Protecting Government

SecuLore has pioneered the art of cybersecurity for Government organizations.

According to sources, Fremont County (a Government organization in Wyoming) was hit with a cyber attack. It was first reported on 2025-03-25.

If You're in Wyoming, You're at Increased Risk

Specialized Cybersecurity for Critical Infrastructure

Manage your organization’s attack surface with SecuLore’s passive cyber threat detection.

  • Asset Discovery
  • Vulnerability Assessments
  • Risk Prioritization
  • 24/7 Active Threat Detection

  • Continuous Monitoring

Source 1  |  2025-03-25

‘Intricate’ phishing email scam appears to be targeting government officials in Fremont County

“An apparent phishing email scam has been making its way through the addresses and emailing lists of Fremont County government officials.“

“Early Tuesday afternoon, March 25, the County 10 offices received an email from “jhighsmith@townofshoshoni.org,” the address used by Mayor Highsmith for official communications from the Town of Shoshoni, which had the subject line “Request for Bid Proposal.” “

““The Town of Shoshoni Systems is using This Request for Proposals (RFP) for the purpose of selecting vendors to provide Contracted Services, in accordance with the terms, conditions and specifications established within this Request for Proposal (RFP),” the body of the email informs. The email then states that “Proposals are due on or before 3:00 p.m.(CST) on, April 20, 2025,” and provides a link to “View Full RFP.” “

Guarding Against Phishing

  • December 13, 2017

    New Insights: The 2016 Thanksgiving Cyber Attack

  • July 26, 2017

    How Hackers Infiltrate Our Public Safety Infrastructure

Cybersecurity for Critical Infrastructure

SecuLore provides Managed Detection and Response (MDR) to protect our nation’s critical infrastructure from cyber threats. Our expertise is built on deep knowledge of 9-1-1 technology, cyberwarfare, and ethical hacking, ensuring the highest level of cybersecurity for public safety agencies.

  • 24/7 Vulnerability & Threat Monitoring

  • Automated & AI Threat Detection

  • Specialized Threat Intelligence

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis