KidM to Cybersecurity@sh.itjust.worksEnglish • 11 months agoAuthy Users' Phone Numbers Compromised via Twilio API Vulnerabilitywww.bleepingcomputer.comexternal-linkmessage-square24fedilinkarrow-up1117arrow-down10
arrow-up1117arrow-down1external-linkAuthy Users' Phone Numbers Compromised via Twilio API Vulnerabilitywww.bleepingcomputer.comKidM to Cybersecurity@sh.itjust.worksEnglish • 11 months agomessage-square24fedilink
minus-square@Grumpydaddy@lemmy.worldlinkfedilinkEnglish3•11 months agoSo for common folk like myself, what do I need to do? I used Authy for a few sites. Can a bad actor pretending to be me now get access to those sites?
So for common folk like myself, what do I need to do? I used Authy for a few sites. Can a bad actor pretending to be me now get access to those sites?
I swapped to aegis from authy