Technology ❯ Cybersecurity ❯ Data Breaches ❯ Identity Theft
The breach centers on API abuse traced to a partner compromise, according to industry reporting.