{"id":47467,"date":"2022-07-11T15:00:53","date_gmt":"2022-07-11T15:00:53","guid":{"rendered":"http:\/\/c4ef92be-6378-4a5d-98a0-128320329ad5"},"modified":"2022-07-11T15:00:53","modified_gmt":"2022-07-11T15:00:53","slug":"python-programming-pypl-is-rolling-out-2fa-for-critical-projects-giving-away-4000-security-keys","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/python-programming-pypl-is-rolling-out-2fa-for-critical-projects-giving-away-4000-security-keys\/","title":{"rendered":"Python programming: PyPl is rolling out 2FA for critical projects, giving away 4,000 security keys"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/f466904252478af6cd8ed676292b60a0d602daae\/2021\/03\/16\/be90a158-74c2-464c-85c7-2c89b88db6fe\/istock-1255905201.jpg?auto=webp&amp;fit=crop&amp;height=675&amp;width=1200\" class=\"ff-og-image-inserted\"><\/div>\n<p>PyPI or the Python Package Index is giving away 4,000 Google Titan security keys as part of its move to mandatory two-factor authentication (2FA) for critical projects built in the Python programming language. &nbsp;<\/p>\n<p>Python is one of the world&#8217;s most popular programming languages, loved for its breadth of packages or add-on libraries that make it useful for data science. Developers need to update these packages frequently and attackers have used this behavior to backdoor their Windows, Linux and Apple machines <a href=\"https:\/\/www.zdnet.com\/article\/open-source-security-its-too-easy-to-upload-devastating-malicious-packages-warns-google\/\" rel=\"follow\">through bogus packages that are similarly named to legitimate ones<\/a>, otherwise known as software supply chain attacks.&nbsp;<\/p>\n<p>PyPI, which is managed by the Python Software Foundation, is the main repository where Python developers can get third-party developed open-source packages for their projects.&nbsp;<\/p>\n<p>PyPI and JavaScript&#8217;s equivalent npm repository act like the App Store\/Play Store for developers, but aren&#8217;t closed and the free services don&#8217;t have the resources to vet package submissions for malware.&nbsp;<\/p>\n<p>Google, through the Linux Foundation&#8217;s Open Source Security Foundation (OpenSSF), is tackling the threat of malicious language packages and <a href=\"https:\/\/www.zdnet.com\/article\/open-source-security-google-has-a-new-plan-to-stop-software-supply-chain-attacks\/\" rel=\"follow\">open source software supply chain attacks<\/a>. It <a href=\"https:\/\/www.zdnet.com\/article\/open-source-security-its-too-easy-to-upload-devastating-malicious-packages-warns-google\/\" rel=\"follow\">found over 200 malicious JavaScript and Python packages in one month<\/a> and noted &#8220;devastating consequences&#8221; for developers and the organizations they write code for when they install them. &nbsp;<\/p>\n<p>One way developers can protect themselves from stolen credentials is by using two-factor authentication and the PSF is now making it mandatory for developers behind &#8220;critical projects&#8221; to use 2FA in coming months. PyPI hasn&#8217;t declared a specific date for the requirement.<\/p>\n<p>&#8220;We&#8217;ve begun rolling out a 2FA requirement: soon, maintainers of critical projects must have 2FA enabled to publish, update, or modify them,&#8221; the PSF <a href=\"https:\/\/twitter.com\/pypi\/status\/1545455297388584960\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">said on its PyPI Twitter account<\/a>.&nbsp;<\/p>\n<p>As part of the security drive, it is giving away 4,000 Google Titan hardware security keys to project maintainers gifted by Google&#8217;s open source security team.&nbsp;<\/p>\n<p>&#8220;In order to improve the general security of the Python ecosystem, PyPI has begun implementing a two-factor authentication (2FA) requirement for critical projects. This requirement will go into effect in the coming months,&#8221; <a href=\"https:\/\/pypi.org\/security-key-giveaway\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">PSF said in a statement<\/a>. &nbsp;<\/p>\n<p>&#8220;To ensure that maintainers of critical projects have the ability to implement strong 2FA with security keys, the Google Open Source Security Team, a sponsor of the <a href=\"https:\/\/www.python.org\/psf\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Python Software Foundation<\/a>, has provided a limited number of security keys to distribute to critical project maintainers.<\/p>\n<p>PSF says it deems any project in the top 1% of downloads over the prior six months as critical. Presently, there are more than 350,000 projects on PyPI, meaning that more than 3,500 projects are rated as critical. PyPI calculates this on a daily basis so the Titan giveaway should go a long way to cover a chunk of key maintainers but not all of them. In the name of transparency, PyPI is also <a href=\"https:\/\/p.datadoghq.com\/sb\/7dc8b3250-389f47d638b967dbb8f7edfd4c46acb1?from_ts=1657460532354&amp;to_ts=1657546932354&amp;live=true\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">publishing 2FA account metrics here<\/a>. There are currently 28,336 users with 2FA enabled, with nearly 27,000 of them using a 2FA app like Microsoft Authenticator. There are over 3,800 projects rated as &#8220;critical&#8221; and 8,241 PyPI users in this group.