#OracleHealth

AdwaitXAdwaitx
2026-02-03

Oracle Health Clinical AI Agent now drafts labs, meds, and follow-up orders while it listens to your visit. How this shift cuts clicks and burnout risk for doctors. Read the full breakdown
adwaitx.com/oracle-health-clin

Defensorumdefensorum
2026-01-06

🏥 breach potentially affects 80 hospitals nationwide 📊 Multiple healthcare systems confirm patient data theft 💳 SSNs, diagnoses, and medical images compromised ⚠️ 11-month notification delay raises compliance concerns 👉 defensorum.com/oracle-health-d

Tecnoblog • tecnologia que interessatecnoblog.net@web.brid.gy
2025-03-31
<figure class="wp-block-image size-large wp-lightbox-container"><img alt="Logotipo da Oracle em um palco" class="wp-image-248058" height="596" src="https://files.tecnoblog.net/wp-content/uploads/2018/06/oracle-openworld-brasil-2018-logo-1060x596.jpg" width="1060" /><button class="lightbox-trigger" type="button">
			<svg fill="none" height="12" viewBox="0 0 12 12" width="12" xmlns="http://www.w3.org/2000/svg">
				<path d="M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z" fill="#fff">
			</svg>
		</button><figcaption class="wp-element-caption">Oracle afirma que não comenta casos, mas enviou email a clientes do Oracle Health sobre roubo de dados (foto: Paulo Higa/Tecnoblog)</figcaption></figure>



<p>A Oracle pode ter sofrido dois vazamentos de dados nas últimas semanas, aponta o site <em>Bleeping Computer</em>. O site teve acesso a dados publicados em um fórum hacker, no qual o autor da publicação afirma ter roubado seis milhões de informações ligadas ao serviço da Oracle Cloud. Já na sexta-feira, outro vazamento teria roubado dois milhões de dados de clientes da Oracle Health, divisão da empresa para o atendimento de hospitais.</p>



<p>A <a href="https://tecnoblog.net/sobre/oracle/">Oracle</a> nega que tenha havido vazamento de dados da Cloud, ainda que o <em>Bleeping Computer</em> tenha recebido os emails de login
Brian Greenberg :verified:brian_greenberg@infosec.exchange
2025-03-31

🛑 Oracle Health Breach: What IT Leaders Must Learn

Multiple U.S. hospitals are facing a nightmare: EHR data stolen from legacy Cerner servers still awaiting cloud migration.

🔐 Attack vector: Compromised customer credentials
⚠️ Impact: Multi-org data theft, extortion attempts, and HIPAA compliance chaos
🧾 Oracle told hospitals:
・They must notify patients
・They must assess HIPAA exposure
・Oracle won’t send official notifications—just paper memos

The response strategy—avoiding emails, no formal breach announcement—has left healthcare IT teams frustrated and exposed.

This incident reinforces the importance of:
・Decommissioning legacy systems
・Zero-trust access controls across shared vendor infrastructure
・Clear contractual breach notification roles

👉 bleepingcomputer.com/news/secu

#CyberSecurity #HealthcareIT #OracleHealth #HIPAA #IncidentResponse #ITLeadership

2025-03-30

#OracleHealth has revealed they were victim of a #databreach

In a breach notification to affected customers, Oracle Health said it became aware of a breach of its servers on Feb 20, 2025. The attackers exfiltrated data to a remote server, and sources say it includes patient data. Impacted hospitals are now being extorted for millions of dollars in cryptocurrency.

Impacted patients are advised to be vigilant of phishing, and to monitor their credit

#cybersecurity

bleepingcomputer.com/news/secu

2025-03-29

#OracleHealth #breach compromises patient data at US #hospitals

A breach at #Oracle Health impacts multiple US #healthcare organizations and hospitals after a threat actor stole patient data from legacy servers.

Oracle Health has not yet publicly disclosed the incident, but in private communications sent to impacted customers and from conversations with those involved, BleepingComputer confirmed that patient data was stolen in the attack
#privacy

bleepingcomputer.com/news/secu

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst