Blog

  • ‘Dozens’ of organizations had data stolen in Oracle-linked hacks

    ‘Dozens’ of organizations had data stolen in Oracle-linked hacks

    Security researchers at Google say hackers targeting corporate executives with extortion emails have stolen data from “dozens of organizations,” one of the first signs that the hacking campaign may be far-reaching.

    The tech giant said Thursday in a statement shared with TechCrunch that the Clop extortion gang exploited multiple security vulnerabilities in Oracle’s E-Business Suite software to steal significant amounts of data from affected organizations.

    Oracle’s E-Business software allows companies to run their operations, such as storing their customer data and their employees’ human resources files. 

    Google said in a corresponding blog post that the hacking campaign targeting Oracle customers dates back to at least July 10, some three months before the hacks were first detected. 

    Oracle conceded earlier this week that the hackers behind the extortion campaign were still abusing its software to steal personal information about corporate executives and their companies. Days earlier, Oracle’s chief security officer, Rob Duhart, claimed in the same post — since scrubbed — that the extortion campaign was linked to previously identified vulnerabilities that Oracle patched in July, suggesting the hacks were over.

    But in a security advisory published over the weekend, Oracle said the zero-day bug — named because Oracle had no time to fix the bug, as it was already being exploited by hackers — can be “exploited over a network without the need for a username and password.” 

    The Russia-linked Clop ransomware and extortion gang has made a name for itself in recent years for mass-hacking campaigns, often involving the abuse of vulnerabilities unknown to the software vendor at the time they were exploited, to steal large amounts of corporate and customer data. This includes managed file transfer tools, like Cleo, MOVEit, and GoAnywhere, which companies use as a way to send sensitive corporate data over the internet.

    Google’s blog post includes email addresses and other technical details that network defenders can use to look for extortion emails and other indications that their Oracle systems may have been compromised.

    Continue Reading

  • Just a moment…

    Just a moment…

    Continue Reading

  • Just a moment…

    Just a moment…

    Continue Reading

  • Interstellar comet 3I/ATLAS is losing water ‘like a fire hose’ on full blast — and it’s ‘rewriting what we thought we knew’ about alien star systems

    Interstellar comet 3I/ATLAS is losing water ‘like a fire hose’ on full blast — and it’s ‘rewriting what we thought we knew’ about alien star systems

    The interstellar comet 3I/ATLAS began blasting water “like a fire hose” before it was anywhere near the sun, according to a recent study.

    Researchers observed the comet scattering water unusually early in a discovery that sheds light on how the…

    Continue Reading

  • Annoyed by junk calls to your iPhone? Try the new iOS 26 call screen feature

    Annoyed by junk calls to your iPhone? Try the new iOS 26 call screen feature

    LONDON — LONDON (AP) — iPhone users have a new tool to combat the scourge of nuisance phone calls: a virtual gatekeeper that can screen incoming calls from unknown numbers.

    It’s among the bevy of new features that Apple rolled out with last…

    Continue Reading

  • Most Valuable Parent: Wave’s Kailen Sheridan on how soccer, being an aunt prepared her for motherhood | News

    Most Valuable Parent: Wave’s Kailen Sheridan on how soccer, being an aunt prepared her for motherhood | News

    I saw an Instagram post of you doing the sympathy exercises with your wife, which was so funny. What did you learn and how did that come about?

    I had seen somebody else do it on social media, so I was like, “Oh, yeah, I’m definitely gonna try…

    Continue Reading

  • Even Longtime Swifties Disgusted by Taylor’s Use of AI

    Even Longtime Swifties Disgusted by Taylor’s Use of AI

    Photo by Kevin Winter/TAS24/Getty Images for TAS Rights Management

    Taylor Swift, the queen mother of never taking a stance on anything that doesn’t directly impact her, has reversed course on AI — and her…

    Continue Reading

  • Breastfeeding offers mothers more than bonding, it can also reduce breast cancer risk

    Breastfeeding offers mothers more than bonding, it can also reduce breast cancer risk

    Breastfeeding has long been promoted for its benefits to infants, but research shows it may also protect mothers, including lowering their lifetime risk of breast cancer.

    A large pooled analysis of 47 studies across 30 countries found that breast…

    Continue Reading

  • Montel Jackson | Rising To The Challenge

    Montel Jackson | Rising To The Challenge

    Last time out, Jackson didn’t score a finish, but he became the first man to defeat Daniel Marcos, earning the No. 15 spot in the rankings. Now a true contender at 135 pounds, the Wisconsin-native isn’t wasting any time to try and climb the…

    Continue Reading

  • Visual confirmation: Groundbreaking image shows two black holes orbiting each other for first time

    Visual confirmation: Groundbreaking image shows two black holes orbiting each other for first time

    For the first time ever, astronomers have imaged two black holes orbiting each other, finally offering visual proof for the existence of black hole pairs.

    Spotted through the faint fluctuations of radio light captured by telescopes both on the…

    Continue Reading