<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>hacking &#8211; BlueChip Computers</title>
	<atom:link href="https://bluechipcomputers.com/tag/hacking/feed/" rel="self" type="application/rss+xml" />
	<link>https://bluechipcomputers.com</link>
	<description></description>
	<lastBuildDate>Sun, 17 Aug 2025 20:11:57 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
<site xmlns="com-wordpress:feed-additions:1">31384345</site>	<item>
		<title>Ticketmaster confirms colossal breach</title>
		<link>https://bluechipcomputers.com/ticketmaster-confirms-colossal-breach/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 05 Jun 2024 14:54:30 +0000</pubDate>
				<category><![CDATA[Latest News]]></category>
		<category><![CDATA[cloud storage]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[fraud prevention]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[incident response]]></category>
		<category><![CDATA[Online Security]]></category>
		<category><![CDATA[shiny hunters]]></category>
		<category><![CDATA[ticket sales]]></category>
		<category><![CDATA[ticketmaster]]></category>
		<category><![CDATA[user privacy]]></category>
		<guid isPermaLink="false">https://bluechipcomputers.com/?p=4658</guid>

					<description><![CDATA[In a major cybersecurity incident, Ticketmaster has confirmed a colossal data breach, exposing sensitive information of over **560 million users**. Hackers accessed data via a third-party cloud provider, allegedly taking 1.3TB containing names, addresses, ticket sales, and order details. The breach, attributed to the group *Shiny Hunters*, has prompted Ticketmaster to notify authorities, affected users, and urge all customers to update passwords and monitor accounts for signs of fraud. This event underscores the critical importance of *data protection* and *online security* for global ticketing platforms.
]]></description>
										<content:encoded><![CDATA[
<p>May 20, 2024 &#8211; Ticketmaster experienced a data breach due to the theft of information from a third-party cloud database provider, likely Snowflake.</p>



<p>On May 20, 2024, Live Nation Entertainment, Inc. (the &#8216;Company&#8217; or &#8216;we&#8217;) detected unauthorized activity in a third-party cloud database environment housing Company data, primarily from its Ticketmaster LLC subsidiary, and initiated an investigation with top-tier forensic experts to understand the incident,&#8221; Live Nation revealed in a Friday night SEC filing.</p>



<p>On May 27, 2024, a criminal actor claimed to have Company user data for sale on the dark web.</p>



<p>We are actively working to mitigate risks to our users and the Company, and have notified and are cooperating with law enforcement. We are also informing regulatory authorities and affected users about the unauthorized access to personal information as needed.</p>



<p>Although the breach allegedly exposed data of over 560 million Ticketmaster users, the company asserts that it does not anticipate a significant impact on its overall business operations or financial condition.</p>



<p>This disclosure follows attempts by the threat actor Shiny Hunters to sell the Ticketmaster data on a hacking forum for $500,000.</p>



<p>The stolen databases reportedly contain 1.3TB of data, including customers&#8217; full details (such as names, home and email addresses, and phone numbers), as well as ticket sales, order information, and event details for 560 million customers.</p>



<p>If you use Ticketmaster and want to continue using them then make sure you change your login information including usernames, passwords and makeup a new email just for them. Always keep an eye out for fraudulent activity on your credit cards. </p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4658</post-id>	</item>
	</channel>
</rss>
