Tech
Laid-off Oracle workers tried to negotiate better severance. Oracle said no.
As was widely reported, Oracle axed an estimated 20,000 to 30,000 people via email on March 31.
One of the employees cut that day told TechCrunch about the experience: “I had, like, this weird feeling in my stomach. I went to go sign into the VPN, and the VPN was like, ‘this user doesn’t exist anymore.’ Then I called my friend, and I was like, ‘Hey, can you see me in Slack?’ And she said, ‘No, your account’s been deactivated.’”
The person soon received an email stating their role was terminated immediately. The severance offer arrived a few days later. But Oracle’s terms would quickly become a point of contention — and some laid-off employees would push back.
Oracle offered fairly standard Corporate America terms to laid off employees. In exchange for signing a release waiving their right to sue, employees received four weeks of pay for the first year, plus one additional week per year of service, capped at 26 weeks. The company was also paying for one month of COBRA insurance.
The catch: Although stock compensation often makes up a good chunk of a tech worker’s pay, particularly at Oracle, the company did not accelerate soon-to-vest RSUs. Any shares that hadn’t vested by the termination date were forfeited.
That held true even for stock granted as retention incentives or in place of salary increases tied to promotions. One long-tenured employee lost $1 million in stock that was just four months from vesting; RSUs made up about 70% of his compensation, Time reported.
Some employees also discovered that if they were classified as remote workers by the company, and didn’t work in a state with stronger worker provisions like California or New York, the company said they didn’t qualify for WARN Act protections.
Techcrunch event
San Francisco, CA
|
October 13-15, 2026
The WARN Act is a law that requires companies conducting mass layoffs to give employees two months notice prior to letting them go. It’s triggered when 50 or more people are impacted at one location. By classifying employees as remote workers, the minimum location requirements can be sidestepped.
Some people were unaware they were classified as remote workers, because they were near an office and worked on a hybrid schedule.
Even if they were covered by the WARN Act, this did not necessarily extend severance, the former Oracle employee said. That’s because Oracle included the two-months’ WARN notice pay in its existing calculation of four-weeks, plus one week per year.
For a short time, a group of employees tried to negotiate en masse with Oracle, according to a letter seen by TechCrunch. At least 90 people signed a public petition urging the database and cloud computing giant to match the terms of other big tech companies conducting mass layoffs in the name of AI.
For instance, Meta’s severance package, according to an email published by Business Insider, started at 16 weeks of base pay, plus two weeks for every year of employment and covered COBRA for 18 months.
Microsoft, which extended voluntary retirement offers to long-serving employees, provided accelerated stock vesting, a minimum of eight weeks’ pay, and an additional one to two weeks for every six months of service, depending on rank, the Seattle Times reported.
And Cloudflare, which just cut 20% of its employees, offered lump sum severance that was the equivalent of base pay through the end of 2026, plus healthcare coverage through the end of the year, and accelerated vesting of stock through August 15. So if an employee was close to obtaining another tranche, they will get it.
Oracle declined to negotiate, according to an email seen by TechCrunch. It was a take-it-or-leave scenario, the employee said.
When asked about its severance terms, classifying employees as remote, and the failed attempt by employees to negotiate more, Oracle declined to comment.
Such a reaction from the company isn’t a surprise, not even to those who hoped to negotiate. But it does underscore that for all the theoretical high pay (often via stocks) and perks that tech workers enjoy when it’s an employees’ market, they have very few protections in place when it isn’t.
When you purchase through links in our articles, we may earn a small commission. This doesn’t affect our editorial independence.
Tech
The fax machine is the bottleneck in US healthcare, and VCs are starting to notice
Like many AI companies automating work that humans currently do, Basata will eventually face a harder question about where the line is between augmenting workers and displacing them. For now, the founders say the administrative staff they work with aren’t worried about that; they’re more worried about drowning.
source
Tech
US defense contractor who sold hacking tools to Russian broker ordered to pay $10M to former employers
Peter Williams, a veteran cybersecurity executive who was the head of the hacking and surveillance tech division of U.S. defense contractor L3Harris, has been ordered to pay $10 million to his former employer. Williams was the central figure in one of the worst leaks of advanced hacking tools in the history of the United States and its closest allies.
