Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Access Legacy Systems in Oxford City Council Cyberattack

Posted on June 20, 2025June 20, 2025 By CWS

Oxford Metropolis Council in the UK (UK) is notifying present and former staff that their private info was seemingly compromised in a current cyberattack.

The incident, the council says, occurred over the weekend of June 7 and eight, when it detected suspicious exercise inside its community.

“Our automated safety techniques kicked in, eliminated the presence and minimized the entry the attackers needed to our techniques and databases,” the council stated in an incident discover.

Oxford Metropolis Council took down core techniques to carry out safety checks, which resulted in service disruptions over the previous week.

A lot of the impacted techniques have been restored and the remaining ones ought to be again on-line this week, it says.

The assault, the council says, resulted in menace actors accessing historic knowledge on legacy techniques, and in sure private info being compromised.

“We’ve got now recognized that individuals who labored on Oxford Metropolis Council-administered elections between 2001 and 2022, together with ballot station staff and poll counters, could have had some private particulars accessed,” the council introduced.

The impacted people, present and former council officers, have been contacted individually, the council says, including that it has no proof that the compromised info was leaked.Commercial. Scroll to proceed studying.

“Investigations proceed to determine as exactly as we will what was accessed and what, if something, may need been taken out of our techniques. There is no such thing as a proof of a mass obtain or extraction of information,” the council stated.

Oxford Metropolis Council says it has taken steps to stop additional unauthorized entry to its community, and contacted the related authorities authorities and legislation enforcement.

Associated: Knowledge Breach at Healthcare Providers Agency Episource Impacts 5.4 Million Individuals

Associated: Asheville Eye Associates Says 147,000 Impacted by Knowledge Breach

Associated: Lee Enterprises Says 40,000 Hit by Ransomware-Brought about Knowledge Breach

Associated: Adidas Knowledge Breach Linked to Third-Celebration Vendor

Security Week News Tags:Access, City, Council, Cyberattack, Hackers, Legacy, Oxford, Systems

Post navigation

Previous Post: How to Detect Unusual Account Activity
Next Post: 67 Trojanized GitHub Repositories Found in Campaign Targeting Gamers and Developers

Related Posts

Cisco Warns of Hardcoded Credentials in Enterprise Software Security Week News
Hackers Abuse ConnectWise to Hide Malware Security Week News
Linux Security: New Flaws Allow Root Access, CISA Warns of Old Bug Exploitation Security Week News
RevEng.ai Raises $4.15 Million to Secure Software Supply Chain Security Week News
Radware Says Recently Disclosed WAF Bypasses Were Patched in 2023 Security Week News
Vulnerability Exposed All Open VSX Repositories to Takeover Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Secure a Web Application Firewall (WAF)
  • Ransomware Attack on Phone Repair and Insurance Company Cause Millions in Damage
  • Claude Vulnerabilities Let Attackers Execute Unauthorized Commands With its Own Help
  • Threat Actors Using AI to Scale Operations, Accelerate Attacks and Attack Autonomous AI Agents
  • New Python-Based PXA Stealer Via Telegram Stolen 200,000 Unique Passwords and Hundreds of Credit Cards

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Secure a Web Application Firewall (WAF)
  • Ransomware Attack on Phone Repair and Insurance Company Cause Millions in Damage
  • Claude Vulnerabilities Let Attackers Execute Unauthorized Commands With its Own Help
  • Threat Actors Using AI to Scale Operations, Accelerate Attacks and Attack Autonomous AI Agents
  • New Python-Based PXA Stealer Via Telegram Stolen 200,000 Unique Passwords and Hundreds of Credit Cards

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News