Crime ❯ Cybercrime ❯ Data Breaches ❯ Identity Theft
Investigators trace the intrusion to a compromised integration partner exploiting an API validation flaw with valid credentials.