Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 year agoAuthy Users' Phone Numbers Compromised via Twilio API Vulnerabilitywww.bleepingcomputer.comexternal-linkmessage-square24linkfedilinkarrow-up1118arrow-down10
arrow-up1118arrow-down1external-linkAuthy Users' Phone Numbers Compromised via Twilio API Vulnerabilitywww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 year agomessage-square24linkfedilink
minus-squareGrumpydaddy@lemmy.worldlinkfedilinkEnglisharrow-up3·1 year agoSo for common folk like myself, what do I need to do? I used Authy for a few sites. Can a bad actor pretending to be me now get access to those sites?
minus-squareryannathans@aussie.zonelinkfedilinkEnglisharrow-up1arrow-down1·1 year agoI swapped to aegis from authy
So for common folk like myself, what do I need to do? I used Authy for a few sites. Can a bad actor pretending to be me now get access to those sites?
I swapped to aegis from authy