11.4 C
New York
Thursday, March 27, 2025
Home Blog Page 3

Blacklock Ransomware Infrastructure Breached, Revealing Deliberate Assaults

0


Resecurity, a outstanding cybersecurity agency, has efficiently exploited a vulnerability within the Information Leak Website (DLS) of Blacklock Ransomware, gaining unprecedented entry to the group’s infrastructure.

This breach, occurring in the course of the winter of 2024-2025, allowed researchers to gather substantial intelligence concerning the ransomware group’s actions and deliberate assaults.

Exploitation of Native File Embrace Vulnerability

The compromise was achieved by way of the exploitation of a Native File Embrace (LFI) vulnerability current within the DLS hosted on the TOR community.

This safety flaw enabled Resecurity’s analysts to accumulate crucial artifacts associated to the risk actors’ community infrastructure, together with logs, related file-sharing accounts, and timestamps of logins.

Uncovering Deliberate Assaults and Sufferer Information

Leveraging the gained entry, Resecurity was in a position to gather details about deliberate knowledge publications from victims as much as 13 days earlier than the risk actors meant to launch it.

In a single occasion, the agency alerted the Canadian Centre for Cyber Safety about an impending assault on a Canada-based sufferer almost two weeks earlier than the deliberate knowledge leak.

The breach additionally revealed the group’s use of MEGA, a well-liked file-sharing service, for storing and transferring stolen knowledge.

Researchers recognized no less than eight e-mail accounts related to MEGA folders managed by Blacklock Ransomware, offering perception into their knowledge exfiltration strategies.

Blacklock RansomwareBlacklock Ransomware
e-mail account registered

The investigation uncovered potential hyperlinks between Blacklock Ransomware and different cybercriminal teams.

Code similarities have been discovered between Blacklock and DragonForce ransomware, suggesting doable cooperation or a transition of possession.

This discovery highlights the dynamic nature of the ransomware ecosystem and the potential for market consolidation amongst cybercriminal teams.

The Blacklock Ransomware DLS was defaced and technically liquidated, with configuration information being publicly disclosed.

This occasion, together with the compromise of the associated Mamona ransomware venture, suggests a big disruption to the group’s operations and a possible shift within the ransomware panorama.

This breach of Blacklock Ransomware’s infrastructure supplies beneficial insights into the operations of ransomware teams and demonstrates the effectiveness of proactive cybersecurity measures in combating these threats.

Because the ransomware ecosystem continues to evolve, such intelligence-gathering efforts play a vital function in understanding and mitigating cyber dangers.

Are you from SOC/DFIR Groups? – Analyse Malware, Phishing Incidents & get stay Entry with ANY.RUN -> Begin Now for Free

How AI and Machine Studying Are Shaping Cybersecurity


Cyberattacks have gotten extra superior and are occurring extra usually, with the price of cybercrime anticipated to succeed in $15.63 trillion by 2029. Older safety strategies simply can’t sustain with evolving threats, which is the place Synthetic Intelligence (AI) and Machine Studying (ML) are available in. Geared up with superior programs, these applied sciences can spot and stop threats earlier than they occur, resulting in smarter and quicker safety.

Companies are working tougher to guard themselves. For instance, the common spends on cybersecurity by Fortune 500 firms is roughly $20 million, which incorporates encryption and fraud detection instruments to guard buyer accounts.

The iGaming sector, as an example, invests closely in cybersecurity. On-line casinos provide gamers real-money video games, which require private particulars and monetary transactions. Naturally, gamers anticipate a safe and reliable expertise. As author Liliana Costache from Card Participant factors out, the perfect on-line casinos provide a authorized and protected gaming expertise with quick withdrawals and dependable cost choices, together with cryptocurrencies that present enhanced safety and privateness (Supply:https://www.cardplayer.com/online-casinos). With on-line playing rising in popularity, making certain security and transparency is now a high precedence for each gamers and operators.

How AI and Machine Studying Are Shaping Cybersecurity

The Evolution of Safety Testing

Cyberattacks are occurring extra usually and are getting extra superior. Ransomware, for instance, hackers lock up your knowledge and demand cost to unlock it. Older instruments like firewalls and antivirus applications can’t deal with at the moment’s threats, so smarter and extra adaptable safety options are wanted.

An enormous problem is human error. Easy errors, like organising a system incorrectly or lacking safety points, make it a lot simpler for risk actors to hack. In 2021, Fb skilled an enormous knowledge breach affecting 533 million customers, all due to a system misconfiguration.

Scalability is one other situation. It turns into tougher for firms to handle safety when the enterprise grows and expands its community and units, which is why stronger safety programs are wanted.

How AI and Machine Studying Are Altering Cybersecurity

AI and Machine Studying can rapidly scan huge quantities of information, spot uncommon exercise, and even predict potential assaults earlier than they occur. For instance, if somebody tries to log in from an uncommon location, AI can flag it and take motion immediately. In contrast to conventional strategies, which depend on predefined guidelines, AI and ML can adapt and study from new knowledge making it even higher at catching superior assaults over time.

AI and Machine Studying in Cybersecurity Instruments

AI and machine studying are defending programs from cyber threats and shaping cybersecurity utilizing a number of instruments:

Automated Risk Detection and Prediction

AI can monitor programs in real-time and detect uncommon actions, like unauthorized logins, and spot new safety threats, together with zero-day assaults and vulnerabilities that hackers exploit earlier than they’re found. By analyzing person conduct, AI can detect uncommon patterns which may sign a breach and reply immediately. IBM’s Watson for Cybersecurity analyzes huge quantities of information to establish dangers so firms can cut back response instances and decrease injury from cyberattacks.

Penetration Testing and Discovering Weak Spots

AI-powered instruments can check safety programs quicker and extra completely than people, being able to investigate previous assaults and system constructions to foretell the place hackers may strike subsequent. AI-driven penetration testing works by simulating cyberattacks to uncover vulnerabilities. Some startups, like Concord Intelligence, are even growing AI that acts like an moral hacker, continually trying to find weak spots earlier than actual attackers can discover them.

Behavioral Evaluation

ML algorithms examine person conduct to identify anomalies. For instance, if an worker out of the blue accesses delicate information at odd hours, the system can flag it as suspicious.

Fraud Prevention and Identification Safety

AI can spot scams, like phishing emails and deepfake movies, by analyzing communication patterns and flagging something suspicious earlier than it causes hurt. For example, to strengthen its AI-powered fraud detection, Mastercard just lately acquired Recorded Future making it even tougher for scammers to succeed.

Moreover, banks depend on AI to catch and cease fraudulent transactions in actual time. In 2023 alone, the FBI’s Web Crime Criticism Middle (IC3) obtained 21,489 complaints about enterprise e-mail compromise (BEC) scams, with reported losses exceeding $2.9 billion. AI can rapidly establish uncommon exercise like these and stop fraud, maintaining folks’s cash and identities protected.

AI in Cloud and IoT Safety

With the rise of cloud computing and Web of Issues (IoT) units like sensible cameras, new safety challenges have emerged, with many units having weak safety. This makes them enticing targets for cybercriminals. AI monitoring checks programs immediately, finds uncommon exercise or threats rapidly, and retains vital knowledge and units safe in a fast-changing digital world.

Challenges and Limitations of AI in Cybersecurity

Whereas AI affords many advantages, it additionally presents challenges:

  • False Positives/Negatives: AI programs might generally misidentify innocent actions as threats, overlooking precise threats and flagging innocent actions as threats.
  • AI’s Dependence on Knowledge and the Threat of Bias: AI programs study from the information they’re given, so if the information is incomplete or biased, the AI received’t work as properly, resulting in unfair choices, particularly when monitoring person conduct. If the coaching knowledge doesn’t characterize all customers correctly, the AI may mistakenly flag sure teams greater than others.
  • Enemy AI: Hackers can use AI to create extra subtle assaults, like deepfake movies and audio, creating an arms race in cybersecurity.

