Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 months agoAuthy Users' Phone Numbers Compromised via Twilio API Vulnerabilitywww.bleepingcomputer.comexternal-linkmessage-square24fedilinkarrow-up1118arrow-down10
arrow-up1118arrow-down1external-linkAuthy Users' Phone Numbers Compromised via Twilio API Vulnerabilitywww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 months agomessage-square24fedilink
minus-squareRentlar@lemmy.calinkfedilinkEnglisharrow-up5·3 months agoLol it’s taken me a while to come around to MFA (I used to hate it but I’ve started using open source MFA apps), but my hesitation to use proprietary solutions has proved smart.
Lol it’s taken me a while to come around to MFA (I used to hate it but I’ve started using open source MFA apps), but my hesitation to use proprietary solutions has proved smart.