Crime ❯Cybercrime ❯Data Theft ❯Hacking
Attackers exploited unencrypted storage to leak tens of thousands of user images and identification files