Booking.com’s breach exposed names, phone numbers, and booking details now being used in targeted WhatsApp phishing. Constella explains how the PII-to-smishing pipeline works and what to do about it.
First seen on securityboulevard.com
Jump to article: securityboulevard.com/2026/04/booking-com-breach-shows-exactly-how-smishing-attacks-get-made/
![]()

