Names, payment card numbers, expiration dates, CVV codes, mailing addresses, email addresses and more may have been accessed.
Malvertising attacks get more targeted, tougher to detect with fingerprinting.
Tens of thousands of users may have been infected in a matter of hours.
Names, Social Security numbers, physicians' names, diagnoses, and treatment and insurance information may have been copied and transferred.
Thousands of employees' personal information was accessed, according to news reports.
Dell launches new open source tool that uses Docker containers to help organizations identity credential thefts from memory. [VIDEO]
VIDEO: Bryan Sartin, managing director, the RISK Team, Verizon, discusses the new Verizon Breach Digest.
And exploits rose by almost 40 percent, according to a recent Bromium report.
What does it take to run a successful bug bounty program?
The group, New World Hacking, claims the DDoS attack exceeded 600 Gbps.
The hackers probed the system but didn't take control of it, the Wall Street Journal reports.