On Wednesday, a judge ordered Williams to pay that amount in restitution on top of the $1.3 million he had already been ordered to pay to L3Harris. Williams, a 39-year-old Australian citizen who previously worked in one of Australia’s intelligence agencies, was until last year the general manager of Trenchant. Born out of the acquisition of two sister startups, Trenchant is L3Harris’ division that develops advanced spyware and hacking tools and sells them to the U.S. government and its allies in the Five Eyes intelligence alliance, a coalition of five English-speaking nations that share classified intelligence with one another. In addition to the U.S., the alliance includes Australia, Canada, New Zealand, and the United Kingdom.
Veteran cybersecurity reporter Kim Zetter first reported the new order to pay restitution in her newsletter.
Williams’ lawyers did not respond to a request for comment.
Last year, Williams was arrested and accused of stealing seven unspecified trade secrets — almost certainly cyber exploits, which is code that hijacks software vulnerabilities, and surveillance technology — from Trenchant and then selling them to Operation Zero. The Russian firm acts as a broker, buying and selling hacking tools, and it says it works exclusively with the Russian government and local companies.
Williams pleaded guilty and was sentenced to more than seven years in prison.
Williams made $1.3 million selling the trade secrets, which he used to buy luxury watches, a house near Washington, D.C., and family vacations. Trenchant told prosecutors that it suffered losses of up to $35 million due to Williams’ theft.
Techcrunch event
San Francisco, CA
|
October 13-15, 2026
U.S. prosecutors said Williams “betrayed” the United States and its allies by giving Operation Zero, which the U.S. government calls “one of the world’s most nefarious exploit brokers,” tools that could have been used to hack “millions of computers and devices around the world.”
As TechCrunch previously reported, Williams took advantage of his privileged “full access” to Trenchant’s internal network to siphon the tools out of the company’s offices. After Williams sold the hacking tools to Operation Zero, some of them ended up being used by Russian government spies in Ukraine, and later Chinese cybercriminals, according to former L3Harris employees who recognized the stolen code in cybersecurity research that Google published after investigating the cyberattacks in which those tools were deployed.
Williams also tried to frame one of his employees for the theft.
When you purchase through links in our articles, we may earn a small commission. This doesn’t affect our editorial independence.
Tech
Poland says hackers breached water treatment plants, and the US is facing the same threat
Poland’s intelligence service said it detected attacks on five water treatment plants where hackers could have taken control of the industrial equipment inside, including, in the worst case, tampering with the safety of the water supply.
The story is relevant beyond Poland’s borders: U.S. water infrastructure has faced similar threats in recent years. In 2021, a hacker briefly gained access to a water treatment plant in Oldsmar, Florida and attempted to increase the level of sodium hydroxide — a caustic chemical — to dangerous levels. The FBI and the U.S. Cybersecurity and Infrastructure Security Agency have since warned that water utilities remain a soft target for foreign hackers.
On Friday, Poland’s Internal Security Agency, the country’s top intelligence agency, published a report covering the last two years of the agency’s operations and threats the country faced. The report said Polish intelligence thwarted multiple acts of sabotage from Russian government spies and hackers, who targeted military facilities, critical infrastructure (essential systems such as power grids, water supplies, and transportation networks), as well as civilian targets. These attacks, according to the report, may have resulted in fatalities.
“The most serious challenge remains the sabotage activity against Poland, inspired and organized by Russian intelligence services. This threat was (and is) real and immediate. It requires full mobilization,” read the report.
The report did not specify whether the hackers behind the attacks on the water treatment facilities were Russian government spies. But Poland has recently been the target of several attempts by Russian government hackers to attack its infrastructure, including a failed attempt to bring down the country’s energy grid. That breach was later attributed to poor security controls at the targeted facilities.
Poland’s experience is part of a growing global pattern of attacks on water and energy infrastructure. As recently as last month, a joint advisory from the Cybersecurity and Infrastructure Security Agency, the FBI, the NSA, and several other federal agencies warned that Iranian-backed hackers are actively targeting programmable logic controllers — the industrial computers that run water and energy facilities — at U.S. utilities. The same Iranian hacking group, CyberAv3ngers, previously broke into digital control panels at multiple U.S. water treatment plants in Pennsylvania in 2023, in attacks that federal agencies linked to escalating hostilities in the Middle East.
In other words, the attacks against Poland are not unique, they follow a strategy that the Russian government is applying both in war zones such as Ukraine, as well as against Western countries that it sees as longstanding enemies. The plan, according to Polish intelligence, is to destabilize and weaken the West, and cyberattacks and cyberespionage are just tools in a larger toolkit for Putin’s regime.
Techcrunch event
San Francisco, CA
|
October 13-15, 2026
When you purchase through links in our articles, we may earn a small commission. This doesn’t affect our editorial independence.
