Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      June 4, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      June 4, 2025

      How To Prevent WordPress SQL Injection Attacks

      June 4, 2025

      Smashing Animations Part 4: Optimising SVGs

      June 4, 2025

      I test AI tools for a living. Here are 3 image generators I actually use and how

      June 4, 2025

      The world’s smallest 65W USB-C charger is my latest travel essential

      June 4, 2025

      This Spotlight alternative for Mac is my secret weapon for AI-powered search

      June 4, 2025

      Tech prophet Mary Meeker just dropped a massive report on AI trends – here’s your TL;DR

      June 4, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Beyond AEM: How Adobe Sensei Powers the Full Enterprise Experience

      June 4, 2025
      Recent

      Beyond AEM: How Adobe Sensei Powers the Full Enterprise Experience

      June 4, 2025

      Simplify Negative Relation Queries with Laravel’s whereDoesntHaveRelation Methods

      June 4, 2025

      Cast Model Properties to a Uri Instance in 12.17

      June 4, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      My Favorite Obsidian Plugins and Their Hidden Settings

      June 4, 2025
      Recent

      My Favorite Obsidian Plugins and Their Hidden Settings

      June 4, 2025

      Rilasciata /e/OS 3.0: Nuova Vita per Android Senza Google, Più Privacy e Controllo per l’Utente

      June 4, 2025

      Rilasciata Oracle Linux 9.6: Scopri le Novità e i Miglioramenti nella Sicurezza e nelle Prestazioni

      June 4, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»SEC’s CETU: A Dedicated Task Force to Safeguard Investors from Cyber Fraud

    SEC’s CETU: A Dedicated Task Force to Safeguard Investors from Cyber Fraud

    February 25, 2025

    CETU

    The Securities and Exchange Commission (SEC) has announced the launch of the Cyber and Emerging Technologies Unit (CETU), a dedicated team focused on addressing cyber-related misconduct and safeguarding retail investors from fraudulent activities in the emerging technologies sector.

    This new unit, which will replace the existing crypto assets and the cyber unit, will be led by Laura D’Allaird and consist of approximately 30 fraud specialists and attorneys from various SEC offices.

    Strengthening Investor Protection

    With cyber threats and financial fraud evolving rapidly, the SEC aims to enhance its ability to detect and reduce misconduct that exploits technological advancements. The CETU’s primary mission is to ensure that innovation within the financial sector does not come at the expense of investor protection and market integrity.

    “Under Laura’s leadership, this new unit will complement the work of the Crypto Task Force led by Commissioner Hester Peirce,” said Acting Chairman Mark T. Uyeda. “Importantly, the new unit will also allow the SEC to deploy enforcement resources judiciously. The unit will not only protect investors but will also facilitate capital formation and market efficiency by clearing the way for innovation to grow. It will root out those seeking to misuse innovation to harm investors and diminish confidence in new technologies.”

    Focus Areas of the CETU

    The CETU will leverage its team’s extensive expertise in financial technology (fintech) and cybersecurity to address various cyber-related risks and fraud schemes. The unit will concentrate its efforts on the following key areas:

    • Fraud involving emerging technologies: The CETU will target scams that use artificial intelligence (AI), machine learning, and other advanced technologies to deceive investors and manipulate markets.
    • Exploitation of social media, dark web, and fraudulent websites: Online platforms have become popular tools for fraudulent schemes. CETU will track and mitigate scams that rely on social media deception, dark web transactions, and misleading websites to lure unsuspecting investors.
    • Hacking and illicit access to material nonpublic information: Cybercriminals who gain unauthorized access to confidential financial data and trade on insider information will face increased scrutiny and enforcement action.
    • Takeovers of retail brokerage accounts: Unauthorized access to individual investors’ brokerage accounts has become a growing concern. CETU will work to identify and prevent account hijacking incidents that result in financial losses.
    • Blockchain and cryptocurrency fraud: With the rise of digital assets, the SEC remains committed to regulating and preventing fraudulent activities in the blockchain and crypto space. CETU will target Ponzi schemes, unregistered offerings, and deceptive practices involving crypto assets.
    • Regulatory compliance of financial institutions: Ensuring that brokerage firms, investment advisors, and other regulated entities adhere to cybersecurity laws and best practices will be a core function of the unit.
    • Public company disclosures on cybersecurity risks: The SEC will scrutinize disclosures by publicly traded companies to ensure they provide accurate and complete information about cybersecurity threats and incidents that may impact investors.

