DNA sequencer company notifying customers of vulnerabilities in popular device
Summary: A cybersecurity firm discovered vulnerabilities in the Illumina iSeq 100 DNA sequencer, which could allow hackers to disable the device or gain unauthorized access. The vulnerabilities stem from outdated firmware, posing risks to genetic analysis and medical data integrity.

Threat Actor: PRC nation state or commercial/ransomware threat group | PRC nation state Victim: Illumina | Illumina

Key Point :

Vulnerabilities allow attackers to overwrite firmware, potentially disabling the device or enabling persistent access.…
Read More
Consumer products to get ‘Cyber Trust’ marks in 2025, White House says
Summary: The U.S. Cyber Trust Mark will soon be introduced on consumer smart devices, providing a way for consumers to identify products that meet federal cybersecurity standards. This initiative aims to enhance consumer confidence in the security of connected devices amid rising cyber threats.

Threat Actor: Cyber attackers | cyber attackers Victim: American consumers | American consumers

Key Point :

The Cyber Trust Mark program allows manufacturers to undergo cybersecurity audits for their smart products.…
Read More
‘We have to prioritize cybersecurity’ within federal budgets, outgoing cyber czar says
Summary: The outgoing National Cyber Director emphasizes the importance of maintaining cybersecurity priorities in federal budget requests, urging the incoming Trump administration to recognize its significance. He highlights the need for budget guidance to enhance digital security amidst a challenging fiscal environment.

Threat Actor: National Cyber Director | National Cyber Director Victim: Federal Agencies | federal agencies

Key Point :

The ONCD and OMB published cybersecurity benchmarks for fiscal 2026 budgets.…
Read More
Threat Actor: Unknown | unknown Victim: Habib’s Fast-Food Chain | Habib’s Fast-Food Chain Price: $10,000 Exfiltrated Data Type: Customer Data

Key Points :

Customer data from Habib’s Fast-Food Chain has been leaked. The breach may include sensitive information such as names, addresses, and payment details. The threat actor remains unidentified, raising concerns about the security of similar businesses.…
Read More
Genetic Engineering Meets Reverse Engineering: DNA Sequencer’s Vulnerable BIOS
Eclypsium’s research reveals significant BIOS/UEFI vulnerabilities in the Illumina iSeq 100 DNA sequencer, highlighting risks associated with outdated firmware and lack of security features. These vulnerabilities could allow attackers to modify firmware, posing serious supply chain security threats. Affected Platform: Illumina iSeq 100

Keypoints :

Illumina iSeq 100 uses outdated BIOS firmware without Secure Boot or write protections.…
Read More
Washington state sues T-Mobile over allegedly shoddy cyber practices leading to 2021 breach
Summary: T-Mobile is facing a consumer protection lawsuit from Washington state due to alleged cybersecurity failures that compromised the personal data of over 2 million residents. The lawsuit claims the company was aware of its vulnerabilities yet failed to rectify them, leading to significant data breaches and identity theft risks.…
Read More
UN aviation agency ‘actively investigating’ cybercriminal’s claimed data breach
Summary: The U.N.’s International Civil Aviation Organization (ICAO) is investigating a potential information security incident following claims of a data breach by a threat actor. The breach reportedly involves the compromise of 42,000 documents containing personal data of individuals associated with ICAO.

Threat Actor: Natohub | Natohub Victim: International Civil Aviation Organization (ICAO) | International Civil Aviation Organization

Key Point :

ICAO is investigating claims of a breach involving personal data of 42,000 individuals.…
Read More
Farewell to the Fallen: The Cybersecurity Stars We Lost Last Year
Summary: This article reflects on the cybersecurity solutions that have become obsolete in 2024, highlighting their vulnerabilities and the advancements that have emerged to replace them. It emphasizes the importance of adapting to evolving cyber threats and the shift towards more secure technologies.

Threat Actor: Cybercriminals | cybercriminals Victim: Organizations | organizations

Key Point :

Legacy Multi-Factor Authentication (MFA) became obsolete due to vulnerabilities to modern attack techniques like phishing and SIM swapping.…
Read More

Cyberhaven faced a significant data breach involving a malicious browser extension that targeted customer accounts for information theft. The incident underscores the vulnerabilities associated with browser extensions and the need for improved extension management practices. Affected Platform: Chrome Web Store

Keypoints :

Cyberhaven’s breach was due to the compromise of a Chrome Web Store administrative account.…
Read More
CISA: Treasury was only federal agency impacted by recent China breach
Summary: A recent breach by state-backed Chinese hackers primarily affected the U.S. Treasury Department, which was targeted for its sensitive information regarding potential sanctions. The Cybersecurity and Infrastructure Security Agency (CISA) is collaborating with the Treasury and BeyondTrust to address the incident’s implications.

Threat Actor: Chinese state-backed hackers | Chinese state-backed hackers Victim: U.S.…

Read More

The video discusses the significance of bug bounty programs in enhancing cybersecurity practices at Amazon. It emphasizes the importance of ethical and responsible research and how various researchers contribute to continuous learning and improvement within the company. The speaker highlights the collaboration with HackerOne and their commitment to fostering relationships with the security research community.…
Read More

Summary: Recent cyberattacks on U.S. school districts during the holiday season highlight the ongoing trend of targeting educational institutions when IT resources are limited. Notably, South Portland Public Schools and Rutherford County Schools reported significant disruptions and data breaches, prompting investigations and recovery efforts.

Threat Actor: Unknown | unknown Victim: South Portland Public Schools, Rutherford County Schools | South Portland Public Schools, Rutherford County Schools

Key Point :

South Portland Public Schools experienced a cyberattack that compromised their firewall, but no student data was believed to be stolen.…
Read More

Summary: Argentina’s airport security police (PSA) experienced a cyberattack that compromised personal and financial data, leading to unauthorized deductions from employees’ salaries. The breach is believed to have exploited a vulnerability in Banco Nación’s systems, raising concerns about internal accomplices and the motivations behind the attack.…
Read More

Summary: A significant outage in Russia affected multiple online services due to issues with a telecom operator’s network, as reported by the country’s internet regulator. While the incident has been resolved, many users continue to experience disruptions in accessing various platforms and services.

Threat Actor: Russia’s internet regulator | Russia’s internet regulator Victim: Russian online users | Russian online users

Key Point :

Outage affected access to major platforms like Google, Yandex, and VKontakte.…
Read More

Summary: The increasing data collection by car manufacturers, exemplified by Tesla’s detailed tracking of a Cybertruck driver involved in an explosion, raises significant privacy concerns. Experts debate the balance between law enforcement needs and individual privacy rights as vehicles become more like data-collecting devices.

Threat Actor: Tesla | Tesla Victim: Matthew Livelsberger | Matthew Livelsberger

Key Point :

Tesla’s data collection proved crucial for law enforcement in tracking the driver’s movements after a Cybertruck explosion.…
Read More

The ClickFix campaign utilizes social engineering tactics to deploy malware on Windows and macOS platforms by presenting fake Google Meet error messages. Users are tricked into downloading malware disguised as troubleshooting files. This campaign highlights the dangers of browser-based attacks and the need for enhanced security measures.…
Read More