“Weekend Briefing” is a weekly newsletter sent to subscribers of The Readable every Friday. Our journalists select important news items from the previous week on topics ranging from privacy to policy development in cybersecurity, all to help you stay abreast of the latest breaking issues.
A groundbreaking report by cybersecurity experts has just been published. The report is a collaboration between DEF CON and the University of Chicago’s Harris School of Public Policy, aiming to bridge the gap between cybersecurity advancements and policymaking. Below is a summary of the report, along with a link to the full text.
Security concerns surrounding DeepSeek have dominated global headlines this week. Meanwhile, cybercrimes targeting the healthcare industry remain widespread. This article also includes key insights from the latest Chainalysis report on ransomware trends, along with recent government announcements.
This is Dain Oh reporting from South Korea, and here is your weekend briefing.
1. Hackers’ Almanack: Bridging cybersecurity breakthroughs with public policy – FULL REPORT
Released on Feb. 6 by DEF CON and the University of Chicago’s Harris School of Public Policy, The Hackers’ Almanack is an annual report which aims to integrate cutting-edge cybersecurity research into public policy discussions. The report highlights key technological breakthroughs presented at DEF CON, focusing on their broader societal and regulatory implications.
Among its key findings, the report underscores the shortcomings of current artificial intelligence security testing methods, particularly in light of DeepSeek, and calls for standardized security evaluation frameworks across the AI and cybersecurity industries. It also presents biomedical security research, demonstrating how hacking biomedical formulas could help produce life-saving medicines for low-income communities. Additionally, the report raises ethical questions about cyber vigilantism, citing a case where a DEF CON hacker infiltrated a ransomware gang to warn potential victims before an attack.
Beyond these core topics, The Hackers’ Almanack details several other major security vulnerabilities uncovered by researchers. These include critical weaknesses in Bluetooth security across multiple car manufacturers and aviation systems, as well as large-scale modem hacking techniques that could allow attackers to execute commands on millions of devices.
The report also exposes flaws in widely used cryptographic access control systems and electronic locks, demonstrating how a single compromised device could threaten an entire network. Additionally, it highlights security gaps in cloud services affecting thousands of major corporations, identifies key technologies needed to secure electric vehicle charging infrastructure, and uncovers new vulnerabilities in widely used electronic voting machines.
The Hackers’ Almanack seeks to bridge the gap between the hacker community and policymakers, emphasizing that cybersecurity challenges require more than technical expertise—they demand a multidisciplinary approach.
Through Project Franklin, named after Benjamin Franklin, DEF CON and the University of Chicago aim to promote both scientific inquiry and civic responsibility. Just as Franklin advanced electricity while shaping democratic foundations, this initiative seeks to harness the hacker community’s knowledge to drive meaningful policy change. By providing a platform for factual, research-backed cybersecurity insights, The Hackers’ Almanack challenges policymakers to confront the digital vulnerabilities that underpin modern society.
- Related content: Black Hat 2024 & DEF CON 32 Recap Report by The Readable
2. Florida man pleads guilty to large-scale hacking and spamming scheme using stolen email accounts – US Justice Department
Timothy Livingston, 31, of Boca Raton, Florida, pleaded guilty to orchestrating a sophisticated hacking and identity theft operation. Through his company, A Whole Lot of Nothing LLC, Livingston specialized in sending unsolicited bulk emails, or spam, on behalf of various clients.
His clientele ranged from legitimate businesses, such as insurance companies seeking mass advertising, to illicit operations, including online pharmacies selling narcotics without prescriptions. From 2011 onward, his scheme generated more than $1.3 million in illicit profits.
To carry out the scheme, Livingston partnered with programmer Tomasz Chmielarz in January 2012 to develop software that masked the origin of spam emails and bypassed spam filters. Using proxy servers and botnets, Livingston maintained anonymity and evaded detection by anti-spam measures.
He also hacked into individual email accounts and exploited corporate mail servers to send massive volumes of spam while concealing his identity. These breaches not only compromised personal and corporate security but also violated multiple federal laws.
