InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: X warns users with security keys to re-register by November 10 to avoid lockout
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > X warns users with security keys to re-register by November 10 to avoid lockout
Technology

X warns users with security keys to re-register by November 10 to avoid lockout

October 27, 2025 2 Min Read
Share
X warns users with security keys to re-register by November 10 to avoid lockout
SHARE

Social media platform Ubikey Re-enroll your keys to ensure continued access to your service.

To do so, users are asked to use their existing security key or register a new security key and complete re-registration by November 10, 2025.

“If you have not re-enrolled your security key since November 10th, your account will be locked until you re-enroll, choose a different 2FA method, or choose not to use 2FA (although we always recommend using 2FA to protect your account!),” the company’s safety representative wrote in a post to X.

The move is part of the company’s efforts to officially retire the twitter(.)com domain. Twitter was acquired by SpaceX and Tesla CEO Elon Musk in October 2022 and rebranded to X in July 2023.

In a follow-up post, Mr.

“Security keys registered as 2FA methods are now associated with the twitter(.)com domain,” the newspaper added. “Reregistering your security key will associate your security key with x(.)com and allow you to retire your Twitter domain.”

X also supports 2FA using text messages, but this option is limited to non-premium subscribers as of March 20, 2023. To register for 2FA, users can follow these steps:

  • Go to (Settings & Privacy) > (Security & Account Access) > (Security) > (Two-Factor Authentication).
  • Select (Security Keys) > (Manage Security Keys) > (Delete Existing Key).
  • Select the (Security Key) option > Enter your password > Enter the verification code sent to you via email
  • Click (Start) and insert the key into your computer’s USB port or connect via Bluetooth/NFC. Once inserted, touch the button on the key.
  • Follow the on-screen instructions to complete the setup
See also  Legacy Python bootstrap script creates domain takeover risk for multiple PyPI packages
Share This Article
Twitter Copy Link
Previous Article The most brutal Warhammer 40k FPS hits its lowest price ever, a major update seduced me The most brutal Warhammer 40k FPS hits its lowest price ever, a major update seduced me
Next Article President Trump is trying to overturn California's November 4 election results, state attorney general says President Trump is trying to overturn California’s November 4 election results, state attorney general says

Latest News

React2Shell critical flaw added to CISA KEV after active exploitation

React2Shell critical flaw added to CISA KEV after active exploitation

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday…

December 7, 2025
Researchers discover more than 30 flaws in AI coding tools that enable data theft and RCE attacks

Researchers discover more than 30 flaws in AI coding tools that enable data theft and RCE attacks

More than 30 security vulnerabilities have been uncovered in various…

December 6, 2025
Zero-click agent browser attack could delete entire Google Drive using crafted email

Zero-click agent browser attack could delete entire Google Drive using crafted email

New agent browser attack targeting Perplexity's Comet browser. A seemingly…

December 5, 2025
Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

threat actor known as silver fox In attacks targeting Chinese…

December 4, 2025
Critical RSC bug in React and Next.js allows unauthenticated remote code execution

Critical RSC bug in React and Next.js allows unauthenticated remote code execution

A maximum severity security flaw has been disclosed in React…

December 3, 2025

You Might Also Like

DeskRAT Malware Campaign
Technology

APT36 targets Indian government with Golang-based DeskRAT malware campaign

8 Min Read
Nation-state hackers deploy new Airstalk malware in suspected supply chain attack
Technology

Nation-state hackers deploy new Airstalk malware in suspected supply chain attack

5 Min Read
Google discovers PROMPTFLUX malware that uses Gemini AI to rewrite code every hour
Technology

Google discovers PROMPTFLUX malware that uses Gemini AI to rewrite code every hour

8 Min Read
China's hacker red noveler target global government using pantegana and cobalt strike
Technology

China’s hacker red noveler target global government using pantegana and cobalt strike

4 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?