KidM to CybersecurityEnglish · 5 months agoAuthy Users' Phone Numbers Compromised via Twilio API Vulnerabilitywww.bleepingcomputer.comexternal-linkmessage-square24fedilinkarrow-up1118arrow-down10cross-posted to: [email protected][email protected]
arrow-up1118arrow-down1external-linkAuthy Users' Phone Numbers Compromised via Twilio API Vulnerabilitywww.bleepingcomputer.comKidM to CybersecurityEnglish · 5 months agomessage-square24fedilinkcross-posted to: [email protected][email protected]
minus-squareLordKitsuna@lemmy.worldlinkfedilinkEnglisharrow-up4·5 months agoI’d recommend bitwarden’s dedicated 2F authentication app. The company is regularly audited and they post the results at https://bitwarden.com/help/is-bitwarden-audited/
I’d recommend bitwarden’s dedicated 2F authentication app. The company is regularly audited and they post the results at https://bitwarden.com/help/is-bitwarden-audited/