Technology ❯ Information Security ❯ Cybersecurity ❯ Data Breaches
Early findings point to a third‑party API weakness at an integration partner.