Technology ❯Cybersecurity ❯Data Breach ❯Unauthorized Access
Data exfiltrated from key departments; company investigating scope and impact of the breach