
There's a new VC focused on fintech startups supporting financial health
An overwhelming 70% of Americans face financial health challenges, and two-thirds live paycheck to paycheck. ResilienceVC is tackling these widespread issues by investing in early-stage fintech companies. Their initial fund raised more money than expected—over $56 million—for investments in startups working on new and creative solutions to issues such as the lack of affordable insurance and the difficulties people face when trying to buy a home. Seasoned fintech experts Tahira Dosani and Vikas Raj, the cofounders and managing partners of ResilienceVC, aim to drive financial resilience while delivering strong returns.
The oversubscribed fund tackles obstacles such as limited access to affordable insurance, challenges in the path to homeownership, and difficulties in accessing pre-tax and government benefits.
ResilienceVC's strategy is centered on seed-stage fintechs, with plans to make approximately 25 investments, each with an average initial investment of $1 million. The venture capital firm has already invested in several high-growth potential startups that are making a significant impact, including Alice, Chaiz, EarlyBird, Foyer, Mirza, OS Benefits, PartnerSlate, and Suma.
ResilienceVC was founded in 2023 by Dosani and Raj, two seasoned experts in fintech venture capital, operational leadership, and financial services innovation. Together, they have many years of experience, including their time as co-leaders at Accion Venture Lab. There, they jointly invested in and managed over 50 different companies. Many of those companies went on to become successful, with several evolving into highly valuable 'unicorn' startups.
Their experience isn't limited to just investments. Dosani and Raj also have operational experience, having worked in financial services startups, including microfinance institutions in India and Afghanistan's first mobile payment system. These experiences provided them with a unique understanding of financial customer needs and how to serve them effectively.
'When people have easy access to high-quality, relevant, and affordable financial tools through channels they are already familiar with, they can increase earnings, reduce expenses, mitigate risks, and build assets,' says Dosani. 'This is a win-win as it creates financial resilience for Americans as well as more stable, loyal, and profitable customers for the companies providing those services.'
Avi Karnani, CEO and co-founder of Alice—one of ResilienceVC's portfolio companies—shares his experience: 'Vikas and Tahira actively help us navigate the complexities of bringing pre-tax benefits to hourly workers. They focus on what matters—from introductions to operational guidance and strategic support.'
'At Spring Point Partners, we champion community-driven change by investing in transformational leaders, networks, and solutions that break down barriers to economic opportunity," said Sabrina Bainbridge, associate director of investments at Spring Point Partners. "We are excited to back ResilienceVC's debut fund as their thesis directly reflects that commitment, and their mission to drive meaningful innovation in financial resilience for Americans is strongly aligned with our broader vision of economic justice."
Raising a first-time fund is a formidable challenge, even in the best of economic climates. ResilienceVC fundraised in the turbulent years of 2023 and 2024. Macroeconomic headwinds and a cooling venture capital market created significant obstacles.
A key factor in their success was the strong track record of co-founders Dosani and Raj. While ResilienceVC was a first-time fund, Dosani and Raj were not first-time fund managers. Their track record at Accion Venture Lab helped build trust with investors.
By focusing on financial resilience, they tapped into a growing awareness of the economic struggles facing much of the U.S. population. Interestingly, the firm's mission attracted interest from both sides of the political spectrum.
"I really believe that impact investing writ large is something that can appeal equally to the left and right,' explains Dosani. The right likes impact investing because the private sector and capital markets take on these problems, not the public sector. The left likes it because of the impact piece and the social outcomes."
ResilienceVC's high-touch investment strategy impressed investors. By backing fewer companies, they can work more closely with each one. This "high conviction" approach appealed to investors who cared about more than just making a profit.
Locating the firm in Washington, D.C., was a strategic decision. Being based in the nation's capital provides ResilienceVC a unique vantage point from which to observe decision-making by regulators and policymakers. "You know, DC is maybe not the most obvious place to base a venture fund, but fintech companies need to stay abreast of what's happening on the policy and regulatory fronts," notes Dosani.
