InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: X warns users with security keys to re-register by November 10 to avoid lockout
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > X warns users with security keys to re-register by November 10 to avoid lockout
Technology

X warns users with security keys to re-register by November 10 to avoid lockout

October 27, 2025 2 Min Read
Share
X warns users with security keys to re-register by November 10 to avoid lockout
SHARE

Social media platform Ubikey Re-enroll your keys to ensure continued access to your service.

To do so, users are asked to use their existing security key or register a new security key and complete re-registration by November 10, 2025.

“If you have not re-enrolled your security key since November 10th, your account will be locked until you re-enroll, choose a different 2FA method, or choose not to use 2FA (although we always recommend using 2FA to protect your account!),” the company’s safety representative wrote in a post to X.

The move is part of the company’s efforts to officially retire the twitter(.)com domain. Twitter was acquired by SpaceX and Tesla CEO Elon Musk in October 2022 and rebranded to X in July 2023.

In a follow-up post, Mr.

“Security keys registered as 2FA methods are now associated with the twitter(.)com domain,” the newspaper added. “Reregistering your security key will associate your security key with x(.)com and allow you to retire your Twitter domain.”

X also supports 2FA using text messages, but this option is limited to non-premium subscribers as of March 20, 2023. To register for 2FA, users can follow these steps:

  • Go to (Settings & Privacy) > (Security & Account Access) > (Security) > (Two-Factor Authentication).
  • Select (Security Keys) > (Manage Security Keys) > (Delete Existing Key).
  • Select the (Security Key) option > Enter your password > Enter the verification code sent to you via email
  • Click (Start) and insert the key into your computer’s USB port or connect via Bluetooth/NFC. Once inserted, touch the button on the key.
  • Follow the on-screen instructions to complete the setup
See also  Hackers are actively exploiting the 7-Zip symbolic link-based RCE vulnerability (CVE-2025-11001)
Share This Article
Twitter Copy Link
Previous Article The most brutal Warhammer 40k FPS hits its lowest price ever, a major update seduced me The most brutal Warhammer 40k FPS hits its lowest price ever, a major update seduced me
Next Article President Trump is trying to overturn California's November 4 election results, state attorney general says President Trump is trying to overturn California’s November 4 election results, state attorney general says

Latest News

Critical RSC bug in React and Next.js allows unauthenticated remote code execution

Critical RSC bug in React and Next.js allows unauthenticated remote code execution

A maximum severity security flaw has been disclosed in React…

December 3, 2025
India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India's Department of Telecommunications (DoT) has directed app-based telecom service…

December 2, 2025
India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India's Ministry of Telecommunications has reportedly asked major mobile device…

December 1, 2025
CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated…

November 30, 2025
North Korean hackers deploy 197 npm packages to spread latest OtterCookie malware

North Korean hackers deploy 197 npm packages to spread latest OtterCookie malware

The North Korean threat actors behind the Contagious Interview campaign…

November 29, 2025

You Might Also Like

Legacy Python bootstrap script creates domain takeover risk for multiple PyPI packages
Technology

Legacy Python bootstrap script creates domain takeover risk for multiple PyPI packages

5 Min Read
China's hacker red noveler target global government using pantegana and cobalt strike
Technology

China’s hacker red noveler target global government using pantegana and cobalt strike

4 Min Read
Two new Super Micro BMC bugs allow malicious firmware to circumvent the trust security route
Technology

Two new Super Micro BMC bugs allow malicious firmware to circumvent the trust security route

4 Min Read
Critical WSUS Vulnerability
Technology

Critical, newly patched Microsoft WSUS flaw exploited

6 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?