In partnership with

⏱️ ≈ 7-minute read

Editor’s Note: Today we’ve got Oracle facing extortionists, a government shutdown gutting CISA at the worst possible time, and AI phishing campaigns getting way too clever for comfort. Oh, and hackers raided a UK nursery chain and then apologized. Buckle up.

📬 This Week’s Clickables

  • 📌 Big News: Oracle extortion mess, GoAnywhere zero-day exploited

  • 🚨 Can’t Miss: CISA gutted by shutdown, ransomware spikes in manufacturing, Salesforce/Drift mega-breach, DPRK job lure malware

  • 🤖 AI in Cyber: AI phishing, board vs. SOC risk gap, LOTL surge, global forum debates AI & quantum

  • 🧪 Strange Cyber Story: Hackers say sorry after raiding nurseries

🚨 Big Stories

💾 Oracle confirms extortion campaign targeting its E-Business Suite users

Intro: Enterprises running Oracle’s ERP backbone are suddenly finding themselves in a nasty new extortion scheme.
What Happened: Oracle says hackers have stolen data from its EBS software platform and are targeting customers with extortion demands. Attackers are skipping ransomware encryption altogether and going straight for “pay or we leak.”
Why It’s Important: Oracle’s enterprise software sits at the heart of global supply chains and finance ops. A compromise here means attackers get high-value data with direct leverage over Fortune 500s.
The Other Side: Oracle insists its systems weren’t directly compromised, framing it as an issue impacting customers’ implementations — classic “not our problem” positioning.
👉 Takeaway: The attack shows that extortion is evolving beyond ransomware. Data theft alone is enough leverage if the target is strategic.
TL;DR: Oracle customers are being squeezed by extortionists. Is this the future of “ransomware-less” ransomware?

Further Reading: Reuters

In 2000, a 15-year-old hacker named “Mafiaboy” took down Yahoo!, eBay, CNN, and Dell with a simple DDoS attack — costing companies an estimated $1.7 billion in damages. (Source: FBI archives)

Become An AI Expert In Just 5 Minutes

If you’re a decision maker at your company, you need to be on the bleeding edge of, well, everything. But before you go signing up for seminars, conferences, lunch ‘n learns, and all that jazz, just know there’s a far better (and simpler) way: Subscribing to The Deep View.

This daily newsletter condenses everything you need to know about the latest and greatest AI developments into a 5-minute read. Squeeze it into your morning coffee break and before you know it, you’ll be an expert too.

Subscribe right here. It’s totally free, wildly informative, and trusted by 600,000+ readers at Google, Meta, Microsoft, and beyond.

🛠️ Critical zero-day in GoAnywhere MFT being actively exploited

Intro: Remember when GoAnywhere was last year’s Clop playground? Yeah… it’s back.
What Happened: Fortra’s GoAnywhere MFT is in the crosshairs again, with a 10/10 severity zero-day (CVE-2025-10035) already under active exploitation. The bug allows remote command injection and full compromise of managed file transfer servers.
Why It’s Important: GoAnywhere has a history of being ransomware gangs’ favorite playground. This new zero-day threatens thousands of enterprises moving sensitive data.
The Other Side: Patches are live, but if history repeats, expect mass exploitation of laggards who don’t patch fast enough.
👉 Takeaway: This is another reminder that “secure file transfer” is an oxymoron when attackers have the exploit first.
TL;DR: A GoAnywhere zero-day is getting hammered. Did anyone actually patch after last year’s Clop fiasco?

Further Reading: TechRadar

🔥 Can’t Miss

The #1 platform for newsletters. Period.

beehiiv is the one platform that does everything for your newsletter. And they do mean everything:

  • A newsletter editor that makes your words shine like they belong on a bestseller list

  • A no-code website builder that doubles as your 24/7 subscriber magnet

  • Revenue tools that make earning money so easy it feels like cheating: ads, referrals, and paid subs

If you’ve got a newsletter (or even just the idea for one), beehiiv is the ultimate no-brainer.

🤖 AI in Cyber

🧟‍♂️ Strange Cyber

🍼 Hackers raid UK nursery chain, “apologize” after stealing data

Intro: You know you’re in strange territory when hackers say “sorry” after a breach.
What Happened: Hackers breached Kido Schools, stealing photos and sensitive records of children. Then, bizarrely, they issued a public “apology” and claimed to delete everything.
Why It’s Important: Even if true, the precedent is chilling — criminals framing themselves as ethical actors after committing the crime.
The Other Side: Security experts point out that “we deleted it, promise” is about as trustworthy as a Nigerian prince email.
👉 Takeaway: There’s no “ethical hacker” badge for stealing kids’ data — just a reminder that attackers will say anything to soften blowback.
TL;DR: Hackers hit a nursery chain, then said sorry. Does remorse count in cybercrime, or is this just villain cosplay?

Further Reading: Washington Post

Thanks for reading this week’s edition. Like what you see? Forward it!

Hate everything you see or have other feedback? Reply back to this email!

Keep Reading

No posts found