Technology ❯ Cybersecurity ❯ Data Breaches ❯ User Privacy
Independent analyses of the leaked dataset point to backend access, raising phishing and SIM‑swap risks.