Protecting Government

SecuLore has pioneered the art of cybersecurity for Government organizations.

According to sources, Pulaski County (a Government organization in Arkansas) was hit with a cyber attack. It was first reported on 2025-04-08.

If You're in Arkansas, You're at Increased Risk

Specialized Cybersecurity for Critical Infrastructure

Manage your organization’s attack surface with SecuLore’s passive cyber threat detection.

  • Asset Discovery
  • Vulnerability Assessments
  • Risk Prioritization
  • 24/7 Active Threat Detection

  • Continuous Monitoring

Source 1  |  2025-04-08

Pulaski County clerk acknowledges ‘cybersecurity incident’ behind January outage

“Pulaski County and Circuit Clerk Terri Hollingsworth acknowledged on Tuesday that a cybersecurity incident led to a system outage at the office.“

“The Pulaski County system went offline on Jan. 16 and remained offline into February. During the outage, the office could not process licenses, voter registrations and real estate documents. “

“A statement from the office said it took “a significant amount of time” to restore operations. The statement continued that the office has implemented “extensive security measures” due to the incident, including implementing a “robust anti-phishing system.”“

“While the announcement did not state that the attack came from a phishing email—where unscrupulous hackers trick users into clicking on a link that hijacks a computer system—the statement implies this was the case. “

Guarding Against Phishing

  • December 13, 2017

    New Insights: The 2016 Thanksgiving Cyber Attack

  • July 26, 2017

    How Hackers Infiltrate Our Public Safety Infrastructure

Cybersecurity for Critical Infrastructure

SecuLore provides Managed Detection and Response (MDR) to protect our nation’s critical infrastructure from cyber threats. Our expertise is built on deep knowledge of 9-1-1 technology, cyberwarfare, and ethical hacking, ensuring the highest level of cybersecurity for public safety agencies.

  • 24/7 Vulnerability & Threat Monitoring

  • Automated & AI Threat Detection

  • Specialized Threat Intelligence

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis