According to sources, Dr. Motykie Plastic Surgery (a Medical organization in California) was hit with a cyber attack. It was first reported on 2023-07-10.

If You're in California, You're at Increased Risk

Cybersecurity for Medical

Manage your organization’s attack surface with SecuLore’s 24/7 network monitoring services.

  • 24/7 Threat Monitoring

  • Automated & AI Threat Detection

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis

Source 1  |  2023-07-10

Major data breach at Beverly Hills plastic surgeon's office exposes patients' sensitive information

“The major data breach of Dr. Gary Motykie, a popular Beverly Hills plastic surgeon, led to sensitive information being posted on a public website, along with what appears to be very private images of the doctor himself. “

“According to a report filed with the LA County Sheriff’s Department, Motykie received an extortion threat in May. The crooks allegedly demanded he pay two and half million dollars to prevent the patient data, and his own, from going public. “

“By early June, someone posted data of 36 patients online. Now, personal details and pictures of more than 70 patients are on the site, and there’s concern among patients that more could be posted at any moment. “

Guarding Against Data Breaches

Guarding Against Hacking

  • August 14, 2019

    Analyzing the Most Crippling Public Safety Cyber Attacks

  • June 12, 2019

    Why and How Public Safety is Under Cyber Attack

  • March 13, 2019

    Preparing Public Safety for a Cyber Incident Response

  • February 13, 2019

    Hackers Love Your Misconfigured Firewalls

Cybersecurity for Critical Infrastructure

SecuLore provides Managed Detection and Response (MDR) to protect our nation’s critical infrastructure from cyber threats. Our expertise is built on deep knowledge of 9-1-1 technology, cyberwarfare, and ethical hacking, ensuring the highest level of cybersecurity for public safety agencies.

  • 24/7 Vulnerability & Threat Monitoring

  • Automated & AI Threat Detection

  • Specialized Threat Intelligence

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis