Ethan had spent the past forty-eight hours buried in the security logs of the company, coordinating with the IT forensics team, and combing through traces of data access routes that shouldn’t have existed. His usually composed face had hardened, each line sharpened by frustration and urgency.
The leak had spread...