Thousands of Korean Air employees exposed in Oracle breach

Korean Air, a major South Korean airline, has been affected by a supply-chain attack originating from Oracle, resulting in the exposure of thousands of its employees' information. The incident highlights vulnerabilities in third-party software services. Details emerged in a recent security report.

The breach at Korean Air came to light through a supply-chain attack tied to Oracle, a prominent software provider. According to reports, this cyber incident compromised sensitive data belonging to thousands of the airline's employees.

Supply-chain attacks, where hackers infiltrate a trusted vendor to reach multiple clients, have become a growing concern in the tech and aviation sectors. In this case, Oracle's systems appear to have been the entry point, allowing unauthorized access to Korean Air's employee records.

While specific details on the type of data exposed—such as personal identifiers or professional details—remain limited, the scale of the compromise underscores the risks airlines face in relying on external cloud and database services. Korean Air has not yet issued an official statement on the matter, but the event serves as a reminder of the need for robust cybersecurity measures across interconnected business ecosystems.

Experts note that such breaches can lead to identity theft, financial losses, and reputational damage for affected organizations. As investigations continue, the incident may prompt stricter audits of software suppliers in the aviation industry.

Связанные статьи

Dramatic illustration depicting the Coupang data breach, with data spilling from a cracked digital vault and investigators on scene.
Изображение, созданное ИИ

Coupang data breach spanned June to November

Сообщено ИИ Изображение, созданное ИИ

A massive data breach at e-commerce giant Coupang exposed personal information of 33.7 million customers from June 24 to November 8. Officials revealed the attacker exploited the company's electronic signature key, prompting a thorough government investigation. The incident has heightened public concerns over South Korea's data protection capabilities.

A massive data breach in China has reportedly spilled 8.7 billion records after a gigantic database was left unlocked on the internet. The incident, detailed in recent reports, highlights vulnerabilities in data security practices. Authorities are yet to confirm the full extent of the exposure.

Сообщено ИИ

Hong Kong's Correctional Services Department revealed that a hacker illegally accessed its IT system on Tuesday, compromising personal data of 6,800 current and former employees. The department stated there is no evidence of data leakage so far and has notified affected individuals.

Emails of US congressional staff have been hacked as part of the Salt Typhoon campaign attributed to Chinese hackers. The incident marks another appearance by these notorious actors in targeting sensitive communications. The breach was reported on January 8, 2026.

Сообщено ИИ

Chinese authorities have instructed domestic companies to stop using cybersecurity software from more than a dozen US and Israeli firms due to national security concerns. The directive supports Beijing's drive to replace Western technology with homegrown alternatives amid intensifying tech competition with the United States. Three sources familiar with the matter said the notice was issued in recent days.

Researchers analyzing 10 million web pages have identified 1,748 active API credentials from 14 major providers exposed across nearly 10,000 websites, including those run by banks and healthcare providers. These leaks could enable attackers to access sensitive data or gain control over digital infrastructure. Nurullah Demir of Stanford University described the issue as very significant, affecting even major companies.

Сообщено ИИ

Russian state-sponsored hackers quickly weaponized a newly patched Microsoft Office flaw to target organizations in nine countries. The group, known as APT28, used spear-phishing emails to install stealthy backdoors in diplomatic, defense, and transport entities. Security researchers at Trellix attributed the attacks with high confidence to this notorious cyber espionage unit.

 

 

 

Этот сайт использует куки

Мы используем куки для анализа, чтобы улучшить наш сайт. Прочитайте нашу политику конфиденциальности для дополнительной информации.
Отклонить