According to sources, Duke University Hospital (a Medical organization in North Carolina) was hit with a cyber attack. It was first reported on 2023-01-30.

If You're in North Carolina, You're at Increased Risk

Cybersecurity for Medical

Manage your organization’s attack surface with SecuLore’s 24/7 network monitoring services.

  • 24/7 Threat Monitoring

  • Automated & AI Threat Detection

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis

Source 1  |  2023-01-30

Russian hackers allegedly take down Duke University Hospital’s website

“Russian hackers were allegedly behind a cyberattack that took down 14 hospital systems websites across the country Monday, including Duke University Hospital in Durham. “

“According to DailyMail, Killnet, a pro-Russia group, has taken responsibility. Duke, Stanford Healthcare and Cedars-Sinai in California, University of Pittsburgh Medical Center, and Jefferson Health, Philadelphia in Pennsylvania were among those affected. Their websites have since been restored.“

““Duke Health has experienced some intermittent issues with its public website, but it remains unclear what caused the brief disruptions. Technical teams are engaged and trouble-shooting the issue. All patient care systems are functioning normally.” “

Guarding Against Data Breaches

  • January 28, 2025

    Protect What Matters Most: Make Data Privacy Day Count

  • August 12, 2020

    Be Prepared: Incident Response Planning For Your Agency

  • October 10, 2018

    Elections are Coming: So are Advanced Persistent Threats

  • June 13, 2018

    Securing Your Public Safety Agency: Critical Rules and Approaches

Cybersecurity for Critical Infrastructure

SecuLore provides Managed Detection and Response (MDR) to protect our nation’s critical infrastructure from cyber threats. Our expertise is built on deep knowledge of 9-1-1 technology, cyberwarfare, and ethical hacking, ensuring the highest level of cybersecurity for public safety agencies.

  • 24/7 Vulnerability & Threat Monitoring

  • Automated & AI Threat Detection

  • Specialized Threat Intelligence

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis