Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 months agoAuthy Users' Phone Numbers Compromised via Twilio API Vulnerabilitywww.bleepingcomputer.comexternal-linkmessage-square24fedilinkarrow-up1117arrow-down10cross-posted to: databreaches@lemmy.zip
arrow-up1117arrow-down1external-linkAuthy Users' Phone Numbers Compromised via Twilio API Vulnerabilitywww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 months agomessage-square24fedilinkcross-posted to: databreaches@lemmy.zip
minus-squareLordKitsuna@lemmy.worldlinkfedilinkEnglisharrow-up4·4 months agoI’d recommend bitwarden’s dedicated 2F authentication app. The company is regularly audited and they post the results at https://bitwarden.com/help/is-bitwarden-audited/
I’d recommend bitwarden’s dedicated 2F authentication app. The company is regularly audited and they post the results at https://bitwarden.com/help/is-bitwarden-audited/