ARTICLE AD BOX
The leaks analyzed by researchers were ‘loaded with information that could be used to steal accounts or impersonate affected people in identity theft attacks’
The leaks analyzed by researchers were ‘loaded with information that could be used to steal accounts or impersonate affected people in identity theft attacks’