity breach, introduced late Monday that some direct messages have been additionally accessed within the incident.

The app — designed to let ladies safely talk about males they date — rocketed to the highest of the U.S. Apple App Retailer final week however then confirmed on Friday that hundreds of selfies and photograph IDs of registered customers have been uncovered in a digital safety breach.

404 Media was the primary to report on this second safety situation, citing an unbiased safety researcher who discovered it was attainable for hackers to entry messages between customers discussing abortions, dishonest companions, and cellphone numbers.

In a press release posted on its social media accounts, Tea stated it “just lately realized that some direct messages (DMs) have been accessed as a part of the preliminary incident.”

“Out of an abundance of warning, we’ve taken the affected system offline,” the app stated. “Presently, we’ve discovered no proof of entry to different elements of our surroundings.”

It’s at the moment unknown what number of messages have been left uncovered by the vulnerability. Tea stated it’s “working to determine any customers whose private data was concerned and might be providing free identification safety companies to these people.” The corporate stated Tuesday it’s going to share extra data because it turns into out there.

Due to the character of the app — which permits ladies to anonymously talk about delicate details about the boys they date — customers could also be notably susceptible to malicious actors who attempt to expose their real-life identities.

Mary Ann Miller, vp of consumer expertise at identification verification firm Show, stated the ladies who could have had their data compromised ought to think about ensuring they’ve real-life safety precautions in place — equivalent to cameras, locks and “frequent sense issues that you just and I take into consideration to be secure and safe in our own residence.”Commercial. Scroll to proceed studying.

“The common citizen places extra on the market in a public-facing view that may put their security in danger. And I believe it’s time for all of us to consider that extra rigorously,” she stated. Corporations, in the meantime, “ought to search for expertise that makes use of different varieties (apart from) IDs to confirm an identification” — and solely retailer important information and discard, securely, verification information that’s not wanted as soon as an individual is verified.

Tea has stated about 72,000 photographs have been leaked on-line within the preliminary incident, together with 13,000 photographs of selfies or selfies that includes a photograph identification that customers submitted throughout account verification. One other 59,000 photographs publicly viewable within the app from posts, feedback and direct messages have been additionally accessed with out authorization, a spokesperson stated final week.

No e mail addresses or cellphone numbers have been accessed, the corporate stated, and the breach solely impacts customers who signed up earlier than February 2024.

Security Week News Tags:App, Issue, Messaging, Offline, Reported, Security, System, Takes, Tea

Post navigation

Previous Post: How to Respond to a Phishing Test in Your Company
Next Post: Threat Actors Attacking Fans and Teams of Belgian Grand Prix With Phishing Campaigns

Related Posts

Chinese Espionage Crews Circle SentinelOne in Year-Long Reconnaissance Campaign Chinese Espionage Crews Circle SentinelOne in Year-Long Reconnaissance Campaign Security Week News
LLMs in Attacker Crosshairs, Warns Threat Intel Firm LLMs in Attacker Crosshairs, Warns Threat Intel Firm Security Week News
Wytec Expects Significant Financial Loss Following Website Hack Wytec Expects Significant Financial Loss Following Website Hack Security Week News
3 Million Stolen in Cetus Protocol Hack $223 Million Stolen in Cetus Protocol Hack Security Week News
Fintech Firm Wealthsimple Says Supply Chain Attack Resulted in Data Breach Fintech Firm Wealthsimple Says Supply Chain Attack Resulted in Data Breach Security Week News
VMware Flaws That Earned Hackers 0,000 at Pwn2Own Patched VMware Flaws That Earned Hackers $340,000 at Pwn2Own Patched Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution
  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution
  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark