Gym customer data, including contact information, birth dates and height/weight data, opens the door to convincing follow-on social-engineering attacks.
Source link
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Related
Author: Jessica Venkat
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea