Researchers from security firm Eclypsium have called out DNA sequencer Illumina iSeq 100 for not using Microsoft’s Secure Boot protection tool, potentially leaving it vulnerable to firmware attacks. The sequencer can boot from a legacy mode, using older systems which harbour years’ worth of potential vulnerabilities. Hardware Read/Write protections are not enabled, allowing an attacker to modify the device’s firmware. The sequencer is common in labs globally, including at gene-testing firm 23andMe.

The NCSC wants developers to get serious on software security
The NCSC’s new Software Security Code of Practice has been praised by cyber professionals as a significant advancement in enhancing software supply chain security.