Crime ❯ Cybercrime ❯ Data Theft ❯ Hacking
Cybersecurity experts verify leaked dataset containing metadata and email addresses, while X remains silent on the incident.