Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Cyber Crime Junkies. Host David Mauro.. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Cyber Crime Junkies. Host David Mauro. or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Oracle Breach 2025 🎯 How Hackers Attack

35:53
 
Share
 

Manage episode 477812556 series 3559123
Content provided by Cyber Crime Junkies. Host David Mauro.. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Cyber Crime Junkies. Host David Mauro. or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.

In early 2025, Oracle faced two significant cybersecurity breaches that exposed sensitive data and raised serious concerns about its security practices. The first breach involved outdated Cerner servers, compromising healthcare data, while the second targeted an inactive legacy system, leading to the theft of client credentials. Both incidents highlighted critical vulnerabilities in Oracle's infrastructure and the importance of timely detection and response. The aftermath included a class action lawsuit and ongoing investigations, emphasizing the need for robust cybersecurity measures and transparency in handling breaches.

Catch the Video: https://youtu.be/YWAmzPmG0YM

Takeaways

• Oracle was breached twice in early 2025, raising alarms.

• The first breach compromised healthcare data via outdated servers.

• The second breach involved an inactive legacy system.

• Hackers exploited known vulnerabilities to gain access.

• Delayed detection allowed unauthorized access for weeks.

• Oracle's response included denying the breaches initially.

• A class action lawsuit was filed against Oracle for negligence.

• Legacy systems pose significant security risks if not decommissioned.

• Timely detection and monitoring are crucial for cybersecurity.

• Organizations must prioritize patch management and system updates.

Send us a text

Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode!
Follow Us:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  continue reading

Chapters

1. Introduction to the Oracle Breaches (00:00:00)

2. Overview of the Breaches and Their Impact (00:03:10)

3. How Cloud Gets Breached (00:05:15)

4. How Hackers Attack (00:08:20)

5. Oracle's Response and Denial (00:12:05)

6. Legal Implications and Class Action Lawsuit (00:15:09)

7. Cloud Risks For Business (00:18:50)

8. Final Thoughts on Cybersecurity and Legacy Systems (00:26:44)

247 episodes

Artwork
iconShare
 
Manage episode 477812556 series 3559123
Content provided by Cyber Crime Junkies. Host David Mauro.. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Cyber Crime Junkies. Host David Mauro. or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.

In early 2025, Oracle faced two significant cybersecurity breaches that exposed sensitive data and raised serious concerns about its security practices. The first breach involved outdated Cerner servers, compromising healthcare data, while the second targeted an inactive legacy system, leading to the theft of client credentials. Both incidents highlighted critical vulnerabilities in Oracle's infrastructure and the importance of timely detection and response. The aftermath included a class action lawsuit and ongoing investigations, emphasizing the need for robust cybersecurity measures and transparency in handling breaches.

Catch the Video: https://youtu.be/YWAmzPmG0YM

Takeaways

• Oracle was breached twice in early 2025, raising alarms.

• The first breach compromised healthcare data via outdated servers.

• The second breach involved an inactive legacy system.

• Hackers exploited known vulnerabilities to gain access.

• Delayed detection allowed unauthorized access for weeks.

• Oracle's response included denying the breaches initially.

• A class action lawsuit was filed against Oracle for negligence.

• Legacy systems pose significant security risks if not decommissioned.

• Timely detection and monitoring are crucial for cybersecurity.

• Organizations must prioritize patch management and system updates.

Send us a text

Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode!
Follow Us:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  continue reading

Chapters

1. Introduction to the Oracle Breaches (00:00:00)

2. Overview of the Breaches and Their Impact (00:03:10)

3. How Cloud Gets Breached (00:05:15)

4. How Hackers Attack (00:08:20)

5. Oracle's Response and Denial (00:12:05)

6. Legal Implications and Class Action Lawsuit (00:15:09)

7. Cloud Risks For Business (00:18:50)

8. Final Thoughts on Cybersecurity and Legacy Systems (00:26:44)

247 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Listen to this show while you explore
Play