Technology ❯ Cybersecurity
Incident Response Hacking Ransomware User Privacy Personal Data Protection Personal Data Corporate Security Customer Data Protection Telecommunications Identity Theft
The breach centers on API abuse traced to a partner compromise, according to industry reporting.