&nbsp;<\/p>\n<p>The critical group is also likely to grow since projects that have been designated as critical remain so indefinitely while new projects are added to mandatory 2FA over time. The 2FA rule applies to both project maintainers and owners.&nbsp;<\/p>\n<p>Titan keys are only approved for sale in certain geographic regions, so only developers from Austria, Belgium, Canada, France, Germany, Italy, Japan, Spain, Switzerland, United Kingdom, and the United States are eligible to receive a free one, according to PyPI.&nbsp;<\/p>\n<p>Maintainers in other regions who will be required to use 2FA need to buy a FIDO U2F security key from vendors like Yubikey. Or they can <a href=\"https:\/\/pypi.org\/help\/#totp\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">enable 2FA through a mobile app<\/a> like Google Authenticator, Microsoft Authenticator, Duo Mobile, Auth, FreeOTP+ or FreeOTP or a password manager like 1Password.&nbsp;<\/p>\n<p>Eligible maintainers can redeem a promo code for two free <a href=\"https:\/\/store.google.com\/product\/titan_security_key\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Titan Security Keys<\/a> (USB-C or USB-A), including free shipping <a href=\"https:\/\/pypi.org\/security-key-giveaway\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">from the PyPI website<\/a>. The code expires on October 1.&nbsp;<\/p>\n<p>While most developers will be familiar with 2FA, the requirement could create log-in challenges, say if a user loses the 2FA key and has set up their account with only one 2FA option.&nbsp;<\/p>\n<p>&#8220;Without multiple 2FA options, effect of losing a 2FA method results in the need to fully recover an account, which is burdensome and time-consuming both for maintainers and PyPI administrators. Enabling multiple 2FA methods reduces the potential disruption if one is lost,&#8221; PyPl warns.<\/p>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/python-programming-pypl-is-rolling-out-2fa-for-critical-projects-giving-away-4000-security-keys\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>4,000 Google Titan security keys should help to protect critical Python projects from software supply chain attacks.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-47467","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Python programming: PyPl is rolling out 2FA for critical projects, giving away 4,000 security keys 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/python-programming-pypl-is-rolling-out-2fa-for-critical-projects-giving-away-4000-security-keys\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Python programming: PyPl is rolling out 2FA for critical projects, giving away 4,000 security keys 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/python-programming-pypl-is-rolling-out-2fa-for-critical-projects-giving-away-4000-security-keys\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-11T15:00:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/f466904252478af6cd8ed676292b60a0d602daae\/2021\/03\/16\/be90a158-74c2-464c-85c7-2c89b88db6fe\/istock-1255905201.jpg?auto=webp&amp;fit=crop&amp;height=675&amp;width=1200\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/python-programming-pypl-is-rolling-out-2fa-for-critical-projects-giving-away-4000-security-keys\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/python-programming-pypl-is-rolling-out-2fa-for-critical-projects-giving-away-4000-security-keys\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Python programming: PyPl is rolling out 2FA for critical projects, giving away 4,000 security keys\",\"datePublished\":\"2022-07-11T15:00:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/python-programming-pypl-is-rolling-out-2fa-for-critical-projects-giving-away-4000-security-keys\\\/\"},\"wordCount\":765,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/python-programming-pypl-is-rolling-out-2fa-for-critical-projects-giving-away-4000-security-keys\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/f466904252478af6cd8ed676292b60a0d602daae\\\/2021\\\/03\\\/16\\\/be90a158-74c2-464c-85c7-2c89b88db6fe\\\/istock-1255905201.jpg?auto=webp&amp;fit=crop&amp;height=675&amp;width=1200\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/python-programming-pypl-is-rolling-out-2fa-for-critical-projects-giving-away-4000-security-keys\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/python-programming-pypl-is-rolling-out-2fa-for-critical-projects-giving-away-4000-security-keys\\\/\",\"name\":\"Python programming: PyPl is rolling out 2FA for critical projects, giving away 4,000 security keys 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/python-programming-pypl-is-rolling-out-2fa-for-critical-projects-giving-away-4000-security-keys\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/python-programming-pypl-is-rolling-out-2fa-for-critical-projects-giving-away-4000-security-keys\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/f466904252478af6cd8ed676292b60a0d602daae\\\/2021\\\/03\\\/16\\\/be90a158-74c2-464c-85c7-2c89b88db6fe\\\/istock-1255905201.jpg?auto=webp&amp;fit=crop&amp;height=675&amp;width=1200\",\"datePublished\":\"2022-07-11T15:00:53+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/python-programming-pypl-is-rolling-out-2fa-for-critical-projects-giving-away-4000-security-keys\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/python-programming-pypl-is-rolling-out-2fa-for-critical-projects-giving-away-4000-security-keys\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/python-programming-pypl-is-rolling-out-2fa-for-critical-projects-giving-away-4000-security-keys\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/f466904252478af6cd8ed676292b60a0d602daae\\\/2021\\\/03\\\/16\\\/be90a158-74c2-464c-85c7-2c89b88db6fe\\\/istock-1255905201.jpg?auto=webp&amp;fit=crop&amp;height=675&amp;width=1200\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/f466904252478af6cd8ed676292b60a0d602daae\\\/2021\\\/03\\\/16\\\/be90a158-74c2-464c-85c7-2c89b88db6fe\\\/istock-1255905201.jpg?auto=webp&amp;fit=crop&amp;height=675&amp;width=1200\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/python-programming-pypl-is-rolling-out-2fa-for-critical-projects-giving-away-4000-security-keys\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Python