Technology ❯Cybersecurity ❯Threat Actors ❯Data Access
Hackers exploited an unsecured API endpoint, potentially enabling phishing and SIM swapping attacks.