Oracle
Emulating the Surging Hadooken Malware
AttackIQ has released a new attack graph that emulates the behaviors exhibited by the Hadooken malware during intrusions that abused misconfigurations and critical Remote Code Execution (RCE) vulnerabilities on public-facing Oracle Weblogic ...

Dell Hell Redux — More Personal Info Stolen by ‘Menelik’
Phish Ahoy! Hacker took advantage of Dell’s lack of anti-scraping defense ...

Dell Hell: 49 Million Customers’ Information Leaked
DUDE! You’re Getting Phished. Dell customer data from the past six (or more?) years was stolen. It looks like someone sold scads of personal information to the highest bidder ...

Applying Zero-Trust to Voice Networks and the 5G Core
Zero-trust architecture is rapidly becoming the go-to approach for security and IT leaders to secure voice, mobile and 5G networks and applications ...

3 Ways to Streamline Auth, Access & Security for Oracle EBS
Oracle E-Business Suite (EBS) is a popular ERP tool for business and financial operations that uses a combination of usernames and passwords to authenticate users. This form of authentication has known weaknesses ...

Oracle Adds Free Confidential Computing Option to Cloud Service
Oracle today added a confidential computing capability to its Oracle Cloud Infrastructure service at no extra cost. The service is based on AMD Secure Encrypted Virtualization (SEV) or AMD Secure Memory Encryption ...

Oracle’s HUGE Ad Data Graph is ‘Illegal Panopticon’ — 5 BILLION People Big
Oracle “illegally” collects and links data about you, selling it to the highest bidder—all without your consent ...

Are Vendors Failing in the Face of Open Source Cyberthreats?
Software vendors must understand the implications a breach in open source software might have on their own product or service. In December 2021, for example, a vulnerability was discovered in Log4j, an ...

Oracle Adds Services to Strengthen Cloud Security
Oracle today extended the security capabilities of its cloud platform by adding a managed firewall service based on the Next-Generation Firewall (NGFW) from Palo Alto Networks. In addition, Oracle added a threat ...
Tripwire Patch Priority Index for April 2022
Tripwire’s April 2022 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft, Google Chrome, Oracle, and Adobe. First on the patch priority list this month is an elevation of privilege vulnerability ...