Third-Party Risk & Vendor Risk Management

Legal Fallout Mounts with Class Action Lawsuit Filed Over Oracle Data Breach

Description

On March 21, 2025, a security research team identified a threat actor who claimed to possess millions of data lines tied to over 140,000 Oracle Cloud tenants. The breach took place in January of 2025 and was facilitated through a Java vulnerability that allowed the attacker to deploy malware targeting Oracle’s Identity Manager database. The attacker was then able to exfiltrate authentication information including usernames, (more…)

NY AG’s Lawsuit A Wake-Up Call for Insurance Companies

Description

The New York Attorney filed a lawsuit against multiple insurance companies that allegedly failed to protect the personal information of New York drivers from being compromised in cyberattacks. The timeline of the events involving the breach incidents is as follows:

  • August 2020 – The first attack against the National General insurance company
  • October 2020 – A second attack takes place
  • November 2020 – The (more…)

Class Action Lawsuits Emerge Following Large Job Applicant Data Breach

Description

DISA Global Solutions provides comprehensive background checks and drug testing services that help employers maintain workplace safety, ensure regulatory compliance, and manage risk through pre-employment screening programs and ongoing workforce monitoring solutions. On April 22, 2024, DISA detected a cyber incident within its network. They launched an immediate probe that determined that an unauthorized actor had gained access between February 9, 2024, and April 22, (more…)

Navigating Cyber Risk Management Options in the Modern Era


Every business inherently faces some degree of risk. It is, ironically, an essential component of success. Establishing a digital presence offers numerous opportunities but also introduces significant risks. While it would be ideal for best-of-breed cybersecurity tools to halt all cyberattacks, such an expectation is currently unrealistic. The objective then is to implement cyber (more…)

Go to Top