Most of Oracle’s databases have been identified with a serious vulnerability in the authentication protocol. This type of vulnerability allows a remote attacker to brute-force a token provided by the server prior to authentication. http://alrt.co/Unkltm
Takeaway: Vulnerabilities for most well-known software are found almost every day. The key to securing your information is staying on top of what the zero-day hack is and how to identify if these events are happening in your environment. A good IDS with a trained security specialists can do just that.