Technology ❯ Cybersecurity ❯ Threats ❯ Hacking
The incident underscores supply‑chain weak points that can defeat gated access to high‑risk AI tools.