Technology ❯ Information Technology ❯ Cybersecurity ❯ Data Protection
The case shows how third‑party intrusions can take a year to trace to downstream victims.