Technology ❯ Cybersecurity ❯ Hacking ❯ Data Breach
Security services are probing the leak’s authenticity, focusing on how access to Bennett’s Telegram account was obtained.