The scale and audacity of Livingston’s crimes underscore their severity. By infiltrating personal email accounts and corporate servers, he not only violated individual privacy but also threatened corporate security and integrity. His substantial illegal profits highlight the widespread impact of his operation.
3. South Korean government and companies restrict China’s AI ‘DeepSeek’ over security concerns – The Readable
Several South Korean government agencies, including the Ministry of Foreign Affairs and the Ministry of Trade, Industry and Energy, have blocked access to the Chinese artificial intelligence platform DeepSeek over concerns about excessive data collection, multiple local news outlets reported Thursday.
These ministries handle sensitive diplomatic and trade-related information, and their decision reflects broader government concerns about potential leaks when using generative AI technologies. The Ministry of the Interior and Safety had previously warned government agencies to be cautious with AI platforms like DeepSeek and ChatGPT, emphasizing the need to avoid inputting sensitive or personal data. READ MORE
4. Chinese AI company DeepSeek left troves of sensitive data exposed, cyber firm says – The Readable
Chinese AI startup DeepSeek left a database containing sensitive information—including chat history, secret keys, and backend system details—publicly accessible online, cybersecurity firm Wiz reported last week.
While reviewing DeepSeek’s online infrastructure, Wiz discovered that a ClickHouse database had been left publicly accessible with no authentication required, the cybersecurity firm said in findings posted Jan. 29. READ MORE
5. Ransomware payments decline, but incidents rise amid evolving threats – Chainalysis
In 2024, ransomware attackers collected about $813.6 million in payments from victims, a 35% drop from the record $1.25 billion in 2023. The decline is largely attributed to increased law enforcement efforts, improved international cooperation, and a growing refusal by victims to pay ransoms. READ MORE
6. Canadian man charged in $65 million crypto fraud and money laundering scheme – US Justice Department
Canadian citizen Andean Medjedovic has been charged with fraud for allegedly exploiting vulnerabilities in two cryptocurrency platforms, KyberSwap and Indexed Finance, to steal approximately $65 million from investors. Between 2021 and 2023, he used deceptive trading methods to manipulate the platforms’ automated systems, causing them to miscalculate prices and enabling him to withdraw funds at artificially low values, leaving investors with worthless assets. READ MORE
7. Global operation shuts down major cybercrime marketplaces, charges administrator – US Justice Department
U.S. and international law enforcement agencies have dismantled two major online cybercrime marketplaces, Cracked and Nulled, which were used to sell stolen login credentials, hacking tools, and personal data. With millions of users, these platforms facilitated large-scale cybercrime, including identity theft and financial fraud. The FBI, along with its global partners, seized their websites, servers, and payment processing systems to disrupt these illegal activities. READ MORE
8. Russia ‘hacked Starmer’s dangerously obvious email account’ – The Telegraph
Russian hackers are believed to have breached Sir Keir Starmer’s personal email account in 2022, when he was leader of the U.K. opposition. He is now the Prime Minister. Following concerns that the account had been compromised, U.K. security services advised him to abandon it, though there is no evidence that any emails were leaked or published. The account’s security was reportedly ‘dangerously obvious,’ prompting Starmer to switch to a more secure account with two-factor authentication after the breach was discovered. Senior Labour officials were briefed on the incident, and a note was circulated instructing staff not to email Starmer without prior explanation. READ MORE
9. Over 1 million patient records stolen in major healthcare data breach – Forbes
A major data breach at Community Health Center, a Connecticut-based healthcare provider, has exposed the personal and medical records of over one million patients. Discovered on January 2, the breach allowed a skilled hacker to access sensitive data, including names, Social Security numbers, medical diagnoses, and health insurance details. Although the attack did not involve ransomware, the stolen data poses a significant risk for identity theft and fraud. The organization claims it stopped the hacker within hours and has since strengthened its security measures. READ MORE
10. Asheville Eye Associates reports data breach affecting 193,000 patients – HIPAA Journal
Asheville Eye Associates, an eye care provider in western North Carolina, has disclosed a cyberattack that compromised the personal and protected health information of about 193,300 patients. The breach involved unauthorized access to names, addresses, health insurance details and medical treatment information. READ MORE