Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Oracle Cloud Breach? Hacker Claims 6M Records & 140K Tenants at Risk - Foresiet Research vs. Oracle's Denial

On March 20, 2025, a threat actor known as Rose87168 posted on the dark web, claiming to be selling breached Oracle Cloud Traditional servers along with approximately 6 million exfiltrated user records. The hacker did not mention the price for the stolen data. He alleged that critical information, including SSO (Single Sign-On) and LDAP credentials, Java Keystore (JKS) files, passwords, and authentication keys, was stolen from Oracle’s login infrastructure.

Trustwave SpiderLabs Threat Review: Alleged Oracle Compromise

On March 20, a relatively unknown user on Breach Forums posted the allegation that Oracle had suffered a data breach. According to published reports, the attacker claimed that 6 million customer records were exfiltrated from Oracle's SSO and LDAP systems. The threat actor behind the post is allegedly offering to sell the data, providing multiple purchasing options based on company name, hashed credentials, and other sensitive information.

GitHub Action Supply Chain Attack (CVE-2025-30066)

On March 14, 2025, a critical supply chain attack targeted the widely used GitHub Action tj-actions/changed-files. This action, utilized in over 23,000 repositories, was compromised when attackers injected malicious code, causing CI/CD pipeline secrets to be exposed in GitHub Actions logs. This breach raised serious concerns regarding the security of GitHub Actions and the importance of implementing robust security measures in CI/CD workflows.

We're Honored: 11:11 Systems Earns 5-Star Rating in CRN Partner Program Guide - Again!

We’re excited to share that 11:11 Systems has once again earned a prestigious 5-Star Rating in the CRN Partner Program Guide—marking our eighth consecutive year! This recognition highlights our commitment to helping partners grow with the right tools, training, and support to navigate today’s complex IT landscape.

How Often Should You Review Privileged Access?

Depending on the size of your organization, its needs, industry regulations and security risks, how often you review privileged access can vary. However, a best practice for most organizations is to review privileged access quarterly to maintain a strong security posture. Continue reading to learn more about the importance of reviewing privileged access regularly, best practices and how KeeperPAM streamlines privileged access reviews.

Random but Memorable - Episode 14.5: Triple Hollywood Movie Sabotage with Ralph Echemendia

Why does Hollywood get hacking wrong in so many movies and TV series? In this episode, we invite Ralph Echemendia to share his wild stories of working as a technical supervisor in Hollywood, on award-winning projects like Mr. Robot, Snowden, Savages, and Nerve. We also shine a spotlight on the work Ralph is doing to help the world’s most influential record labels and movie studios protect what they’re working on.