Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 months agoAuthy Users' Phone Numbers Compromised via Twilio API Vulnerabilitywww.bleepingcomputer.comexternal-linkmessage-square24fedilinkarrow-up1118arrow-down10
arrow-up1118arrow-down1external-linkAuthy Users' Phone Numbers Compromised via Twilio API Vulnerabilitywww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 months agomessage-square24fedilink
minus-squareLordKitsuna@lemmy.worldlinkfedilinkEnglisharrow-up4·4 months agoI’d recommend bitwarden’s dedicated 2F authentication app. The company is regularly audited and they post the results at https://bitwarden.com/help/is-bitwarden-audited/
I’d recommend bitwarden’s dedicated 2F authentication app. The company is regularly audited and they post the results at https://bitwarden.com/help/is-bitwarden-audited/