KidM to [email protected]English • 5 months agoAuthy Users' Phone Numbers Compromised via Twilio API Vulnerabilitywww.bleepingcomputer.comexternal-linkmessage-square24fedilinkarrow-up1119arrow-down10cross-posted to: [email protected][email protected]
arrow-up1119arrow-down1external-linkAuthy Users' Phone Numbers Compromised via Twilio API Vulnerabilitywww.bleepingcomputer.comKidM to [email protected]English • 5 months agomessage-square24fedilinkcross-posted to: [email protected][email protected]
minus-square@GrumpydaddylinkEnglish3•5 months agoSo for common folk like myself, what do I need to do? I used Authy for a few sites. Can a bad actor pretending to be me now get access to those sites?
So for common folk like myself, what do I need to do? I used Authy for a few sites. Can a bad actor pretending to be me now get access to those sites?
I swapped to aegis from authy