Read Time:3 Second

Compromised data included customer names, email addresses and phone numbers

Read More