KidM to [email protected]English • 1 year agoAuthy Users' Phone Numbers Compromised via Twilio API Vulnerabilitywww.bleepingcomputer.comexternal-linkmessage-square24fedilinkarrow-up1118cross-posted to: [email protected]
arrow-up1118external-linkAuthy Users' Phone Numbers Compromised via Twilio API Vulnerabilitywww.bleepingcomputer.comKidM to [email protected]English • 1 year agomessage-square24fedilinkcross-posted to: [email protected]
minus-square@[email protected]linkfedilinkEnglish3•1 year agoSo for common folk like myself, what do I need to do? I used Authy for a few sites. Can a bad actor pretending to be me now get access to those sites?
So for common folk like myself, what do I need to do? I used Authy for a few sites. Can a bad actor pretending to be me now get access to those sites?
I swapped to aegis from authy