Technology
Data Protection Data Theft Data Breaches Hacking Malware Threats Geopolitics Cyberattacks E-commerce Hacking
Investigators aim to identify the AI-generated impersonator’s origins after suspicious pardon-list and cash-transfer requests targeted high-profile contacts.