The Way forward for AI and ML in Cybersecurity

AI is altering how we maintain issues protected on-line. One is ‘explainable AI,’ which implies the AI can inform us why it thinks one thing is harmful so we are able to perceive the threats higher and make smarter selections about our safety. Additionally, quantum computer systems may make programs exceptionally protected however may additionally break present safety codes. Corporations would want to start out utilizing these new applied sciences and train groups use them correctly.

Conclusion

With AI and machine studying, there are new methods to combat cyberattacks, predicting and stopping threats quicker and higher than earlier than. Nevertheless, human supervision is vital to make sure AI and ML work properly and make accountable selections. Utilizing AI rigorously might be essential to maintaining us protected on-line as cyberattacks improve.

Highlight on Success: Celebrating the Winners of the U.S. Quick Future Innovation Awards


From Silicon Valley to the bustling streets of New York, america is a powerhouse of innovation, pushed by a dynamic mix of groundbreaking analysis, entry to superior applied sciences, and an unwavering entrepreneurial spirit. At Cisco, we’re not simply observing this vibrant scene—we’re actively fueling it. Our Quick Future Innovation Awards (FFIA) are extra than simply accolades; they’re the lifeblood of a thriving ecosystem, empowering startups to remodel their visionary concepts into actuality throughout the nation.

Initially conceived in Canada and backed by the Nation Digital Acceleration (CDA) program, which has been pivotal in advancing digital initiatives throughout 50 international locations,these awards cater to a large spectrum of industries—from agriculture to sensible buildings and cybersecurity—emphasizing the transformative potential of synthetic intelligence this 12 months.

The awards goal to empower corporations which can be set to make a major constructive affect however require further assets to attain their full potential. In a panorama ripe with AI innovation, the U.S. FFIA invitations trailblazers to create options that not solely drive enterprise success but additionally tackle key financial, social, and environmental points. Whether or not your focus is schooling, sustainability, hybrid work, cybersecurity, healthcare, or essential infrastructure, your concepts could possibly be the catalyst for change in how we reside and work. 

 

Highlight on AI-Pushed Innovation 

This 12 months, we’re thrilled to acknowledge the transformative efforts of our FFIA winners, who’re main the cost in moral, people-first AI options that promise an inclusive and forward-thinking future. These trailblazing corporations—Radius AI, Autonoma Labs, and AI Progress Ops—are setting new requirements for AI implementation throughout the U.S. and globally, revolutionizing the best way we interact with expertise in retail shops, workplaces, and airports. 

 


Revolutionizing Retail with Visionary Know-how 

Ushering in a brand new period of modernization by way of human-centric and moral options, Radius AI is pioneering developments in retail with their Imaginative and prescient AI expertise. This cutting-edge strategy shouldn’t be solely decreasing losses and enhancing margins for retailers but additionally implementing methods to draw and retain a talented workforce, boosting productiveness, and driving digital transformation. By enhancing self-checkout processes, Imaginative and prescient AI minimizes theft and revenue loss, whereas concurrently elevating the client expertise with lowered wait occasions and streamlined transactions. The true-time information and analytics offered empower workers, considerably enhancing their satisfaction and productiveness, and setting a brand new customary for retail innovation. 

 

Navigating New Heights in Airport Effectivity 

Autonoma Labs is redefining airport effectivity and environmental affect by way of their progressive Autoverse undertaking. By leveraging Digital Twins, they create detailed simulations of high-traffic areas like terminals and runways, providing predictive modeling and AI-driven insights that rework airport administration. This forward-thinking strategy enhances passenger security and boosts operational effectivity, making certain journey turns into smoother and safer for everybody.

With Autoverse, Autonoma Labs is setting new requirements for airport innovation, paving the best way for a future the place expertise seamlessly enhances the journey expertise. 

