<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Oracle Cloud breach may impact 140,000 enterprise customers in Threats</title>
    <link>https://community.isc2.org/t5/Threats/Oracle-Cloud-breach-may-impact-140-000-enterprise-customers/m-p/78603#M1572</link>
    <description>&lt;P&gt;And now, oracle is starting to &lt;A href="https://www.theregister.com/2025/04/08/oracle_cloud_compromised/" target="_blank" rel="noopener"&gt;fess up&lt;/A&gt;.&amp;nbsp; The fundamental problem appears to be their failure to apply their own security patches on a timely basis.&amp;nbsp; The&amp;nbsp;&lt;A href="https://nvd.nist.gov/vuln/detail/cve-2021-35587" target="_blank" rel="noopener"&gt;vulnerability&lt;/A&gt; has a 9.8 (out of 10) CVSS score.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So much for the theory that one of the primary advantages of using a manufacturer's own cloud infrastructure is that they have advance notice and can apply maintenance even before the patch is publicly released.&lt;/P&gt;</description>
    <pubDate>Tue, 08 Apr 2025 04:51:50 GMT</pubDate>
    <dc:creator>denbesten</dc:creator>
    <dc:date>2025-04-08T04:51:50Z</dc:date>
    <item>
      <title>Oracle Cloud breach may impact 140,000 enterprise customers</title>
      <link>https://community.isc2.org/t5/Threats/Oracle-Cloud-breach-may-impact-140-000-enterprise-customers/m-p/78398#M1561</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A threat actor has targeted the login infrastructure of Oracle Cloud, exploiting middleware vulnerability, and demanding ransom from over 140,000 tenants.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Don't pay the ransom!&lt;/P&gt;&lt;H2&gt;&lt;FONT face="arial,helvetica,sans-serif" size="3"&gt;&lt;A href="https://www.csoonline.com/article/3852643/oracle-cloud-breach-may-impact-140000-enterprise-html" target="_blank" rel="noopener"&gt;https://www.csoonline.com/article/3852643/oracle-cloud-breach-may-impact-140000-enterprise-html&lt;/A&gt;&lt;/FONT&gt;&lt;/H2&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" size="3"&gt;Regards&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" size="3"&gt;Caute_Cautim&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 31 Mar 2025 21:28:32 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Oracle-Cloud-breach-may-impact-140-000-enterprise-customers/m-p/78398#M1561</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2025-03-31T21:28:32Z</dc:date>
    </item>
    <item>
      <title>Re: Oracle Cloud breach may impact 140,000 enterprise customers</title>
      <link>https://community.isc2.org/t5/Threats/Oracle-Cloud-breach-may-impact-140-000-enterprise-customers/m-p/78427#M1568</link>
      <description>&lt;P&gt;Oracle continues to deny there has been a breach, yet (anonymous) customers have confirmed the disclosed creds did belong to them and were uniquely used with Oracle.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Apr 2025 20:35:15 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Oracle-Cloud-breach-may-impact-140-000-enterprise-customers/m-p/78427#M1568</guid>
      <dc:creator>denbesten</dc:creator>
      <dc:date>2025-04-01T20:35:15Z</dc:date>
    </item>
    <item>
      <title>Re: Oracle Cloud breach may impact 140,000 enterprise customers</title>
      <link>https://community.isc2.org/t5/Threats/Oracle-Cloud-breach-may-impact-140-000-enterprise-customers/m-p/78603#M1572</link>
      <description>&lt;P&gt;And now, oracle is starting to &lt;A href="https://www.theregister.com/2025/04/08/oracle_cloud_compromised/" target="_blank" rel="noopener"&gt;fess up&lt;/A&gt;.&amp;nbsp; The fundamental problem appears to be their failure to apply their own security patches on a timely basis.&amp;nbsp; The&amp;nbsp;&lt;A href="https://nvd.nist.gov/vuln/detail/cve-2021-35587" target="_blank" rel="noopener"&gt;vulnerability&lt;/A&gt; has a 9.8 (out of 10) CVSS score.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So much for the theory that one of the primary advantages of using a manufacturer's own cloud infrastructure is that they have advance notice and can apply maintenance even before the patch is publicly released.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Apr 2025 04:51:50 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Oracle-Cloud-breach-may-impact-140-000-enterprise-customers/m-p/78603#M1572</guid>
      <dc:creator>denbesten</dc:creator>
      <dc:date>2025-04-08T04:51:50Z</dc:date>
    </item>
  </channel>
</rss>

