Advisory
Hospitals That Are Oracle Customers Urged to Take Immediate Action to Address Security Vulnerability
The attack traffic originates from many sources, not from a single one that could easily be blocked. Frequently leverages botnets. The attack prevents the user access or degrades the access beyond acceptable limits. The attack could be against any layer, or combination of layers, of the systems, ranging from initial access to the system to the functionality of the application.