Technology ❯Information Security ❯Cyber Threats ❯Corporate Security
The automaker stated the posts do not reflect its views and is investigating the breach with X.