AI
AI

Oracle Acknowledges Data Breach Following Lawsuit Alleging Cover-Up

Photo credit: www.csoonline.com

Cloud Security Breach Raises Alarms Among Experts

Recent revelations of a significant data breach have sparked serious concerns regarding the integrity of cloud security frameworks. Security professionals contend that this incident challenges the foundational promise of cloud services—that of tenant isolation and breach containment. “Cloud customers were engaged on a bedrock security promise: tenant isolation and segregation contain breaches,” stated Sunil Varkey, an advisor at Beagle Security. He noted that a single breach led to the exposure of approximately 6 million records spanning 140,000 clients, with the provider reportedly unaware of the vulnerability until it was too late, thus undermining the perceived security landscape.

Varkey elaborated on the implications of the breach, describing a “watering hole” effect. He explained that “A breached SSO endpoint with a master key isn’t just a data grab; it’s a perfect watering hole. Every tenant logging in, from global enterprises to SMBs, becomes prey. The hacker doesn’t chase them; they come to the trap.” This highlights how a compromised access point can place an entire ecosystem of clients at risk, transforming individual users into targets unwittingly.

The breach was initially reported by CloudSEK, a notable threat intelligence organization, which uncovered that a hacker was marketing the stolen six million records. The compromised data reportedly originated from Oracle Cloud’s Single Sign-On (SSO) and Lightweight Directory Access Protocol (LDAP) systems. Security analysts have traced the breach back to CVE-2021-35587, a vulnerability previously identified in Oracle Access Manager. This flaw had earlier been flagged by the Cybersecurity and Infrastructure Security Agency (CISA) as an exploited weakness, raising further alarms regarding the need for robust security measures within cloud services.

This incident serves as a stark reminder of the vulnerabilities that can exist within cloud environments, even concerning established companies. As businesses increasingly rely on cloud infrastructure for their operations and sensitive data storage, the need for vigilant security practices has never been more pronounced.

Source
www.csoonline.com

Related by category

Palo Alto Networks Acquires Protect AI to Enhance AI Security Platform

Photo credit: www.networkworld.com Palo Alto Networks to Acquire AI Security...

Google Warns of Increasing Enterprise-Specific Zero-Day Exploits

Photo credit: www.csoonline.com The Evolving Landscape of Mobile Security Vulnerabilities Recent...

Cybersecurity Leaders Condemn ‘Political Persecution’ of Chris Krebs in Letter to the President

Photo credit: www.csoonline.com In November 2018, President Trump appointed Chris...

Latest news

Is it Wise to Delay Claiming Social Security? Insights from Experts

Photo credit: www.cnbc.com Concerns regarding the future viability of the...

Town Stands Firm on Native American Mascot for School, Gains Trump’s Endorsement

Photo credit: abcnews.go.com Massapequa's Hockey Team Name Sparks Debate on...

Breaking news