 

Reworking Workplaces with Clever Productiveness 

Think about boosting office productiveness with progressive AI options that problem the norms of conventional undertaking administration instruments—that is the promise of AI Progress Ops. On the coronary heart of their strategy is Context-Conscious Process Help, a dynamic characteristic that learns out of your work habits and adapts to your wants, providing well timed breaks to advertise a wholesome work-life steadiness. By analyzing behavioral insights and integrating seamlessly with widespread platforms like Asana and Monday, AI Progress Ops delivers personalised sensible nudges that improve focus and effectivity. These tailor-made prompts cater to the various wants of all workers, together with those that are neurodivergent, fostering a extra inclusive, sustainable, and productive work surroundings. With AI Progress Ops, groups can expertise a transformative strategy to productiveness that aligns with fashionable office dynamics. 

 Collectively, these visionary corporations are redefining the way forward for AI, setting a brand new benchmark for innovation and human-centered expertise. Be part of us in celebrating their exceptional contributions as they cleared the path towards a brighter, extra environment friendly future. 

 

Celebrating our Previous Winners 

The spirit of innovation and collaboration is completely captured within the Quick Future Innovation Awards. For years, these awards have spotlighted trailblazers who redefine their industries, celebrating those that exhibit extraordinary ingenuity and set new benchmarks of their fields. Every year, we honor the achievements of previous winners who encourage us to proceed reaching for brand new heights in innovation. 

Previous winners like Honeywell have championed sustainability with sensible constructing options, whereas Morgan Photo voltaic has harnessed the facility of photo voltaic power to rework collaboration and assembly areas. These exemplary achievements underscore the transformative affect of expertise, inspiring others to push boundaries and embrace the long run.  

 


Discovering Tomorrow’s Improvements with Cisco 

As we proceed to have a good time the exceptional achievements of our FFIA winners, we invite you to delve deeper into Cisco’s initiatives which can be shaping the long run. Our Nation Digital Acceleration program is on the forefront of driving technological developments throughout various industries, empowering corporations to harness the transformative potential of AI and different rising applied sciences.  

Be part of us in exploring how we’re paving the best way for a extra progressive, environment friendly, and sustainable world. Study extra about how Cisco is fueling change and galvanizing visionary options that tackle essentially the most urgent challenges of our time. 

 

Share:

Saryu Nayyar, CEO and Founding father of Gurucul – Interview Collection

0


Saryu Nayyar is an internationally acknowledged cybersecurity professional, creator, speaker and member of the Forbes Expertise Council. She has greater than 15 years of expertise within the info safety, id and entry administration, IT threat and compliance, and safety threat administration sectors.

She was named EY Entrepreneurial Successful Ladies in 2017. She has held management roles in safety services and products technique at Oracle, Simeio, Solar Microsystems, Vaau (acquired by Solar) and Disney. Saryu additionally spent a number of years in senior positions on the know-how safety and threat administration apply of Ernst & Younger.

Gurucul is a cybersecurity firm that focuses on behavior-based safety and threat analytics. Its platform leverages machine studying, AI, and massive knowledge to detect insider threats, account compromise, and superior assaults throughout hybrid environments. Gurucul is thought for its Unified Safety and Threat Analytics Platform, which integrates SIEM, UEBA (Consumer and Entity Habits Analytics), XDR, and id analytics to offer real-time menace detection and response. The corporate serves enterprises, governments, and MSSPs, aiming to scale back false positives and speed up menace remediation by means of clever automation.

What impressed you to start out Gurucul in 2010, and what downside had been you aiming to unravel within the cybersecurity panorama?

Gurucul was based to assist Safety Operations and Insider Threat Administration groups get hold of readability into essentially the most essential cyber dangers impacting their enterprise. Since 2010 we’ve taken a behavioral and predictive analytics strategy, relatively than rules-based, which has generated over 4,000+ machine studying fashions that put consumer and entity anomalies into context throughout a wide range of completely different assault and threat situations. We’ve constructed upon this as our basis, transferring from serving to giant Fortune 50 firms resolve Insider Threat challenges, to serving to firms acquire radical readability into ALL cyber threat. That is the promise of REVEAL, our unified and AI-Pushed Knowledge and Safety Analytics platform. Now we’re constructing on our AI mission with a imaginative and prescient to ship a Self-Driving Safety Analytics platform, utilizing Machine Studying as our basis however now layering on Generative and Agentic AI capabilities throughout the whole menace lifecycle. The objective is for analysts and engineers to spend much less time within the myriad in complexity and extra time targeted on significant work. Permitting machines to amplify the definition of their day-to-day actions.

Having labored in management roles at Oracle, Solar Microsystems, and Ernst & Younger, what key classes did you convey from these experiences into founding Gurucul?

My management expertise at Oracle, Solar Microsystems, and Ernst & Younger strengthened my capability to unravel advanced safety challenges and supplied me with an understanding of the challenges that Fortune 100 CEOs and CISOs face. Collectively, it allowed me to achieve a front-row seat the technological and enterprise challenges most safety leaders face and impressed me to construct options to bridge these gaps.

How does Gurucul’s REVEAL platform differentiate itself from conventional SIEM (Safety Data and Occasion Administration) options?

Legacy SIEM options rely on static, rule-based approaches that result in extreme false positives, elevated prices, and delayed detection and response. Our REVEAL platform is totally cloud-native and AI-driven, using superior machine studying, behavioral analytics, and dynamic threat scoring to detect and reply to threats in actual time. In contrast to conventional platforms, REVEAL constantly adapts to evolving threats and integrates throughout on-premises, cloud, and hybrid environments for complete safety protection. Acknowledged because the ‘Most Visionary’ SIEM answer in Gartner’s Magic Quadrant for 3 consecutive years, REVEAL redefines AI-driven SIEM with unmatched precision, velocity, and visibility. Moreover, SIEMs wrestle with a knowledge overload downside. They’re too costly to ingest the whole lot wanted for full visibility and even when they do it simply provides to the false constructive downside. Gurucul understands this downside and it’s why we now have a local and AI-driven Knowledge Pipeline Administration answer that filters non-critical knowledge to low-cost storage, saving cash, whereas retaining the power to run federated search throughout all knowledge. Analytics methods are a “rubbish in, rubbish out” state of affairs. If the info coming in is bloated, pointless or incomplete then the output won’t be correct, actionable or in the end trusted.

Are you able to clarify how machine studying and behavioral analytics are used to detect threats in actual time?

Our platform leverages over 4,000 machine studying fashions to constantly analyze all related datasets and determine anomalies and suspicious behaviors in actual time. In contrast to legacy safety methods that depend on static guidelines, REVEAL uncovers threats as they emerge. The platform additionally makes use of Consumer and Entity Habits Analytics (UEBA) to ascertain baselines of regular consumer and entity habits, detecting deviations that would point out insider threats, compromised accounts, or malicious exercise. This habits is additional contextualized by a giant knowledge engine that correlates, enriches and hyperlinks safety, community, IT, IoT, cloud, id, enterprise software knowledge and each inner and exterior sourced menace intelligence. This informs a dynamic threat scoring engine that assigns real-time threat scores that assist prioritize responses to essential threats. Collectively, these capabilities present a complete, AI-driven strategy to real-time menace detection and response that set REVEAL other than standard safety options.

How does Gurucul’s AI-driven strategy assist cut back false positives in comparison with standard cybersecurity methods?

The REVEAL platform reduces false positives by leveraging AI-driven contextual evaluation, behavioral insights, and machine studying to differentiate reliable consumer exercise from precise threats. In contrast to standard options, REVEAL refines its detection capabilities over time, enhancing accuracy whereas minimizing noise. Its UEBA detects deviations from baseline exercise with excessive accuracy, permitting safety groups to concentrate on reliable safety dangers relatively than being overwhelmed by false alarms. Whereas Machine Studying is a foundational side, generative and agentic AI play a major position in additional appending context in pure language to assist analysts perceive precisely what is going on round an alert and even automate the response to mentioned alerts.

What position does adversarial AI play in fashionable cybersecurity threats, and the way does Gurucul fight these evolving dangers?

