Did this cybersecurity firm use a data breach for extortion?

You may also like...