Watering Hole Attacks

Watering hole attacks are attacks to a website made by placing malicious code within a page that will launch an attack on visitors.
Because companies are taking every precaution necessary against malware, it is getting more difficult for hackers to get in.
So instead of forcing their way into secure company employee accounts, they use bait so to speak and prey on employees, encouraging them to go out and bring the hacker into the website themselves.

According to a recent article in the New York Times,
when hackers were unable to breach the computer network at a big oil company, they infected the most popular online menu of a Chinese restaurant with malware. When the workers browsed the menu, they inadvertently downloaded code that gave the attackers a foothold in the vast computer network of their business.

Common Vulnerabilities and Exposures

CVE-2014-0160 is the official reference to this bug
As Caolan Greene just mentioned on his blog Half a million sites are vulnerable, It is otherwise known as the Heartbleed bug.
It allows an attacker can grab 64K of random memory from a server multiple times while he leaves no trace.
Anything can be in that memory location like SSl private keys and user keys.  According to Bruce Schneier who has been  writing about security issues since 2004, the bug has been patched. Even so he says that “after you patch your systems, you have to get a new public/private key pair, update your SSL certificate, and then change every password that could potentially be affected.”