Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 months agoAuthy Users' Phone Numbers Compromised via Twilio API Vulnerabilitywww.bleepingcomputer.comexternal-linkmessage-square24fedilinkarrow-up1118arrow-down10cross-posted to: databreaches@lemmy.zippulse_of_truth@infosec.pub
arrow-up1118arrow-down1external-linkAuthy Users' Phone Numbers Compromised via Twilio API Vulnerabilitywww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 months agomessage-square24fedilinkcross-posted to: databreaches@lemmy.zippulse_of_truth@infosec.pub
minus-squareryannathans@aussie.zonelinkfedilinkEnglisharrow-up1arrow-down1·5 months agoI swapped to aegis from authy
I swapped to aegis from authy