An unauthenticated endpoint vulnerability allowed threat actors to identify phone numbers associated with Authy accounts, which was identified, and th…
First seen on gbhackers.com
Jump to article: gbhackers.com/hackers-exploit-twilio-api-mfa/
by
An unauthenticated endpoint vulnerability allowed threat actors to identify phone numbers associated with Authy accounts, which was identified, and th…
First seen on gbhackers.com
Jump to article: gbhackers.com/hackers-exploit-twilio-api-mfa/