this post was submitted on 03 Jul 2024
118 points (100.0% liked)

Cybersecurity

5772 readers
79 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected]

Notable mention to [email protected]

founded 2 years ago
MODERATORS
top 24 comments
sorted by: hot top controversial new old
[–] [email protected] 39 points 5 months ago (2 children)

Goddammit, can companies stop leaking our shit everywhere please

[–] [email protected] 15 points 5 months ago (1 children)

Only when it’s profitable to stop.

[–] [email protected] 15 points 5 months ago (1 children)

I'd prefer fuck-you-fines making it impossible to ignore the security that are actually enforced.

[–] [email protected] 10 points 5 months ago

And that's why its important to prefer internet services hosted in particular companies. The English legacy of law has been very poor at keeping society safe from corporations because these laws were established when the British Empire was a vast trade corporation with an inbred person as CEO by way of the pope said Jesus wanted that family to be in charge.

What's crazy making is a lot of the places the British destabilized the indigenous people had very advanced methods of ensuring society benefited everyone. Not all of them of course, but enough of them that its hard to see the English legacy of law practice as anything other than fundamentally broken and not worth the amount of spread it was forced to have at gunpoint. Like when I hear about how Iroquois nation justice worked I can't help but feel something truly special was lost by way of colonists wanted to profit off beaver pelts

[–] [email protected] 9 points 5 months ago

Especially with such careless failures. If some employee was tricked through a well-planned social engineering attack, or they used some mega obscure day0 vulnerability, I'd not be happy, but shit happens, I guess. But not sending my phone number when someone just posts some GET command to an API should be a no-brainer....

[–] [email protected] 28 points 5 months ago (1 children)

What confuses me is even a half-competent audit and pentest would absolutely have found an api endpoint that's going to absolutely leak customer data, so the assumption I have to make is that, yet again, a "security" company can't be fucked to do the bare minimum to ensure their security shit is you know, secure.

[–] [email protected] 8 points 5 months ago (1 children)

Posting this against your comment for visibility, I would recommend anyone that was using authy switch to bitwarden's dedicated 2F authentication app. The company maintains several security compliance certificates and fairly regularly gets audited which they post publicly at https://bitwarden.com/help/is-bitwarden-audited/

[–] [email protected] 3 points 5 months ago

Oh neat. I use their password manager but totally somehow missed them releasing a separate 2fa app.

[–] uhh_matt 22 points 5 months ago

We have taken action to secure this endpoint

[–] [email protected] 11 points 5 months ago* (last edited 5 months ago)

That's especially bad, because the default behavior, iirc, is to have Multi-Device turned on, which means anyone can potentially add their device to your account and access your TOTP.

And I don't expect most users to know how or to remember to turn it off.

[–] scottmeme 11 points 5 months ago (1 children)

FUCK ME DEAD

I got so much shit to reset up now, and I've closen aegis.

[–] [email protected] 2 points 5 months ago (1 children)

Bitwarden has a dedicated 2a app now. Highly recommend you go with that

[–] scottmeme 2 points 5 months ago

I was considering an email host that did include bitwarden, any reason I should or shouldn't go for it.

[–] [email protected] 10 points 5 months ago (1 children)

Let this be a reminder not to use Authy or Google Auth or Microsoft Auth if you can help it. Your best bet if you can help it is a Yubikey or Nitrokey. If you can't far better to go with Aegis or Ente Auth. If you need easy sync across devices, Aegis has that, but most of the security experts I know recommend going with 1Password as your MFA solution with sync. I personally don't trust 1Password as a for profit corporation, but I also accept I don't get paid to know about computer security to the degree that an actual security expert is

[–] [email protected] 4 points 5 months ago

I'd recommend bitwarden's dedicated 2F authentication app. The company is regularly audited and they post the results at https://bitwarden.com/help/is-bitwarden-audited/

[–] [email protected] 8 points 5 months ago

Thank fuck I got away from Authy years ago - cost me my Twitch account (because apparently Twitch straight won't allow you to switch away from Authy), but it was worth it to secure the rest of my things

[–] [email protected] 8 points 5 months ago

good thing I stopped using Authy a while ago

[–] [email protected] 5 points 5 months ago

Thanks Twilio!

[–] [email protected] 5 points 5 months ago

Lol it's taken me a while to come around to MFA (I used to hate it but I've started using open source MFA apps), but my hesitation to use proprietary solutions has proved smart.

[–] [email protected] 4 points 5 months ago* (last edited 5 months ago)

Oof, lucky I left them for aegis, android only app a long time ago. I hope/think I closed my authy account 🤞

[–] [email protected] 4 points 5 months ago

common aegis W

[–] [email protected] 3 points 5 months ago

Oh man this is going to suck.

We were looking for an authentication setup to allow for SSO and one of the front runners was Twilio. They have a meeting with us next week and I am not looking forward to this second hand embarrassment.

[–] [email protected] 3 points 5 months ago (1 children)

So for common folk like myself, what do I need to do? I used Authy for a few sites. Can a bad actor pretending to be me now get access to those sites?

[–] [email protected] 0 points 5 months ago

I swapped to aegis from authy