Technology ❯Cybersecurity ❯Data Breaches ❯Hacking
The stolen contact data is fueling impersonation scams by phone and email to capture one‑time codes or force password resets.