When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.
They obtained the access by exploiting compromised credentials and flaws in Jira.
The publication also analyzed a data sample and said that, while verified, it was quite old.
(Image credit: Shutterstock)
Some of the partial payment card information found had expired long ago,BleepingComputeradded.