Crime ❯ Cybercrime ❯ Hacking ❯ Data Theft
A supplier intrusion now contained exposed identifiers rather than bank details, prompting regulatory scrutiny.