Toggle light / dark theme

Fluicell, a bioprinting firm based in Sweden, has launched its new high-precision 3D printer, the Biopixlar AER.

Intended as a successor to the original Biopixlar, the device is Fluicell’s second single-cell 3D bioprinting system. The company has designed its latest machine to be as compact and accessible as possible, and claims that it’s the world’s first microfluidic bioprinter that fits inside a standard flow hood or biosafety cabinet. This enables users to easily integrate it with other in vitro and 3D cell culture technologies.

Victoire Viannay, CEO of Fluicell, said, “With Biopixlar AER, we have reached a new important milestone and we can now offer a pioneering product, fully tailored to meet current and future needs in the rapidly accelerating life science and research sector.”

Immunomodulatory Biomaterials In Regenerative Medicine — Dr. Kara Spiller-Geisler, Ph.D., Drexel University School of Biomedical Engineering, Science and Health Systems.


Dr. Kara Spiller, PhD (https://drexel.edu/biomed/faculty/core/SpillerKara/) is Associate Professor in the Biomaterials and Regenerative Medicine Laboratory at Drexel University, in Philadelphia.

Dr. Spiller received her bachelor’s, master’s, and doctoral degrees in biomedical engineering from Drexel University where she conducted her doctoral research in the design of semi-degradable hydrogels for the repair of articular cartilage in the Biomaterials and Drug Delivery Laboratory at Drexel, and in the Shanghai Key Tissue Engineering Laboratory of Shanghai Jiao Tong University.

MercadoLibre, one of the most important e-commerce companies in Latin America, confirmed unauthorized access to a part of its source code, in addition to confirming that the attackers managed to access the personal records of some 300,000 users. The company has not confirmed that its IT infrastructure was affected during the incident.

The Argentine firm confirmed the compromise of its systems after hackers from the Latin American group Lapsus$ threatened to expose confidential information from MercadoLibre and other e-commerce platforms. Faced with this threat, MercadoLibre enabled all its security and containment protocols, so it recommended that users of the platform change their passwords and monitor their account statements to prevent any attempt at malicious activity.

MercadoLibre has established itself as the largest e-commerce and payment processing ecosystem in Latin America. It currently has more than 140 million active buyers and sellers in Argentina, Brazil, Chile, Colombia, Mexico, Peru and Venezuela.

A report by cybersecurity firm Binarly points to the detection of 16 critical vulnerabilities in various implementations of Unified Extensible Firmware Interface (UEFI), present in multiple HP enterprise devices. According to the researchers, threat actors can exploit these flaws to implant firmware capable of evading UEFI Secure Boot, Intel Boot Guard, and virtualization-based security measures.

Cybersecurity specialists reported the detection of multiple vulnerabilities in IBM Security QRadar SOAR. According to the report, successful exploitation of these flaws would allow the deployment of severe attack scenarios.

Below are brief descriptions of the reported flaws, in addition to their tracking keys and scorings assigned according to the Common Vulnerability Scoring System (CVSS).

CVE-2021–41182: The insufficient sanitization of values passed as the ‘altField‘ option of the Datepicker widget would allow remote attackers to inject and run arbitrary JavaScript code in affected users’ browsers.

A report specialized in WordPress security points to a 150% increase in reported flaws during 2021 compared to the previous year, in addition to establishing that almost 30% of the vulnerabilities detected in plugins for WordPress do not receive updates.

Since this is the most widely used content management system (CMS) in the world, this should be a worrisome issue for tens of millions of website administrators.

According to Patchstack specialists, of all the flaws reported in 2021, only 0.58% resided in the WordPress core, while the rest affect themes and plugins created by dozens of developers. In addition, about 92% of these flaws are in free plugins, while paid plugins were affected by 8.6% of the failures reported last year.