ResilienceVC has received investments from a range of limited partners. This included strategic investors from the financial services sector, such as MetLife and Ally Financial, as well as foundations like the Skoll Foundation, and family offices. The fact that family offices invested is particularly significant. As wealth increasingly transfers to the next generation, these offices are demonstrating a growing interest in investments that align with their values and have a positive social impact.
ResilienceVC also prioritized engaging high-net-worth women as LPs. Recognizing the underrepresentation of women in this asset class, the firm set a lower investment minimum for women. This initiative not only promotes inclusivity but also taps into a significant pool of capital that has been historically underserved.
ResilienceVC raised more money than its goal, demonstrating that more investors recognize both the profit potential and the social importance of fintech solutions that foster financial resilience. Their deep experience and hands-on approach with portfolio companies position them well to drive real innovation and help make the financial system more inclusive.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles

27 minutes ago
Chinese hackers and user lapses turn smartphones into a 'mobile security crisis'
WASHINGTON -- WASHINGTON (AP) — Cybersecurity investigators noticed a highly unusual software crash — it was affecting a small number of smartphones belonging to people who worked in government, politics, tech and journalism. The crashes, which began late last year and carried into 2025, were the tipoff to a sophisticated cyberattack that may have allowed hackers to infiltrate a phone without a single click from the user. The attackers left no clues about their identities, but investigators at the cybersecurity firm iVerify noticed that the victims all had something in common: They worked in fields of interest to China's government and had been targeted by Chinese hackers in the past. Foreign hackers have increasingly identified smartphones, other mobile devices and the apps they use as a weak link in U.S. cyberdefenses. Groups linked to China's military and intelligence service have targeted the smartphones of prominent Americans and burrowed deep into telecommunication networks, according to national security and tech experts. It shows how vulnerable mobile devices and apps are and the risk that security failures could expose sensitive information or leave American interests open to cyberattack, those experts say. 'The world is in a mobile security crisis right now,' said Rocky Cole, a former cybersecurity expert at the National Security Agency and Google and now chief operations officer at iVerify. 'No one is watching the phones.' U.S. authorities warned in December of a sprawling Chinese hacking campaign designed to gain access to the texts and phone conversations of an unknown number of Americans. 'They were able to listen in on phone calls in real time and able to read text messages,' said Rep. Raja Krishnamoorthi of Illinois. He is a member of the House Intelligence Committee and the senior Democrat on the Committee on the Chinese Communist Party, created to study the geopolitical threat from China. Chinese hackers also sought access to phones used by Donald Trump and running mate JD Vance during the 2024 campaign. The Chinese government has denied allegations of cyberespionage, and accused the U.S. of mounting its own cyberoperations. It says America cites national security as an excuse to issue sanctions against Chinese organizations and keep Chinese technology companies from the global market. 'The U.S. has long been using all kinds of despicable methods to steal other countries' secrets,' Lin Jian, a spokesman for China's foreign ministry, said at a recent press conference in response to questions about a CIA push to recruit Chinese informants. U.S. intelligence officials have said China poses a significant, persistent threat to U.S. economic and political interests, and it has harnessed the tools of digital conflict: online propaganda and disinformation, artificial intelligence and cyber surveillance and espionage designed to deliver a significant advantage in any military conflict. Mobile networks are a top concern. The U.S. and many of its closest allies have banned Chinese telecom companies from their networks. Other countries, including Germany, are phasing out Chinese involvement because of security concerns. But Chinese tech firms remain a big part of the systems in many nations, giving state-controlled companies a global footprint they could exploit for cyberattacks, experts say. Chinese telecom firms still maintain some routing and cloud storage systems in the U.S. — a growing concern to lawmakers. 