HomeSecurity ArchitectureOregon DEQ faces cyberattack, takes measures to contain impact

Oregon DEQ faces cyberattack, takes measures to contain impact

Published on

spot_img

The Oregon Department of Environmental Quality (DEQ) is currently facing a cyberattack, the agency announced on Wednesday morning. In response to the attack, the agency is taking steps to shut down networks in order to contain the impact and potentially eradicate the threat.

The DEQ stated that they are in the process of isolating their servers and network to prevent further damage until the attack is completely contained. The attack was first reported to the public around 11 a.m., and the Oregon’s IT organization, Enterprise Information Services, is currently investigating the situation to determine the extent of the impact.

As of now, it is still unclear what specific systems or data have been affected by the cyberattack. The agency has assured the public that they will provide more information as the situation evolves. They have stated that additional details regarding the attack will be released by the end of the day on Wednesday or as significant events unfold.

This incident serves as a reminder of the ever-present threat of cyberattacks on government agencies and organizations. It highlights the importance of robust cybersecurity measures to protect sensitive information and prevent disruptions to critical services. The DEQ’s swift response to the attack demonstrates their commitment to safeguarding their systems and data from malicious actors.

As this is a developing story, more updates are expected to be provided as more information becomes available. The DEQ is working diligently to address the cyberattack and ensure the security of their networks moving forward. Stay tuned for further developments on this ongoing situation.

Source link

Latest articles

The Hidden Lag Killing Your SIEM Efficiency

 If your security tools feel slower than they should, you’re not imagining it....

AI-fueled cybercrime may outpace traditional defenses, Check Point warns

 As AI reshapes industries, it has also erased the lines between truth and...

When Your “Security” Plugin is the Hacker

Source: The Hacker NewsImagine installing a plugin that promises to protect your WordPress...

7 Malicious PyPI Packages Abuse Gmail’s SMTP Protocol to Execute Malicious Commands

A highly advanced software supply chain attack has been uncovered, which exploits Python...

More like this

The Hidden Lag Killing Your SIEM Efficiency

 If your security tools feel slower than they should, you’re not imagining it....

AI-fueled cybercrime may outpace traditional defenses, Check Point warns

 As AI reshapes industries, it has also erased the lines between truth and...

When Your “Security” Plugin is the Hacker

Source: The Hacker NewsImagine installing a plugin that promises to protect your WordPress...