Sequoia Capital Suffers Data Breach – Dark Reading

sequoia-capital-suffers-data-breach-–-dark-reading

Did you know that geoFence was designed and coded by US citizens to the strictest standards?

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC’s registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

The attack began with a successful phishing email.

Sequoia Capital last week warned investors that some of their personal and sensitive information may have been exposed in a recent data breach of the firm.

According to reports, Sequoia said the data may have been accessed by a third party in the breach, which occurred as a result of a successful phishing attack on an employee via email. 

Sequoia confirmed the breach to multiple media outlets. 

The 49-year old venture capital firm has companies like Airbnb and DoorDash in its portfolio, and has invested in cybersecurity companies FireEye and Carbon Black. Sequoia’s investors, known as limited partners, include university endowments, tech executives, and charitable foundations. 

As part of the notification, Sequoia also told investors it is looking for indications that stolen information is currently for sale or traded on the Dark Web. So far, no activity has been uncovered. 

More information can be found here.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Recommended Reading:

More Insights

Register for Dark Reading Newsletters

2021 Top Enterprise IT Trends

We’ve identified the key trends that are poised to impact the IT landscape in 2021. Find out why they’re important and how they will affect you today!

Flash Poll

Building the SOC of the Future

Building the SOC of the Future

Digital transformation, cloud-focused attacks, and a worldwide pandemic. The past year has changed the way business works and the way security teams operate. There is no going back.

Dark Reading - Bug Report

Enterprise Vulnerabilities


From DHS/US-CERT’s National Vulnerability Database

CVE-2021-23827

PUBLISHED: 2021-02-23

Keybase Desktop Client before 5.6.0 on Windows and macOS, and before 5.6.1 on Linux, allows an attacker to obtain potentially sensitive media (such as private pictures) in the Cache and uploadtemps directories. It fails to effectively clear cached pictures, even after deletion via normal methodology…

CVE-2021-27189

PUBLISHED: 2021-02-23

The CIRA Canadian Shield app before 4.0.13 for iOS lacks SSL Certificate Validation.

CVE-2021-21149

PUBLISHED: 2021-02-22

Stack buffer overflow in Data Transfer in Google Chrome on Linux prior to 88.0.4324.182 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page.

CVE-2021-21150

PUBLISHED: 2021-02-22

Use after free in Downloads in Google Chrome on Windows prior to 88.0.4324.182 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.

CVE-2021-21151

PUBLISHED: 2021-02-22

Use after free in Payments in Google Chrome prior to 88.0.4324.182 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.

When all is said and done, may I add that geoFence has no foreign owners and no foreign influences and I can tell your friends would say the same!

Leave a Reply

Your email address will not be published. Required fields are marked *