Logitech confirms a third-party data breach after Cl0p ransomware, which is infamous for exploiting Oracle’s E-Business Suite ...
A new partnership between UK-based Oracle consultancy Mokum and document management software vendor Version One (news, site) means that Oracle Financials clients will be able to access Version One ...
Oracle today in its Critical Patch Update addressed a critical vulnerability in its Oracle E-Business Suite of business applications that allows for the download of business documents. Oracle admins ...
Mandiant and Google are tracking a new extortion campaign where executives at multiple companies received emails claiming that sensitive data was stolen from their Oracle E-Business Suite systems.
Ransomware extortion attempts targeting users of Oracle's E-Business Suite were recently made public. The attackers' entry point: the critically rated zero-day security vulnerability CVE-2025-61882 ...
LAS VEGAS--(BUSINESS WIRE)--Organizations can discover how to harness the power of Microsoft Excel and Oracle E-Business Suite at the Oracle Applications Users Group (OAUG) Collaborate 15 conference, ...
Following reports that the cybercriminal group Clop has been extorting E-Business Suite customers, Oracle linked the campaign to vulnerabilities addressed in July. The data extortion campaign ...
Oracle has confirmed that customers using its E-Business Suite of products have received extortion emails. The California-based tech company said that hackers may have exploited previously known ...
Oracle Corp. has once again altered the pricing terms for its E-Business Suite 11i applications, this time with the hope of attracting more small and medium-size businesses to the product. Effective ...
Oracle Corp. warned today of two serious security vulnerabilities in its E-Business Suite product. If left unattended, the software vulnerabilities could enable an attacker to run malicious code on an ...
Oracle released its first batch of security patches this year, fixing 270 vulnerabilities, mostly in business-critical applications. Many of the flaws can be exploited remotely without authentication.