Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 months agoAuthy Users' Phone Numbers Compromised via Twilio API Vulnerabilitywww.bleepingcomputer.comexternal-linkmessage-square20fedilinkarrow-up1115cross-posted to: databreaches@lemmy.zippulse_of_truth@infosec.pub
arrow-up1115external-linkAuthy Users' Phone Numbers Compromised via Twilio API Vulnerabilitywww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 months agomessage-square20fedilinkcross-posted to: databreaches@lemmy.zippulse_of_truth@infosec.pub
minus-squareGrumpydaddy@lemmy.worldlinkfedilinkEnglisharrow-up3·5 months agoSo for common folk like myself, what do I need to do? I used Authy for a few sites. Can a bad actor pretending to be me now get access to those sites?
So for common folk like myself, what do I need to do? I used Authy for a few sites. Can a bad actor pretending to be me now get access to those sites?