Protecting Government

SecuLore has pioneered the art of cybersecurity for Government organizations.

According to sources, State of Alabama (a Government organization in Alabama) was hit with a cyber attack. It was first reported on 2025-05-13.

If You're in Alabama, You're at Increased Risk

Cybersecurity for Government

Manage your organization’s attack surface with SecuLore’s 24/7 network monitoring services.

  • 24/7 Threat Monitoring

  • Automated & AI Threat Detection

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis

Source 1  |  2025-05-13

Alabama state employees’ usernames and passwords compromised in ‘cybersecurity event’

“ According to the Alabama governor’s office, a “cybersecurity event” was discovered Friday night.“

“It stated the passwords and usernames of some state employees were compromised. The state of Alabama’s Office of Information Technology stated Monday it is working to minimize any potential impacts to state operations. “

“A release from the governor’s office reminded state employees to look out for malicious emails. Amanda Senn, director of the Alabama Securities Commission, could not speak directly about what happened but offered insight on cybersecurity and data breaches. Senn said there’s a difference between a cyber “event” and a cyber “breach.” “

Guarding Against Hacking

  • October 25, 2017

    Hackers Gone Wild: How Cybercriminals Impact 9-1-1 Systems

  • November 11, 2020

    4 Year Anniversary – Twitter TDoS Attack

  • October 14, 2020

    Incidents from the Trenches

  • July 8, 2020

    The Vicious Evolution of Cyber Attacks

Cybersecurity for Critical Infrastructure

SecuLore provides Managed Detection and Response (MDR) to protect our nation’s critical infrastructure from cyber threats. Our expertise is built on deep knowledge of 9-1-1 technology, cyberwarfare, and ethical hacking, ensuring the highest level of cybersecurity for public safety agencies.

  • 24/7 Vulnerability & Threat Monitoring

  • Automated & AI Threat Detection

  • Specialized Threat Intelligence

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis