Technology ❯ Cybersecurity ❯ Data Protection ❯ Identity Theft
Investigators trace the intrusion to a compromised integration partner exploiting an API validation flaw with valid credentials.