Threat actors can use personal information gleaned from images to craft targeted scams, putting personal and corporate data at risk.
Source: Threadpost