Thursday, March 23, 2023
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory
  • Login
  • Register
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
No Result
View All Result
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
No Result
View All Result
Cloud7 News
No Result
View All Result

Home > Cybersecurity > Twilio breach affects some Authy users

Twilio breach affects some Authy users

The communications company Twilio has been attacked earlier this month and this attack has compromised some Authy users as well.


Rusen Gobel Rusen Gobel
August 29, 2022
2 min read
  • Twilio systems have been breached by unknown threat actors, resulting in the compromise of many users’ accounts, including some in Authy.
  • The incident happened in early August and it was achieved by a successful phishing attack aimed at Twilio employees.
  • Only 93 Authy users’ accounts were compromised. However, it is not clear whether those accounts were specifically targeted.

Twilio, a communications company that offers services such as SMS messaging, automated voice calls, and e-mail campaigns has been breached by a phishing attack via social engineering last week. The company has announced that the attackers have managed to access some of its customers’ data; Twilio has more than 268,000 active customer accounts.

Only 93 users were affected

Twilio is not only known for its communication services; many end-users know the company with its password managing software, Authy. Last week, Twilio disclosed that the breach compromised 93 users’ Authy accounts. It is a very small number compared to the total user database of the service, which is estimated at around 75 million. It is not clear whether those 93 users were specifically targeted, or not. But the attackers have managed to obtain the 2FA codes that were generated for Authy accounts.

In addition to Authy, the Twilio breach has also resulted in the stealing of one-time passwords for Okta customers. Those passwords were meant to be delivered to the customers via SMS, and they are valid for only five minutes.

Threat actors are currently targeting password management companies; last week, we have also shared the news regarding the breach of LastPass, which is Authy’s competitor.

See more Cybersecurity News

A comprehensive guide to understanding Cybersecurity: What is Cybersecurity?


Tags: Twilio
Rusen Gobel

Rusen Gobel

Rusen Gobel is the managing editor of Cloud7. With more than 10 years of experience, Rusen worked as a hardware and software news editor for technology sites such as ShiftDelete, Teknokulis, Hardware Plus, BT Haber. In addition, Rusen publishes consumer product reviews on his YouTube channel. While consumer electronics has been his main focus for years, now Rusen is more interested in WordPress and software development. He had contributed different web application projects in his professional career. Rusen had graduated from Istanbul University, department of Computer Engineering. Rusen has a very high passion for learning and writing for every kind of technology. That's why he has been working as a tech editor for more than ten years on several different technology magazines and online news portals.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Next Post
LockBit gang is evolving to deliver triple-extortion attacks

LockBit gang is evolving to deliver triple-extortion attacks

Related News

CISA aims to identify vulnerabilities that attract ransomware

CISA aims to identify vulnerabilities that attract ransomware

March 22, 2023 2:10 pm
7 best cybersecurity schools

7 best cyber security schools

March 21, 2023 9:00 pm
Akamai researchers warn about the new HinataBot botnet

Akamai researchers warn about the new HinataBot botnet

March 20, 2023 6:10 pm
7 biggest data breaches in the history of the internet

7 biggest data breaches in the history of the internet

March 16, 2023 10:55 pm
Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter
Select list(s):

Check your inbox or spam folder to confirm your subscription.

By subscribing, you agree to our
Copyright Policy and Privacy Policy

Get the free newsletter

Subscribe to receive the latest IT business updates straight to your inbox.

Select list(s):

Check your inbox or spam folder to confirm your subscription.

Recent News

  • How to change system language on Windows 11
  • How to create and manage menus in WordPress
  • Interview: Tim Mackey, head of supply chain risk strategy of Synopsys
  • 7 richest domains and the reasons why
  • CISA aims to identify vulnerabilities that attract ransomware

Cloud7 News
Cloud7 is a news source that publishes the latest news, reviews, comparisons, opinions, and exclusive interviews to help tech users of high-experience levels in the IT industry.

EXPLORE

  • Web Hosting
  • Cloud Computing
  • Data Center
  • Cybersecurity
  • Linux
  • Network/Internet
  • Software
  • Hardware
  • Artificial Intelligence
  • How-Tos
  • Troubleshooting

RESOURCES

  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory

Get the Cloud7 Newsletter

Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

  • About Us
  • Privacy & Policy
  • Copyright Policy
  • Contact

© 2023, Cloud7 News. All rights reserved.

No Result
View All Result
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory

© 2023, Cloud7 News. All rights reserved.

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
Sign Up with Linked In
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.