Media ❯Technology ❯Cybersecurity ❯Data Security
The breach, discovered during a follow-up to an earlier incident, involved credential stuffing attacks with no sensitive financial data accessed.