X Security Key Re-enrollment Required by November 10, 2025
Summary
Hide ▲
Show ▼
X is requiring users who have enrolled in two-factor authentication (2FA) with security keys to re-enroll their keys by November 10, 2025, to avoid account lockouts. This change is part of the platform's transition away from the twitter[.]com domain. Users must re-enroll their security keys or choose an alternative 2FA method to maintain access to their accounts. The move affects users who have enrolled 2FA using hardware security keys like Yubikeys. The platform supports other 2FA methods, including authenticator apps and text messages (for non-Premium subscribers). Users can re-enroll their security keys by visiting x.com/settings/account/login_verification/security_keys. Re-enrolling a new security key will disable any previously enrolled keys unless they are also re-enrolled. The change is not related to any security incident but is due to the migration from the twitter.com domain to x.com.
Timeline
-
27.10.2025 18:12 2 articles · 1d ago
X Mandates Security Key Re-enrollment by November 10, 2025
Users must re-enroll their security keys or choose an alternative 2FA method to maintain access to their accounts. The change is part of the platform's transition away from the twitter[.]com domain. Users can re-enroll their security keys by visiting x.com/settings/account/login_verification/security_keys. Re-enrolling a new security key will disable any previously enrolled keys unless they are also re-enrolled. The change is not related to any security incident but is due to the migration from the twitter.com domain to x.com.
Show sources
- X Warns Users With Security Keys to Re-Enroll Before November 10 to Avoid Lockouts — thehackernews.com — 27.10.2025 18:12
- X: Re-enroll 2FA security keys by November 10 or get locked out — www.bleepingcomputer.com — 27.10.2025 21:36
Information Snippets
-
X is mandating re-enrollment of security keys for 2FA by November 10, 2025.
First reported: 27.10.2025 18:122 sources, 2 articlesShow sources
- X Warns Users With Security Keys to Re-Enroll Before November 10 to Avoid Lockouts — thehackernews.com — 27.10.2025 18:12
- X: Re-enroll 2FA security keys by November 10 or get locked out — www.bleepingcomputer.com — 27.10.2025 21:36
-
Users who do not re-enroll their security keys will be locked out of their accounts.
First reported: 27.10.2025 18:122 sources, 2 articlesShow sources
- X Warns Users With Security Keys to Re-Enroll Before November 10 to Avoid Lockouts — thehackernews.com — 27.10.2025 18:12
- X: Re-enroll 2FA security keys by November 10 or get locked out — www.bleepingcomputer.com — 27.10.2025 21:36
-
The change is part of X's transition from the twitter[.]com domain.
First reported: 27.10.2025 18:122 sources, 2 articlesShow sources
- X Warns Users With Security Keys to Re-Enroll Before November 10 to Avoid Lockouts — thehackernews.com — 27.10.2025 18:12
- X: Re-enroll 2FA security keys by November 10 or get locked out — www.bleepingcomputer.com — 27.10.2025 21:36
-
Users can re-enroll their security keys or switch to alternative 2FA methods.
First reported: 27.10.2025 18:122 sources, 2 articlesShow sources
- X Warns Users With Security Keys to Re-Enroll Before November 10 to Avoid Lockouts — thehackernews.com — 27.10.2025 18:12
- X: Re-enroll 2FA security keys by November 10 or get locked out — www.bleepingcomputer.com — 27.10.2025 21:36
-
The change does not affect users who have enrolled 2FA using methods other than security keys.
First reported: 27.10.2025 18:122 sources, 2 articlesShow sources
- X Warns Users With Security Keys to Re-Enroll Before November 10 to Avoid Lockouts — thehackernews.com — 27.10.2025 18:12
- X: Re-enroll 2FA security keys by November 10 or get locked out — www.bleepingcomputer.com — 27.10.2025 21:36
-
X supports 2FA via authenticator apps and text messages (limited to non-Premium subscribers).
First reported: 27.10.2025 18:122 sources, 2 articlesShow sources
- X Warns Users With Security Keys to Re-Enroll Before November 10 to Avoid Lockouts — thehackernews.com — 27.10.2025 18:12
- X: Re-enroll 2FA security keys by November 10 or get locked out — www.bleepingcomputer.com — 27.10.2025 21:36
-
Users can re-enroll their security keys by visiting x.com/settings/account/login_verification/security_keys.
First reported: 27.10.2025 21:361 source, 1 articleShow sources
- X: Re-enroll 2FA security keys by November 10 or get locked out — www.bleepingcomputer.com — 27.10.2025 21:36
-
Re-enrolling a new security key will disable any previously enrolled keys unless they are also re-enrolled.
First reported: 27.10.2025 21:361 source, 1 articleShow sources
- X: Re-enroll 2FA security keys by November 10 or get locked out — www.bleepingcomputer.com — 27.10.2025 21:36
-
The change is not related to any security incident but is due to the migration from the twitter.com domain to x.com.
First reported: 27.10.2025 21:361 source, 1 articleShow sources
- X: Re-enroll 2FA security keys by November 10 or get locked out — www.bleepingcomputer.com — 27.10.2025 21:36
Similar Happenings
Synced Passkeys Vulnerable to Enterprise Attacks
Synced passkeys, which are credentials stored in an authenticator and synced across devices through cloud services, pose significant security risks for enterprises. These risks include cloud account takeovers, authentication downgrade attacks, and browser-based security vulnerabilities. Device-bound passkeys in hardware security keys offer higher assurance and better administrative control, and should be mandatory for enterprise access use cases. Synced passkeys shift the trust boundary to cloud accounts and recovery workflows, expanding the attack surface. Adversaries can exploit these vulnerabilities to gain unauthorized access to enterprise systems. Organizations should prioritize device-bound passkeys to enhance security.
Adoption and Security of Passkeys in Passwordless Authentication
Passkeys, a form of passwordless authentication based on public key cryptography, are gaining traction as a more secure alternative to traditional passwords. They are increasingly adopted by major organizations, including Microsoft and Aflac, due to their enhanced security and user convenience. However, passkeys come with challenges such as device dependency, complex setup, and limited compatibility with legacy systems. Passkeys use a key pair: a public key stored by the service and a private key that stays on the user's device. This method prevents phishing, brute force, and dictionary attacks, as the private key never leaves the device. Even if a database is breached, the public keys are useless without the corresponding private key. Despite their advantages, passkeys face barriers like complexity, costs, and lack of clarity. Organizations may need to run hybrid models during the transition, maintaining strong password hygiene where passkeys are not yet feasible.