July 5, 2024, 3:07 a.m. | Raga Varshini

GBHackers On Security gbhackers.com

An unauthenticated endpoint vulnerability allowed threat actors to identify phone numbers associated with Authy accounts, which was identified, and the endpoint has been secured to prevent unauthorized access.  No evidence suggests the attackers gained access to internal systems or other sensitive data, but as a precaution, it’s crucial to implement additional security measures to mitigate […]


The post Hackers Abused Twilio API To Verify Phone Numbers used For MFA appeared first on GBHackers on Security | #1 Globally …

access accounts api attackers authy authy update cve cyber-attack data email security endpoint evidence hackers identify internal mfa mfa vulnerability numbers phone phone numbers prevent sensitive sensitive data systems threat threat actors twilio twilio security unauthenticated unauthorized unauthorized access verify vulnerability

Principal Architect - LINUX - Active Top Secret Required

@ General Dynamics Information Technology | USA DC Washington - Customer Proprietary (DCC076)

Expert SOAR (CORTEX)

@ Alter Solutions | PARIS, France

Program Management Analyst

@ Peraton | Arlington, VA, United States

Gestion des menaces et des vulnérabilités

@ Alter Solutions | Paris, France

Senior IAM Security Engineer

@ WEX | Brazil - Remote Office

Senior Information Security Engineer

@ Ameriprise Financial Services | 11071 Ameriprise India - Hyderabad