Technology ❯Information Security ❯Access Control ❯Account Security
The breach, linked to a third-party service provider, compromised personal details like names, emails, and partial card information.