Law ❯Cybersecurity ❯Bug Bounty Programs ❯Security Breaches
Security researchers exploited a vulnerability to withdraw millions, refusing to return funds without a bounty.