programming: PyPl is rolling out 2FA for critical projects, giving away 4,000 security keys\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Python programming: PyPl is rolling out 2FA for critical projects, giving away 4,000 security keys 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/python-programming-pypl-is-rolling-out-2fa-for-critical-projects-giving-away-4000-security-keys\/","og_locale":"en_US","og_type":"article","og_title":"Python programming: PyPl is rolling out 2FA for critical projects, giving away 4,000 security keys 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/python-programming-pypl-is-rolling-out-2fa-for-critical-projects-giving-away-4000-security-keys\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-07-11T15:00:53+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/f466904252478af6cd8ed676292b60a0d602daae\/2021\/03\/16\/be90a158-74c2-464c-85c7-2c89b88db6fe\/istock-1255905201.jpg?auto=webp&amp;fit=crop&amp;height=675&amp;width=1200","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/python-programming-pypl-is-rolling-out-2fa-for-critical-projects-giving-away-4000-security-keys\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/python-programming-pypl-is-rolling-out-2fa-for-critical-projects-giving-away-4000-security-keys\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Python programming: PyPl is rolling out 2FA for critical projects, giving away 4,000 security keys","datePublished":"2022-07-11T15:00:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/python-programming-pypl-is-rolling-out-2fa-for-critical-projects-giving-away-4000-security-keys\/"},"wordCount":765,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/python-programming-pypl-is-rolling-out-2fa-for-critical-projects-giving-away-4000-security-keys\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/f466904252478af6cd8ed676292b60a0d602daae\/2021\/03\/16\/be90a158-74c2-464c-85c7-2c89b88db6fe\/istock-1255905201.jpg?auto=webp&amp;fit=crop&amp;height=675&amp;width=1200","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/python-programming-pypl-is-rolling-out-2fa-for-critical-projects-giving-away-4000-security-keys\/","url":"https:\/\/www.threatshub.org\/blog\/python-programming-pypl-is-rolling-out-2fa-for-critical-projects-giving-away-4000-security-keys\/","name":"Python programming: PyPl is rolling out 2FA for critical projects, giving away 4,000 security keys 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/python-programming-pypl-is-rolling-out-2fa-for-critical-projects-giving-away-4000-security-keys\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/python-programming-pypl-is-rolling-out-2fa-for-critical-projects-giving-away-4000-security-keys\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/f466904252478af6cd8ed676292b60a0d602daae\/2021\/03\/16\/be90a158-74c2-464c-85c7-2c89b88db6fe\/istock-1255905201.jpg?auto=webp&amp;fit=crop&amp;height=675&amp;width=1200","datePublished":"2022-07-11T15:00:53+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/python-programming-pypl-is-rolling-out-2fa-for-critical-projects-giving-away-4000-security-keys\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/python-programming-pypl-is-rolling-out-2fa-for-critical-projects-giving-away-4000-security-keys\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/python-programming-pypl-is-rolling-out-2fa-for-critical-projects-giving-away-4000-security-keys\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/f466904252478af6cd8ed676292b60a0d602daae\/2021\/03\/16\/be90a158-74c2-464c-85c7-2c89b88db6fe\/istock-1255905201.jpg?auto=webp&amp;fit=crop&amp;height=675&amp;width=1200","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/f466904252478af6cd8ed676292b60a0d602daae\/2021\/03\/16\/be90a158-74c2-464c-85c7-2c89b88db6fe\/istock-1255905201.jpg?auto=webp&amp;fit=crop&amp;height=675&amp;width=1200"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/python-programming-pypl-is-rolling-out-2fa-for-critical-projects-giving-away-4000-security-keys\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Python programming: PyPl is rolling out 2FA for critical projects, giving away 4,000 security keys"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/47467","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=47467"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/47467\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=47467"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=47467"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=47467"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}