Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Access Legacy Systems in Oxford City Council Cyberattack

Posted on June 20, 2025June 20, 2025 By CWS

Oxford Metropolis Council in the UK (UK) is notifying present and former staff that their private info was seemingly compromised in a current cyberattack.

The incident, the council says, occurred over the weekend of June 7 and eight, when it detected suspicious exercise inside its community.

“Our automated safety techniques kicked in, eliminated the presence and minimized the entry the attackers needed to our techniques and databases,” the council stated in an incident discover.

Oxford Metropolis Council took down core techniques to carry out safety checks, which resulted in service disruptions over the previous week.

A lot of the impacted techniques have been restored and the remaining ones ought to be again on-line this week, it says.

The assault, the council says, resulted in menace actors accessing historic knowledge on legacy techniques, and in sure private info being compromised.

“We’ve got now recognized that individuals who labored on Oxford Metropolis Council-administered elections between 2001 and 2022, together with ballot station staff and poll counters, could have had some private particulars accessed,” the council introduced.

The impacted people, present and former council officers, have been contacted individually, the council says, including that it has no proof that the compromised info was leaked.Commercial. Scroll to proceed studying.

“Investigations proceed to determine as exactly as we will what was accessed and what, if something, may need been taken out of our techniques. There is no such thing as a proof of a mass obtain or extraction of information,” the council stated.

Oxford Metropolis Council says it has taken steps to stop additional unauthorized entry to its community, and contacted the related authorities authorities and legislation enforcement.

Associated: Knowledge Breach at Healthcare Providers Agency Episource Impacts 5.4 Million Individuals

Associated: Asheville Eye Associates Says 147,000 Impacted by Knowledge Breach

Associated: Lee Enterprises Says 40,000 Hit by Ransomware-Brought about Knowledge Breach

Associated: Adidas Knowledge Breach Linked to Third-Celebration Vendor

Security Week News Tags:Access, City, Council, Cyberattack, Hackers, Legacy, Oxford, Systems

Post navigation

Previous Post: How to Detect Unusual Account Activity
Next Post: 67 Trojanized GitHub Repositories Found in Campaign Targeting Gamers and Developers

Related Posts

Former US Defense Contractor Executive Admits to Selling Exploits to Russia Security Week News
Noma Security Raises $100 Million for AI Security Platform Security Week News
North Korea’s Fake Recruiters Feed Stolen Data to IT Workers Security Week News
Broadcom Fails to Disclose Zero-Day Exploitation of VMware Vulnerability Security Week News
Oracle Says Known Vulnerabilities Possibly Exploited in Recent Extortion Attacks Security Week News
New Vulnerabilities Expose Millions of Brother Printers to Hacking Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Malicious VSX Extension “SleepyDuck” Uses Ethereum to Keep Its Command Server Alive
  • Hackers Can Manipulate Claude AI APIs with Indirect Prompts to Steal User Data
  • Microsoft Patch for WSUS Flaw has Broken Hotpatching on Windows Server 2025
  • Ukrainian Extradited to US Faces Charges in Jabber Zeus Cybercrime Case
  • How Software Development Teams Can Securely and Ethically Deploy AI Tools

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Malicious VSX Extension “SleepyDuck” Uses Ethereum to Keep Its Command Server Alive
  • Hackers Can Manipulate Claude AI APIs with Indirect Prompts to Steal User Data
  • Microsoft Patch for WSUS Flaw has Broken Hotpatching on Windows Server 2025
  • Ukrainian Extradited to US Faces Charges in Jabber Zeus Cybercrime Case
  • How Software Development Teams Can Securely and Ethically Deploy AI Tools

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News