Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Access Legacy Systems in Oxford City Council Cyberattack

Posted on June 20, 2025June 20, 2025 By CWS

Oxford Metropolis Council in the UK (UK) is notifying present and former staff that their private info was seemingly compromised in a current cyberattack.

The incident, the council says, occurred over the weekend of June 7 and eight, when it detected suspicious exercise inside its community.

“Our automated safety techniques kicked in, eliminated the presence and minimized the entry the attackers needed to our techniques and databases,” the council stated in an incident discover.

Oxford Metropolis Council took down core techniques to carry out safety checks, which resulted in service disruptions over the previous week.

A lot of the impacted techniques have been restored and the remaining ones ought to be again on-line this week, it says.

The assault, the council says, resulted in menace actors accessing historic knowledge on legacy techniques, and in sure private info being compromised.

“We’ve got now recognized that individuals who labored on Oxford Metropolis Council-administered elections between 2001 and 2022, together with ballot station staff and poll counters, could have had some private particulars accessed,” the council introduced.

The impacted people, present and former council officers, have been contacted individually, the council says, including that it has no proof that the compromised info was leaked.Commercial. Scroll to proceed studying.

“Investigations proceed to determine as exactly as we will what was accessed and what, if something, may need been taken out of our techniques. There is no such thing as a proof of a mass obtain or extraction of information,” the council stated.

Oxford Metropolis Council says it has taken steps to stop additional unauthorized entry to its community, and contacted the related authorities authorities and legislation enforcement.

Associated: Knowledge Breach at Healthcare Providers Agency Episource Impacts 5.4 Million Individuals

Associated: Asheville Eye Associates Says 147,000 Impacted by Knowledge Breach

Associated: Lee Enterprises Says 40,000 Hit by Ransomware-Brought about Knowledge Breach

Associated: Adidas Knowledge Breach Linked to Third-Celebration Vendor

Security Week News Tags:Access, City, Council, Cyberattack, Hackers, Legacy, Oxford, Systems

Post navigation

Previous Post: How to Detect Unusual Account Activity
Next Post: 67 Trojanized GitHub Repositories Found in Campaign Targeting Gamers and Developers

Related Posts

Russian APT Exploiting Mail Servers Against Government, Defense Organizations Security Week News
Daylight Raises $33 Million for AI-Powered MDR Platform Security Week News
$1 Million Offered for WhatsApp Exploit at Pwn2Own Ireland 2025 Security Week News
Pennsylvania Attorney General Confirms Data Breach After Ransomware Attack Security Week News
Google Ships Android ‘Advanced Protection’ Mode to Thwart Surveillance Spyware Security Week News
Data Breach at Doctors Imaging Group Impacts 171,000 People Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Using PuTTY for Both Lateral Movement and Data Exfiltration
  • Nigeria Arrests RaccoonO365 Phishing Developer Linked to Microsoft 365 Attacks
  • North Korea’s Digital Surge: $2B Stolen in Crypto as Amazon Blocks 1,800 Fake IT Workers
  • North Korean Hackers Make History with $2 Billion Crypto Heist in 2025
  • WatchGuard 0-day Vulnerability Exploited in the Wild to Hijack Firewalls

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Using PuTTY for Both Lateral Movement and Data Exfiltration
  • Nigeria Arrests RaccoonO365 Phishing Developer Linked to Microsoft 365 Attacks
  • North Korea’s Digital Surge: $2B Stolen in Crypto as Amazon Blocks 1,800 Fake IT Workers
  • North Korean Hackers Make History with $2 Billion Crypto Heist in 2025
  • WatchGuard 0-day Vulnerability Exploited in the Wild to Hijack Firewalls

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark