Technology ❯Cybersecurity ❯Data Breaches ❯User Privacy
The company calls hackers’ larger figures an extortion tactic, attributing the exposure to a support vendor rather than its own systems.