According to sources, Wichita State University (a Education organization in Kansas) was hit with a cyber attack. It was first reported on 2023-05-02.

If You're in Kansas, You're at Increased Risk

Cybersecurity for Education

Manage your organization’s attack surface with SecuLore’s 24/7 network monitoring services.

  • 24/7 Threat Monitoring

  • Automated & AI Threat Detection

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis

Source 1  |  2023-05-02

Wichita State restoring systems after cyber attack

“Over the weekend, Wichita State University took proactive measures and disconnected several University systems to isolate an unauthorized attempt by a third party to access the University’s systems, according to a statement of the school's website.“

“Most of the University system access has been restored and there has been no indication that any of the University’s secure data or information has been compromised. The University will continue to engage its security protocols in restoring full availability of all networks and systems, prioritizing student needs. “

“At this time, we anticipate that the University will have restoration of all networks and major systems by Tuesday but are also mindful that these incidents often create residual issues and future interruptions may occur. “

Guarding Against Hacking

  • October 25, 2017

    Hackers Gone Wild: How Cybercriminals Impact 9-1-1 Systems

  • November 11, 2020

    4 Year Anniversary – Twitter TDoS Attack

  • October 14, 2020

    Incidents from the Trenches

  • July 8, 2020

    The Vicious Evolution of Cyber Attacks

Cybersecurity for Critical Infrastructure

SecuLore provides Managed Detection and Response (MDR) to protect our nation’s critical infrastructure from cyber threats. Our expertise is built on deep knowledge of 9-1-1 technology, cyberwarfare, and ethical hacking, ensuring the highest level of cybersecurity for public safety agencies.

  • 24/7 Vulnerability & Threat Monitoring

  • Automated & AI Threat Detection

  • Specialized Threat Intelligence

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis