Apple recently addressed two zero-day vulnerabilities affecting its Intel-based Macs. Alongside releasing the fixes, the …
Unsecured Authy MFA API Exploited For Malicious Phone Number Verification
Reportedly, criminal hackers exploited an unsecured Authy (an MFA app) API to verify phone numbers …