'The American people deserve to know if Beijing is quietly using state-owned firms to infiltrate our critical infrastructure,' U.S. Rep. John Moolenaar, R-Mich. and chairman of the China committee, which in April issued subpoenas to Chinese telecom companies seeking information about their U.S. operations. Mobile devices can buy stocks, launch drones and run power plants. Their proliferation has often outpaced their security. The phones of top government officials are especially valuable, containing sensitive government information, passwords and an insider's glimpse into policy discussions and decision-making. The White House said last week that someone impersonating Susie Wiles, Trump's chief of staff, reached out to governors, senators and business leaders with texts and phone calls. It's unclear how the person obtained Wiles' connections, but they apparently gained access to the contacts in her personal cellphone, The Wall Street Journal reported. The messages and calls were not coming from Wiles' number, the newspaper reported. While most smartphones and tablets come with robust security, apps and connected devices often lack these protections or the regular software updates needed to stay ahead of new threats. That makes every fitness tracker, baby monitor or smart appliance another potential foothold for hackers looking to penetrate networks, retrieve information or infect systems with malware. Federal officials launched a program this year creating a 'cyber trust mark' for connected devices that meet federal security standards. But consumers and officials shouldn't lower their guard, said Snehal Antani, former chief technology officer for the Pentagon's Joint Special Operations Command. 'They're finding backdoors in Barbie dolls,' said Antani, now CEO of a cybersecurity firm, referring to concerns from researchers who successfully hacked the microphone of a digitally connected version of the toy. It doesn't matter how secure a mobile device is if the user doesn't follow basic security precautions, especially if their device contains classified or sensitive information, experts say. Mike Waltz, who departed as Trump's national security adviser, inadvertently added The Atlantic's editor-in-chief to a Signal chat used to discuss military plans with other top officials. Secretary of Defense Pete Hegseth had an internet connection that bypassed the Pentagon's security protocols set up in his office so he could use the Signal messaging app on a personal computer, the AP has reported. Hegseth has rejected assertions that he shared classified information on Signal, a popular encrypted messaging app not approved for the use of communicating classified information. China and other nations will try to take advantage of such lapses, and national security officials must take steps to prevent them from recurring, said Michael Williams, a national security expert at Syracuse University. 'They all have access to a variety of secure communications platforms,' Williams said. "We just can't share things willy-nilly.'


San Francisco Chronicle
3 hours ago
- San Francisco Chronicle
Chinese hackers and user lapses turn smartphones into a 'mobile security crisis'
WASHINGTON (AP) — Cybersecurity investigators noticed a highly unusual software crash — it was affecting a small number of smartphones belonging to people who worked in government, politics, tech and journalism. The crashes, which began late last year and carried into 2025, were the tipoff to a sophisticated cyberattack that may have allowed hackers to infiltrate a phone without a single click from the user. The attackers left no clues about their identities, but investigators at the cybersecurity firm iVerify noticed that the victims all had something in common: They worked in fields of interest to China's government and had been targeted by Chinese hackers in the past. Foreign hackers have increasingly identified smartphones, other mobile devices and the apps they use as a weak link in U.S. cyberdefenses. Groups linked to China's military and intelligence service have targeted the smartphones of prominent Americans and burrowed deep into telecommunication networks, according to national security and tech experts. It shows how vulnerable mobile devices and apps are and the risk that security failures could expose sensitive information or leave American interests open to cyberattack, those experts say. 'The world is in a mobile security crisis right now,' said Rocky Cole, a former cybersecurity expert at the National Security Agency and Google and now chief operations officer at iVerify. 'No one is watching the phones.' U.S. authorities warned in December of a sprawling Chinese hacking campaign designed to gain access to the texts and phone conversations of an unknown number of Americans. 'They were able to listen in on phone calls in real time and able to read text messages,' said Rep. Raja Krishnamoorthi of Illinois. He is a member of the House Intelligence Committee and the senior Democrat on the Committee on the Chinese Communist Party, created to study the geopolitical threat from China. Chinese hackers also sought access to phones used by Donald Trump and running mate JD Vance during the 2024 campaign. The Chinese government has denied allegations of cyberespionage, and accused the U.S. of mounting its own cyberoperations. It says America cites national security as an excuse to issue sanctions against Chinese organizations and keep Chinese technology companies from the global market. 