    The Need for a Stronger Cyber Enforcement Strategy

    The formation of CETU reflects the SEC’s growing focus on cyber threats that undermine investor confidence and market stability. Over the past decade, cybercriminals have increasingly used technology-driven methods to manipulate financial markets and exploit unsuspecting investors. By establishing this specialized unit, the SEC aims to stay ahead of evolving cyber risks and strengthen enforcement actions against fraudulent actors.

    The replacement of the Crypto Assets and Cyber Unit with CETU signals a broader approach that extends beyond cryptocurrency-related fraud. While crypto fraud remains a major concern, the SEC recognizes that cyber threats in the financial sector are not limited to digital assets.

    Hostinger

    The CETU will cover a wider range of technological risks, ensuring that the SEC can address emerging fraud tactics effectively.

    Laura D’Allaird to Lead the CETU

    Laura D’Allaird, a highly experienced SEC official with a background in cybersecurity enforcement, will head the newly established unit. Her leadership is expected to bring a strategic vision that aligns with the SEC’s goal of maintaining investor protection while fostering responsible innovation in financial markets.

    D’Allaird’s appointment has been welcomed by industry experts, who emphasize the importance of experienced leadership in tackling sophisticated cyber threats. Her role will involve coordinating efforts across SEC offices, collaborating with other regulatory bodies, and ensuring that enforcement actions effectively deter cyber-related financial crimes.

    Implications for Investors and Market Participants

    The creation of CETU is a significant step toward enhancing investor protection in an increasingly digital financial landscape. Investors should expect increased scrutiny of online investment opportunities, particularly those involving AI-driven financial services, blockchain-based projects, and social media-driven trading schemes.

    For financial institutions and publicly traded companies, the CETU’s establishment highlights the need for strong cybersecurity measures and transparent disclosures. Compliance with SEC regulations will be critical, and firms may face heightened enforcement actions if they fail to meet cybersecurity requirements.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleFatalRAT Phishing Attacks Target APAC Industries Using Chinese Cloud Services
    Next Article Two Actively Exploited Security Flaws in Adobe and Oracle Products Flagged by CISA

    Related Posts

    Security

    HPE StoreOnce Faces Critical CVE-2025-37093 Vulnerability — Urges Immediate Patch Upgrade

    June 4, 2025
    Security

    Google fixes Chrome zero-day with in-the-wild exploit (CVE-2025-5419)

    June 4, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    microStudio – game engine

    Linux

    Tailwind CSS vs Bootstrap: A Side-by-Side Comparison

    Web Development

    Triggering File Creation and Auto-Download in PowerApps Using Power Automate

    Development

    A Beginner’s Guide to C# Selenium Automation: Step-by-Step Tutorial

    Development

    Highlights

    CVE-2025-37987 – Linux PDS Core AdminQ Overflow/Stuck Condition Vulnerability

    May 20, 2025

    CVE ID : CVE-2025-37987

    Published : May 20, 2025, 6:15 p.m. | 34 minutes ago

    Description : In the Linux kernel, the following vulnerability has been resolved:

    pds_core: Prevent possible adminq overflow/stuck condition

    The pds_core’s adminq is protected by the adminq_lock, which prevents
    more than 1 command to be posted onto it at any one time. This makes it
    so the client drivers cannot simultaneously post adminq commands.
    However, the completions happen in a different context, which means
    multiple adminq commands can be posted sequentially and all waiting
    on completion.

    On the FW side, the backing adminq request queue is only 16 entries
    long and the retry mechanism and/or overflow/stuck prevention is
    lacking. This can cause the adminq to get stuck, so commands are no
    longer processed and completions are no longer sent by the FW.

    As an initial fix, prevent more than 16 outstanding adminq commands so
    there’s no way to cause the adminq from getting stuck. This works
    because the backing adminq request queue will never have more than 16
    pending adminq commands, so it will never overflow. This is done by
    reducing the adminq depth to 16.

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Gemini AI Now Accessible Through the OpenAI Library for Streamlined Use

    November 9, 2024

    Microsoft Edge’s new ‘Live Capture’ makes watching Live Content easier than PiP

    February 13, 2025

    What’s the point of Headless?

    April 23, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.