In the last few days, the encrypted messaging platform, ‘Signal’ confirmed a variety of their customers fell victim to the phishing attack on Twilio. It is estimated that 1,900 were affected by the breach via phone number and SMS verification links to “reset passwords” on a phony Twilio link. By posing as Twilio’s IT dept, the hackers were able to obtain victim’s login credentials. Unfortunately, it is still unclear who was behind this attack. Cloudflare also revealed they were subjected to a phishing attack around the very same time as Twilio, but was not breached as an end result owing to the corporation-vast use of hardware-centered, FIDO2-compliant multi-factor authentication (MFA) keys.


More

ID Talk Podcast: Passkeys, Standards, and Selfie Certification with FIDO’s Andrew Shikiar

The FIDO Alliance, founded in 2012, stands as a pivotal organization in the identity technology…

Read More →

InfoSecurity Magazine: #Infosec2024: CISOs Need to Move Beyond Passwords to Keep Up With Security Threats

Passwordless systems, even if they stop short of a full zero-trust environment, improve convenience as…

Read More →

SC Media: Identiverse 2024: Deepfakes, passkeys and more

Two predominant themes stood out at last week’s Identiverse 2024 conference in Las Vegas. First,…

Read More →