Technology
Hacking Data Breaches Malware Data Protection Vulnerabilities Threats Cyberattacks Ransomware Cyber Attacks Phishing
The company attributes the breach to a compromised vendor account, pledging not to pay extortion.