Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
JLR Confirms Phased Restart of Operations Following Cyber Attack

JLR Confirms Phased Restart of Operations Following Cyber Attack

Posted on September 29, 2025September 29, 2025 By CWS

Jaguar Land Rover (JLR) has confirmed it would start a phased restart of its manufacturing operations within the coming days, practically a month after a big cyber assault pressured the corporate to halt manufacturing throughout the UK.

The luxurious carmaker, owned by India’s Tata Motors, is taking gradual steps to convey its amenities again on-line whereas working with nationwide cybersecurity companies to make sure a safe restoration.

The incident started on the night of August 31, 2025, when a cyber assault prompted JLR to droop all work at its three primary UK manufacturing vegetation in Solihull, Wolverhampton, and Halewood on September 1.

The shutdown had an instantaneous and extreme influence, halting the manufacturing of its world-class automobiles and creating important disruption all through its intensive provide chain.

The stoppage affected over 30,000 direct JLR staff and an estimated 100,000 extra working for a whole lot of suppliers, a lot of whom rely closely on JLR’s orders.

JLR Confirms Phased Restart

In a press release, JLR introduced its plans for a cautious return to manufacturing. “Because the managed, phased restart of our operations continues, we’re taking additional steps in the direction of our restoration and the return to fabricate of our world-class automobiles,” an organization spokesperson mentioned.

“Right now we’re informing colleagues, retailers and suppliers that some sections of our manufacturing operations will resume within the coming days”.

The restart is anticipated to start with the engine plant in Wolverhampton on October 6, with different amenities regularly resuming their capabilities. Nevertheless, business insiders anticipate it may take a number of weeks earlier than manufacturing traces are working at full capability once more.

All through the shutdown, JLR has been collaborating with cybersecurity specialists, the UK authorities’s Nationwide Cyber Safety Centre (NCSC), and regulation enforcement to handle the disaster.

“We proceed to work across the clock… to make sure our restart is finished in a secure and safe method,” the corporate acknowledged. Whereas JLR confirmed that “some information” was compromised within the assault, it’s nonetheless conducting a forensic investigation to find out the total extent of the influence.

The extended manufacturing halt positioned immense monetary strain on JLR’s provide chain, with many smaller companies dealing with the chance of insolvency.

In response, the UK authorities stepped in over the weekend, providing £1.5 billion in mortgage ensures to JLR to assist stabilize its money circulation and help its weak suppliers.

Because the foundational work of its restoration will get underway, JLR has thanked its staff, retailers, and companions for his or her endurance and help through the disruption.

The corporate has assured it would proceed to offer updates because it navigates the advanced means of returning to full-scale manufacturing.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Attack, Confirms, Cyber, JLR, Operations, Phased, Restart

Post navigation

Previous Post: New Malware-as-a-Service Olymp Loader Promises Defender-Bypass With Automatic Certificate Signing
Next Post: New TamperedChef Malware Leverages Productivity Tools to Gain Access and Exfiltrate Sensitive Data

Related Posts

WhisperPair Attack Allows Hijacking of Laptops, Earbuds Without User Consent WhisperPair Attack Allows Hijacking of Laptops, Earbuds Without User Consent Cyber Security News
Securing Generative AI – Mitigating Data Leakage Risks Securing Generative AI – Mitigating Data Leakage Risks Cyber Security News
7 Best Security Awareness Training Platforms For MSPs in 2026 7 Best Security Awareness Training Platforms For MSPs in 2026 Cyber Security News
Cl0P Ransomware Group Allegedly Claims Breach of Entrust in Oracle 0-Day EBS Hack Cl0P Ransomware Group Allegedly Claims Breach of Entrust in Oracle 0-Day EBS Hack Cyber Security News
Sophisticated DevilsTongue Windows Spyware Tracking Users Globally Sophisticated DevilsTongue Windows Spyware Tracking Users Globally Cyber Security News
Hackers Using New ClickFix Technique To Exploits Human Error Via Fake Prompts Hackers Using New ClickFix Technique To Exploits Human Error Via Fake Prompts Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News