-

The Challenges Series – Part 1: Different Perspectives = Different Priorities
Introduction In an earlier post, we discussed some of the challenges facing Biomedical Engineering departments when dealing with cybersecurity. In a series of posts, starting with this one, we’ll delve deeper into the challenges faced by clinical engineering departments when addressing cybersecurity for medical devices. Hopefully, by identifying some of the issues, we can move…
-

Abbott ID Now Device Alert
If exploited, the vulnerability could allow device settings to be modified and/or interrupt the instrument startup process. The ability to exploit this vulnerability is limited, as it would require a direct physical intrusion into the instrument and would require the user to gain access to and tamper with an internal port or memory. Abbott has…
-

-

The Impetus
Over the last 10 years we have spent a lot of time researching cybersecurity vulnerabilities for medical devices. In that time several themes arise repeatedly; information is highly fragmentary, if it can be found at all, and it is poorly cross-referenced. Even our good friends to the South have not managed to compile a good,…
-

Illumina Universal Copy Service
Successful exploitation of these vulnerabilities could allow an attacker to take any action at the operating system level. A threat actor could impact settings, configurations, software, or data on the affected product; a threat actor could interact through the affected product via a connected network. CISA Number: ICSMA-23-117-01 CVE Number: Multiple CVE’s are involved in…






