Thousands of Korean Air employees exposed in Oracle breach

Korean Air, a major South Korean airline, has been affected by a supply-chain attack originating from Oracle, resulting in the exposure of thousands of its employees' information. The incident highlights vulnerabilities in third-party software services. Details emerged in a recent security report.

The breach at Korean Air came to light through a supply-chain attack tied to Oracle, a prominent software provider. According to reports, this cyber incident compromised sensitive data belonging to thousands of the airline's employees.

Supply-chain attacks, where hackers infiltrate a trusted vendor to reach multiple clients, have become a growing concern in the tech and aviation sectors. In this case, Oracle's systems appear to have been the entry point, allowing unauthorized access to Korean Air's employee records.

While specific details on the type of data exposed—such as personal identifiers or professional details—remain limited, the scale of the compromise underscores the risks airlines face in relying on external cloud and database services. Korean Air has not yet issued an official statement on the matter, but the event serves as a reminder of the need for robust cybersecurity measures across interconnected business ecosystems.

Experts note that such breaches can lead to identity theft, financial losses, and reputational damage for affected organizations. As investigations continue, the incident may prompt stricter audits of software suppliers in the aviation industry.

Mga Kaugnay na Artikulo

Dramatic illustration depicting the Coupang data breach, with data spilling from a cracked digital vault and investigators on scene.
Larawang ginawa ng AI

Coupang data breach spanned June to November

Iniulat ng AI Larawang ginawa ng AI

A massive data breach at e-commerce giant Coupang exposed personal information of 33.7 million customers from June 24 to November 8. Officials revealed the attacker exploited the company's electronic signature key, prompting a thorough government investigation. The incident has heightened public concerns over South Korea's data protection capabilities.

A massive data breach in China has reportedly spilled 8.7 billion records after a gigantic database was left unlocked on the internet. The incident, detailed in recent reports, highlights vulnerabilities in data security practices. Authorities are yet to confirm the full extent of the exposure.

Iniulat ng AI

Hong Kong's Correctional Services Department revealed that a hacker illegally accessed its IT system on Tuesday, compromising personal data of 6,800 current and former employees. The department stated there is no evidence of data leakage so far and has notified affected individuals.

Emails of US congressional staff have been hacked as part of the Salt Typhoon campaign attributed to Chinese hackers. The incident marks another appearance by these notorious actors in targeting sensitive communications. The breach was reported on January 8, 2026.

Iniulat ng AI

Inutusan ng mga awtoridad ng China ang mga lokal na kumpanya na itigil ang paggamit ng software ng cybersecurity mula sa higit kumulang labindalawang firm mula sa US at Israel dahil sa alalahanin sa seguridad pambansa. Ito ay bahagi ng pagsisikap ng Beijing na palitan ang teknolohiyang Kanluranin ng mga alternatibong lokal habang nagpapakita ng tensyon sa teknolohiya laban sa Estados Unidos. Ayon sa tatlong source na pamilyar sa usapan, inilabas ang direktiba kamakailan.

Researchers analyzing 10 million web pages have identified 1,748 active API credentials from 14 major providers exposed across nearly 10,000 websites, including those run by banks and healthcare providers. These leaks could enable attackers to access sensitive data or gain control over digital infrastructure. Nurullah Demir of Stanford University described the issue as very significant, affecting even major companies.

Iniulat ng AI

Russian state-sponsored hackers quickly weaponized a newly patched Microsoft Office flaw to target organizations in nine countries. The group, known as APT28, used spear-phishing emails to install stealthy backdoors in diplomatic, defense, and transport entities. Security researchers at Trellix attributed the attacks with high confidence to this notorious cyber espionage unit.

 

 

 

Gumagamit ng cookies ang website na ito

Gumagamit kami ng cookies para sa analytics upang mapabuti ang aming site. Basahin ang aming patakaran sa privacy para sa higit pang impormasyon.
Tanggihan