Search-engine optimization (SEO) tactics direct users searching for common business forms such as invoices, receipts or other templates to hacker-controlled Google-hosted domains.
[...]
The incident, which forced the company to disconnect its systems, caused significant business disruption.
Source: Threat Post – Web Security – Insurance
[...]
Surveillance footage from companies such as Tesla as well as hospitals, prisons, police departments and schools was accessed in the hack.
Source:
[...]
Threat actors can use personal information gleaned from images to craft targeted scams, putting personal and corporate data at risk.
Source: Threat
[...]
A teenaged ethical hacker discovered a flawed endpoint associated with a health-department website in the state of Bengal, which exposed personally identifiable information
[...]