Technology ❯Cybersecurity ❯Data Breach ❯Security Measures
The breach, discovered during a follow-up to an earlier incident, involved credential stuffing attacks with no sensitive financial data accessed.