Crime ❯ Cybercrime ❯ Hacking ❯ Data Breaches
Attackers exploited unencrypted storage to leak tens of thousands of user images and identification files