Oracle issued emergency fixes for two pre-auth issues targeting EBS: a BI Publisher Integration RCE (61882) exploited in August data-theft extortion attributed to Cl0p, and an Oracle Configurator SSRF (61884) linked to a leaked exploit and confirmed by CISA as actively exploited. Integrigy notes additional MOS patches and configuration hardening updates beyond the initial alert.
Following disclosure that a nation-state actor stole portions of BIG-IP source code and undisclosed vulnerability information, CISA mandated federal agencies inventory and update F5 products by strict October deadlines, harden public interfaces, and disconnect end-of-support devices. External analyses describe significant enterprise risk given BIG-IP’s position at the network edge.
Independent modeling by the UK Cyber Monitoring Centre estimates the JLR cyberattack’s UK economic impact at ~£1.9B, affecting over 5,000 organizations through supply-chain disruption; production restarts remained phased through October. Government support included a £1.5B loan guarantee to stabilize suppliers.
KnowBe4’s early-2025 data shows 82.6% of phishing emails exhibited some use of AI, with a rise in polymorphic campaigns and ransomware payloads; top abused platforms for lures include Microsoft, DocuSign, Google, PayPal, and Salesforce.
🗂️Resources & References