Technology ❯ Information Technology ❯ Cybersecurity ❯ Network Security
Early findings point to a third‑party API weakness at an integration partner.