Crime ❯ Cybercrime ❯ Data Theft ❯ Hacking
Attackers exploited unencrypted storage to leak tens of thousands of user images and identification files