According to a notification seen by the publication, an “unauthorized actor” leveraged a vulnerability in a third-party vendor’s software to gain access “to a limited set of data in our environment”, noting that the breach had been going on...
According to a notification seen by the publication, an “unauthorized actor” leveraged a vulnerability in a third-party vendor’s software to gain access “to a limited set of data in our environment”, noting that the breach had been going on...