KidM to Cybersecurity@sh.itjust.worksEnglish • 3 months agoAuthy Users' Phone Numbers Compromised via Twilio API Vulnerabilitywww.bleepingcomputer.comexternal-linkmessage-square24fedilinkarrow-up1118cross-posted to: databreaches@lemmy.zip
arrow-up1118external-linkAuthy Users' Phone Numbers Compromised via Twilio API Vulnerabilitywww.bleepingcomputer.comKidM to Cybersecurity@sh.itjust.worksEnglish • 3 months agomessage-square24fedilinkcross-posted to: databreaches@lemmy.zip
minus-square@Grumpydaddy@lemmy.worldlinkfedilinkEnglish3•3 months agoSo for common folk like myself, what do I need to do? I used Authy for a few sites. Can a bad actor pretending to be me now get access to those sites?
So for common folk like myself, what do I need to do? I used Authy for a few sites. Can a bad actor pretending to be me now get access to those sites?
I swapped to aegis from authy