Read Time:3 Second
Attackers accessed emails, usernames, phone numbers, hashed passwords and authentication information
Attackers accessed emails, usernames, phone numbers, hashed passwords and authentication information