We just explored what can happen during a real security breach.
With the right knowledge, we can protect ourselves from other hackers and their attempts to steal our sensitive data.