Technology ❯ Information Technology ❯ Cybersecurity ❯ Data Protection
Investigators trace the intrusion to a compromised integration partner exploiting an API validation flaw with valid credentials.