Attackers accessed emails, usernames, phone numbers, hashed passwords and authentication information
This article has been indexed from www.infosecurity-magazine.com
Attackers accessed emails, usernames, phone numbers, hashed passwords and authentication information