Crime ❯Cybercrime ❯Hacking ❯Data Breaches
Attackers exploited unencrypted storage to leak tens of thousands of user images and identification files