Call Us Today! (866) 435-8364

Solarwinds ORION delivers backdoor Trojan to worldwide networks

Fireye detected that Solarwinds Orion is being used by attackers to steal sensitive company data. Fireye’s threat research division found that a highly sophisticated and evasive attacker compromised the Solarwind’s Orion IT monitoring and management platform to deliver a backdoor trojan. It is suspected that the campaign has started as early as April 2020 and

Elteni is shortlisted for Best Cybersecurity Solution – 2021 Fund Intelligence Operations and Services Award

Cayman Islands Investment firm exposes sensitive client information!

A Cayman Islands investment firm's backups stored in a Microsoft Azure Blob Storage was not secured properly thus resulting in a potential leak of personal banking information, individual passport data, and other sensitive information. A researcher discovered the gaping hole left open by the firm’s Hong Kong based IT provider via a special search engine

OCIE issues a new alert: “Credential Stuffing”

Yesterday The Office and Compliance Inspections and Examinations ("OCIE") issued an alert about safeguarding client accounts against credential compromise that highlighted the issue of "credential stuffing attacks". Credential stuffing is a type of cyber attack where many compromised user credentials are tried against systems to gain unauthorized access, using automated means. Over the past few

2020-12-31T18:42:56-05:00September 16th, 2020|BEC, Business Email Compromise, Cyber, Hackers, Hedge Fund, OCIE, Password, Phishing, Private Equity, RIA, SEC|

Critical Wormable Vulnerability Affecting Windows DNS Servers

Critical Wormable Vulnerability Affecting Windows DNS Servers On July 14, 2020 Microsoft publicly disclosed a critical vulnerability affecting Windows DNS Server. https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1350 As a reminder DNS (Domain Naming System) servers are used primarily to resolve IP addresses. DNS is used for locating and identifying computer services and devices on the internet, such as email servers,

2020-12-31T18:43:05-05:00July 15th, 2020|Cyber, Exploit|

OCIE issues a new Cybersecurity: Ransomware Alert

Today the OCIE issued a Ransomware Alert, highlighting an uptick in sophisticated social engineering and other cyber campaigns, designed to infiltrate the networks of financial institutions to access sensitive information and/or to deploy ransomware. As a reminder, ransomware actors typically demand monetary payment for the return of data. We can spend time regurgitating what was

Technology, security, and privacy in a Work From Home (WFH) environment

Will Work From Home (WFH) be an Alternative Asset Management Firm’ new norm? Firstly, let me address the question that comes to mind after reading the title, this isn’t just another article about how COVID-19 has affected us………now keep reading. I’m not writing this article to express my opinion about whether WFH is good or

Three UK-based Private Equity firms lose 1.3 million dollars to cyber criminals

  The team at Check Point identified that cyber criminals - dubbed the Florentine Banker - targeted three Private Equity firms and stole over $1.3 million dollars, with only about half the money recovered. The cyber criminals launched an email spear-phishing campaign targeting executives, and other high-profile employees in an attempt to gain access to

Are you considering fleeing Zoom? Don’t be so quick to do so.

Zoom has been under the spotlight over the past few weeks due to privacy and security issues. They were served with a class-action lawsuit over its data sharing practices, and come under scrutiny from the New York Attorney General’s Office. Headlines like this may make you want to “Zoom” for the hills, but hit the

Have you considered the work from home risks?

Have you made the decision to allow employees to work from home or are you still contemplating the idea? If work from home is or will be the preferred method for the unforeseeable future, there are some things you should do to maintain your compliance and security posture. Here are some risks you should be

Go to Top