The Clop ransomware gang has been exploiting a critical Oracle E-Business Suite (EBS) zero-day bug in data theft attacks since at least early August, according to cybersecurity company CrowdStrike.
Oracle E-Business Suite (EBS) customers have been urged to patch a critical vulnerability in the product, after reports that the notorious Clop ransomware group has exploited the bug in attacks as a ...
Oracle has fixed a zero-day vulnerability in one of its flagship business software products that a hacking group is currently abusing to steal personal information about corporate executives. In a ...
Security researchers at Google say hackers targeting corporate executives with extortion emails have stolen data from “dozens of organizations,” one of the first signs that the hacking campaign may be ...
A hot potato: Oracle has confirmed that customers using its E-Business Suite have received extortion emails, marking an escalation in a hacking campaign first reported by Google earlier in the week.
Envoy Air, an American Airlines subsidiary, has confirmed that it was among the dozens of organizations compromised via Oracle E-Business Suite (EBS) security flaws, following claims by Clop ...
The campaign may be linked to the cybercriminal group Clop, previously responsible for a series of widespread data theft attacks, according to Mandiant and Google threat researchers. Mandiant and ...
Cl0p ransomware exploited Oracle E-Business Suite, demanding payment from affected organizations Google says attacks began in July–August, before Oracle released a patch for the zero-day FIN11 may be ...
Oracle has informed customers that it has patched a critical remote code execution vulnerability tracked as CVE-2025-61882. The recent data theft and extortion campaign targeting Oracle E-Business ...
Hospitals That Are Oracle Customers Urged to Take Immediate Action to Address Security Vulnerability
Oracle has published a Security Alert that addresses vulnerability CVE-2025-61882 in the Oracle E-Business Suite (EBS). This vulnerability is remotely exploitable without authentication, i.e., it may ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results