<img width="578" height="304" src="https://venturebeat.com/wp-content/uploads/2019/10/cybercrime.GettyImages-1081349274.jpg?fit=578%2C304&strip=all" alt="Computer hacker" loading="lazy" srcset="https://venturebeat.com/wp-content/uploads/2019/10/cybercrime.GettyImages-1081349274.jpg?w=2097&strip=all 2097w, https://venturebeat.com/wp-content/uploads/2019/10/cybercrime.GettyImages-1081349274.jpg?w=300&strip=all 300w, https://venturebeat.com/wp-content/uploads/2019/10/cybercrime.GettyImages-1081349274.jpg?w=768&strip=all 768w, https://venturebeat.com/wp-content/uploads/2019/10/cybercrime.GettyImages-1081349274.jpg?w=800&strip=all 800w, https://venturebeat.com/wp-content/uploads/2019/10/cybercrime.GettyImages-1081349274.jpg?w=1536&strip=all 1536w, https://venturebeat.com/wp-content/uploads/2019/10/cybercrime.GettyImages-1081349274.jpg?w=2048&strip=all 2048w, https://venturebeat.com/wp-content/uploads/2019/10/cybercrime.GettyImages-1081349274.jpg?w=400&strip=all 400w, https://venturebeat.com/wp-content/uploads/2019/10/cybercrime.GettyImages-1081349274.jpg?w=750&strip=all 750w, https://venturebeat.com/wp-content/uploads/2019/10/cybercrime.GettyImages-1081349274.jpg?w=578&strip=all 578w, https://venturebeat.com/wp-content/uploads/2019/10/cybercrime.GettyImages-1081349274.jpg?w=930&strip=all 930w" sizes="(max-width: 578px) 100vw, 578px">The 2022 Twitter data breach and leak of over 200 million emails shows that APIs are a goldmine for social engineering scams and PII.<a href="https://venturebeat.com/security/twitter-social-engineering/" target="_blank">Read More</a>