Protecting Public Safety

SecuLore has pioneered the art of cybersecurity for Public Safety organizations.

According to sources, Cleveland County Sheriff's Office (a Public Safety organization in Oklahoma) was hit with a cyber attack. It was first reported on 2025-11-24.

If You're in Oklahoma, You're at Increased Risk

Cybersecurity for Public Safety

Manage your organization’s attack surface with SecuLore’s 24/7 network monitoring services.

  • 24/7 Threat Monitoring

  • Automated & AI Threat Detection

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis

Source 1  |  2025-11-24

Oklahoma, Massachusetts hit by separate cyber incidents

“Oklahoma's Cleveland County Sheriff's Office and Massachusetts' City of Attleboro have been disrupted following separate cyberattacks last week, reports The Record, a news site by cybersecurity firm Recorded Future. “

“Cleveland County Sheriff's Office had segments of its IT system targeted by a ransomware intrusion from a still unknown actor, said officials, who emphasized that the intrusion did not affect public safety services and 911 response. “

“"We are still assessing the full scope of the incident and will share updates as more information becomes available. We're sharing this proactively to ensure accurate information and prevent rumors," said the Sheriff's Office. “

Guarding Against Ransomware

  • August 16, 2023

    Ransomware is on the Rise Again: Defense Against New Players

  • November 9, 2022

    Ransomware’s Hidden Costs: What You Need To Know

  • August 11, 2021

    How to Prevent and Respond to Ransomware Attacks

  • January 25, 2017

    How to Defend Public Safety from Ransomware

Cybersecurity for Critical Infrastructure

SecuLore provides Managed Detection and Response (MDR) to protect our nation’s critical infrastructure from cyber threats. Our expertise is built on deep knowledge of 9-1-1 technology, cyberwarfare, and ethical hacking, ensuring the highest level of cybersecurity for public safety agencies.

  • 24/7 Vulnerability & Threat Monitoring

  • Automated & AI Threat Detection

  • Specialized Threat Intelligence

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis