Call Us Today! (866) 435-8364

Elteni

About Elteni

This author has not yet filled in any details.
So far Elteni has created 12 blog entries.

Phantom Extortion Phishing Targeting Financial Services Firms!

Recently a few of our clients were recipients of phishing email leveraging scare tactics, also known as the Phantom Extortion Scam. This scam involves cyber criminals sending fake emails or messages to individuals or businesses, claiming that there has been a security breach or incident involving sensitive client or organization data. The cyber criminals then

Is this the end of LastPass?

LastPass, a popular password management service, has revealed that malicious actors have gained access to unencrypted customer data, including web URLs, email addresses, company names, billing addresses, telephone numbers, and IP addresses of LastPass customers, as well as encrypted copies of customer password vaults. This information was compromised using previously stolen data from a breach in

2023-01-05T11:35:48-05:00January 5th, 2023|Breaches, Cyber, Hackers, Identity Theft, Password, Phishing, PII, Privacy, Vulnerability|

The SEC proposes new Cybersecurity rules

Earlier today the Securities and Exchange Commission voted to propose rules related to cybersecurity risk management for registered investment advisers, and registered investment companies and business development companies (funds), as well as amendments to certain rules that govern investment adviser and fund disclosures. The SEC Chair Gary Genlser stated that the proposed rules and amendments

Apache Log4j 2 Vulnerability

You probably heard the news this weekend about the new critical remote code execution vulnerability affecting Apache log4j 2. A remote code execution vulnerability is an attack that can be launched from anywhere in the world, as long as an affected system is available remotely. Why is important? The vulnerability affects millions of devices, including

2021-12-13T08:08:37-05:00December 13th, 2021|Apache, Exploit, Hackers, Hedge Fund, Investment Adviser, Reverse Shell, Vulnerability|

Next Generation Ransomware Attacks

Ransomware, the word alone evokes fear into many companies. How did this form of crime actually start? In 1989, Dr. Joseph L. Popp created the first ransomware called the "AIDS Trojan." This trojan virus encrypted files on a computer after rebooting a number of times. Fast forward to 2006, Archiveus, a computer virus that affected

Critical Apple vulnerability exploited to eavesdrop!

Apple has released an emergency security update to address vulnerabilities in iOS and iPadOS for a zero-click zero day exploit that allows the installation of malware on a device. An attacker could exploit these vulnerabilities to take control of an affected device if they are unpatched. "Attacks like the ones described are highly sophisticated, cost

2021-09-14T18:12:31-04:00September 14th, 2021|Apple, Cyber, Exploit, Hackers, Identity Theft, PII, Privacy, Technology, Vulnerability|

The SEC issues fines for deficient cybersecurity programs!

Today the Securities and Exchange Commission (SEC) sanctioned eight firms in three actions for failures in their cybersecurity policies and procedures that resulted in email account takeovers exposing the personal information of thousands of customers and clients at each firm. A total of $800,000 were levied against these firms. In summary, the firms named in

Critical Print Spooler Vulnerability, Netgear Auth Bypass, and REvil Ransomware

PrintNightmare, Vulnerability Affecting Windows Print Spooler Eleven years ago, an escalation of privilege bug in the Windows print spooler services was used in the Stuxnet attack, the notorious worm that destroyed the enrichment centrifuges of an Iranian Nuclear facility. Over the past eleven years, Microsoft's print spooler is still plagued by multiple vulnerabilities. Yesterday, proof-of-concept

2021-07-02T10:47:03-04:00July 2nd, 2021|Cyber|

SEC Charges First American Financial Corporation With Cybersecurity Disclosure Controls Failures

On June 15, 2021 “The Securities and Exchange Commission (“SEC”) announced settled charges against real estate settlement services company First American Financial Corporation for disclosure controls and procedures violations related to a cybersecurity vulnerability that exposed sensitive customer information.” On May 24, 2019, Brian Krebs notified First American Financial Corporation of a vulnerability with its

2021-06-15T12:53:23-04:00June 15th, 2021|Cyber, OCIE, Privacy, Regulatory, SEC, Vulnerability, Vulnerability Disclosure|

What is Ethical Hacking? Everything You Need to Know About Ethical Hacking—With Examples

Our founder Anand Mohabir was interviewed by Kindra Cooper, from Springboard, on the topic of Ethical hacking. “There’s a lot that comes into play when you’re trying to become an ethical hacker. You have to know how a network is designed and operated, how servers interact, how virtual machines, storage and firewalls work,” said Mohabir.

Go to Top