minus-squareGrumpydaddy@lemmy.worldtoCybersecurity@sh.itjust.works•Authy Users' Phone Numbers Compromised via Twilio API VulnerabilitylinkfedilinkEnglisharrow-up3·3 months agoSo for common folk like myself, what do I need to do? I used Authy for a few sites. Can a bad actor pretending to be me now get access to those sites? linkfedilink
minus-squareGrumpydaddy@lemmy.worldtoAsklemmy@lemmy.ml•It's movie night. You don't know who's coming but you have to pick a movie everyone vibes with. What do you choose?linkfedilinkarrow-up2·5 months agoBingo! linkfedilink
minus-squareGrumpydaddy@lemmy.worldtoAsklemmy@lemmy.ml•It's movie night. You don't know who's coming but you have to pick a movie everyone vibes with. What do you choose?linkfedilinkarrow-up6·5 months agoYou’re out if your element, Donny linkfedilink
So for common folk like myself, what do I need to do? I used Authy for a few sites. Can a bad actor pretending to be me now get access to those sites?