According to sources, Cape Fear Valley Health (a Medical organization in North Carolina) was hit with a cyber attack. It was first reported on 2023-10-20.

If You're in North Carolina, You're at Increased Risk

Cybersecurity for Medical

Manage your organization’s attack surface with SecuLore’s 24/7 network monitoring services.

  • 24/7 Threat Monitoring

  • Automated & AI Threat Detection

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis

Source 1  |  2023-10-20

Cape Fear Valley Health responds to nearly 2,000 patients impacted in data breach

“Personal information such as insurance, patients’ demographics, and hospital visits are among the information stolen from 1,943 Cape Fear Valley Health patients. “

“The breach involved a third-party software company, MOVEit Transfer, used by Westat, Inc. Westat manages medical records for Cape Fear Valley Medical Center and other clinics.“

“According to Cape Fear Valley Health, almost the entirety of this breach was for records with dates of service between Feb. 2022 and May 2023. One patient’s data was from an Aug. 25, 2021 doctor’s visit. “

Guarding Against Data Breaches

  • January 28, 2025

    Protect What Matters Most: Make Data Privacy Day Count

  • August 12, 2020

    Be Prepared: Incident Response Planning For Your Agency

  • October 10, 2018

    Elections are Coming: So are Advanced Persistent Threats

  • June 13, 2018

    Securing Your Public Safety Agency: Critical Rules and Approaches

Guarding Against Hacking

  • October 25, 2017

    Hackers Gone Wild: How Cybercriminals Impact 9-1-1 Systems

  • November 11, 2020

    4 Year Anniversary – Twitter TDoS Attack

  • October 14, 2020

    Incidents from the Trenches

  • July 8, 2020

    The Vicious Evolution of Cyber Attacks

Cybersecurity for Critical Infrastructure

SecuLore provides Managed Detection and Response (MDR) to protect our nation’s critical infrastructure from cyber threats. Our expertise is built on deep knowledge of 9-1-1 technology, cyberwarfare, and ethical hacking, ensuring the highest level of cybersecurity for public safety agencies.

  • 24/7 Vulnerability & Threat Monitoring

  • Automated & AI Threat Detection

  • Specialized Threat Intelligence

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis