Technology ❯ Cybersecurity ❯ Data Breaches ❯ User Data Protection
Independent analyses of the leaked dataset point to backend access, raising phishing and SIM‑swap risks.