'The U.S. has long been using all kinds of despicable methods to steal other countries' secrets,' Lin Jian, a spokesman for China's foreign ministry, said at a recent press conference in response to questions about a CIA push to recruit Chinese informants. U.S. intelligence officials have said China poses a significant, persistent threat to U.S. economic and political interests, and it has harnessed the tools of digital conflict: online propaganda and disinformation, artificial intelligence and cyber surveillance and espionage designed to deliver a significant advantage in any military conflict. Mobile networks are a top concern. The U.S. and many of its closest allies have banned Chinese telecom companies from their networks. Other countries, including Germany, are phasing out Chinese involvement because of security concerns. But Chinese tech firms remain a big part of the systems in many nations, giving state-controlled companies a global footprint they could exploit for cyberattacks, experts say. Chinese telecom firms still maintain some routing and cloud storage systems in the U.S. — a growing concern to lawmakers. 'The American people deserve to know if Beijing is quietly using state-owned firms to infiltrate our critical infrastructure,' U.S. Rep. John Moolenaar, R-Mich. and chairman of the China committee, which in April issued subpoenas to Chinese telecom companies seeking information about their U.S. operations. Mobile devices have become an intel treasure trove Mobile devices can buy stocks, launch drones and run power plants. Their proliferation has often outpaced their security. The phones of top government officials are especially valuable, containing sensitive government information, passwords and an insider's glimpse into policy discussions and decision-making. The White House said last week that someone impersonating Susie Wiles, Trump's chief of staff, reached out to governors, senators and business leaders with texts and phone calls. It's unclear how the person obtained Wiles' connections, but they apparently gained access to the contacts in her personal cellphone, The Wall Street Journal reported. The messages and calls were not coming from Wiles' number, the newspaper reported. While most smartphones and tablets come with robust security, apps and connected devices often lack these protections or the regular software updates needed to stay ahead of new threats. That makes every fitness tracker, baby monitor or smart appliance another potential foothold for hackers looking to penetrate networks, retrieve information or infect systems with malware. Federal officials launched a program this year creating a 'cyber trust mark' for connected devices that meet federal security standards. But consumers and officials shouldn't lower their guard, said Snehal Antani, former chief technology officer for the Pentagon's Joint Special Operations Command. 'They're finding backdoors in Barbie dolls,' said Antani, now CEO of a cybersecurity firm, referring to concerns from researchers who successfully hacked the microphone of a digitally connected version of the toy. Risks emerge when smartphone users don't take precautions It doesn't matter how secure a mobile device is if the user doesn't follow basic security precautions, especially if their device contains classified or sensitive information, experts say. Mike Waltz, who departed as Trump's national security adviser, inadvertently added The Atlantic's editor-in-chief to a Signal chat used to discuss military plans with other top officials. Secretary of Defense Pete Hegseth had an internet connection that bypassed the Pentagon's security protocols set up in his office so he could use the Signal messaging app on a personal computer, the AP has reported. Hegseth has rejected assertions that he shared classified information on Signal, a popular encrypted messaging app not approved for the use of communicating classified information. China and other nations will try to take advantage of such lapses, and national security officials must take steps to prevent them from recurring, said Michael Williams, a national security expert at Syracuse University. 'They all have access to a variety of secure communications platforms,' Williams said. "We just can't share things willy-nilly.'
Yahoo
3 hours ago
- Yahoo
Americans' Electric Bills Are Headed Higher With the Temperatures
Americans can expect to pay more to stay cool this summer thanks to forecasts for above-average temperatures across the country and natural-gas prices that are heading into air-conditioning season 37% higher than last year. On average, Americans should count on their electricity bills in June, July and August rising 4% from last year, mostly due to more expensive natural gas, according to the Energy Information Administration. New England—where a dearth of gas pipelines keeps energy prices among the highest in the country—should see the biggest jump in monthly bills, up 6.7% from last year, to about $200.