According to sources, Florida Department of Health (a Medical organization in Florida) was hit with a cyber attack. It was first reported on 2024-07-06.

If You're in Florida, You're at Increased Risk

Specialized Cybersecurity for Critical Infrastructure

Manage your organization’s attack surface with SecuLore’s passive cyber threat detection.

  • Asset Discovery
  • Vulnerability Assessments
  • Risk Prioritization
  • 24/7 Active Threat Detection

  • Continuous Monitoring

Source 1  |  2024-07-06

Personal and health info leaked from Florida Department of Health

“On July 2, threat actors known as Ransom Hub had claimed to have exfiltrated 100 GB of files from the state agency. They threatened to leak it if the state did not pay their demands, but Florida law prohibits state agencies from paying ransom. “

“DataBreaches cannot confirm whether Ransom Hub actually leaked 100 GB of files, but they did leak a lot of data on their leak site, and a lot of it was personally identifiable information (PII) or protected health information (PHI). “

“The data in the tranche did not seem organized in any recognizable way, but there was a mix of internal files a state agency would store as well as specific patient-related files.“

Guarding Against Ransomware

  • August 16, 2023

    Ransomware is on the Rise Again: Defense Against New Players

  • November 9, 2022

    Ransomware’s Hidden Costs: What You Need To Know

  • August 11, 2021

    How to Prevent and Respond to Ransomware Attacks

  • January 25, 2017

    How to Defend Public Safety from Ransomware

Cybersecurity for Critical Infrastructure

SecuLore provides Managed Detection and Response (MDR) to protect our nation’s critical infrastructure from cyber threats. Our expertise is built on deep knowledge of 9-1-1 technology, cyberwarfare, and ethical hacking, ensuring the highest level of cybersecurity for public safety agencies.

  • 24/7 Vulnerability & Threat Monitoring

  • Automated & AI Threat Detection

  • Specialized Threat Intelligence

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis