The hackers appeared to have used standard phishing and email attachments, some apparently directed at employees with high-level network access, to obtain unencrypted customer data that could complete a fullz.
Source: wiktionary
Ranked by relevance and common usage.
OpenGloss and ConceptNet supply richer edges like generalizations, collocations, and derivations.
1 total sentences available.
The hackers appeared to have used standard phishing and email attachments, some apparently directed at employees with high-level network access, to obtain unencrypted customer data that could complete a fullz.
Source: wiktionary
Data sourced from Wiktionary, WordNet, CMU, and other open linguistic databases. Updated March 2026.