Technology
Hacking Data Breaches Malware Data Protection Vulnerabilities Cyberattacks Threats Ransomware Cyber Attacks Phishing
Investigators say an Aug. 6 seizure of its controls halted the attacks.