First all we’re already seeing adversarial AI being utilized to the bottom hanging fruit, the human vector and identity-based threats. That is why behavioral, and id analytics are essential to with the ability to determine anomalous behaviors, put them into context and predict malicious habits earlier than it proliferates additional. Moreover, adversarial AI is the nail within the coffin for signature-based detection strategies. Adversaries are utilizing AI to evade these TTP outlined detection guidelines, however once more they’ll’t evade the behavioral primarily based detections in the identical approach. SOC groups usually are not resourced adequately to proceed to jot down guidelines to maintain tempo and would require a contemporary strategy to menace detection, investigation and response. Habits and context are the important thing elements.  Lastly, platforms like REVEAL rely on a steady suggestions loop and we’re continuously making use of AI to assist us refine our detection fashions, suggest new fashions and inform new menace intelligence our total ecosystem of consumers can profit from.

How does Gurucul’s risk-based scoring system enhance safety groups’ capability to prioritize threats?

Our platform’s dynamic threat scoring system assigns real-time threat scores to customers, entities, and actions primarily based on noticed behaviors and contextual insights. This allows safety groups to prioritize essential threats, decreasing response instances and optimizing assets. By quantifying threat on a 0–100 scale, REVEAL ensures that organizations concentrate on essentially the most urgent incidents relatively than being overwhelmed by low-priority alerts. With a unified threat rating spanning all enterprise knowledge sources, safety groups acquire better visibility and management, resulting in sooner, extra knowledgeable decision-making.

In an age of accelerating knowledge breaches, how can AI-driven safety options assist organizations stop insider threats?

Insider threats are an particularly difficult safety threat attributable to their refined nature and the entry that workers possess. REVEAL’s UEBA detects deviations from established behavioral baselines, figuring out dangerous actions corresponding to unauthorized knowledge entry, uncommon login instances, and privilege misuse. Dynamic threat scoring additionally constantly assesses behaviors in actual time, assigning threat ranges to prioritize essentially the most urgent insider dangers. These AI-driven capabilities allow safety groups to proactively detect and mitigate insider threats earlier than they escalate into breaches. Given the predictive nature of behavioral analytics Insider Threat Administration is race towards the clock. Insider Threat Administration groups want to have the ability to reply and collaborate rapidly, with privateness top-of-mind. Context once more is essential right here and appending behavioral deviations with context from id methods, HR purposes and all different related knowledge sources offers these groups the ammunition to rapidly construct and defend a case of proof so the enterprise can reply and remediate earlier than knowledge exfiltration happens.

How does Gurucul’s id analytics answer improve safety in comparison with conventional IAM (id and entry administration) instruments?

Conventional IAM options concentrate on entry management and authentication however lack the intelligence and visibility to detect compromised accounts or privilege abuse in actual time. REVEAL goes past these limitations by leveraging AI-powered behavioral analytics to constantly assess consumer threat, dynamically modify threat scores, and implement adaptive entry entitlements, minimizing misuse and illegitimate privileges. By integrating with present IAM frameworks and implementing least-privilege entry, our answer enhances id safety and reduces the assault floor. The issue with IAM governance is id system sprawl and the dearth of interconnectedness between completely different id methods. Gurucul offers groups a 360° view of their id dangers throughout all id infrastructure. Now they’ll cease rubber stamping entry however relatively take risk-oriented strategy to entry insurance policies. Moreover, they’ll expedite the compliance side of IAM and display a steady monitoring and totally holistic strategy to entry controls throughout the group.

What are the important thing cybersecurity threats you foresee within the subsequent 5 years, and the way can AI assist mitigate them?

Identification-based threats will proceed to proliferate, as a result of they’ve labored. Adversaries are going to double-down on gaining entry by logging in both through compromising insiders or attacking id infrastructure. Naturally insider threats will proceed to be a key threat vector for a lot of companies, particularly as shadow IT continues. Whether or not malicious or negligent, firms will more and more want visibility into insider threat. Moreover, AI will speed up the variations of standard TTPs, as a result of adversaries know that’s how they are going to be capable of evade detections by doing so and it is going to be low value for them to inventive adaptive techniques, technics and protocols. Therefore once more why specializing in habits in context and having detection methods able to adapting simply as quick will probably be essential for the foreseeable future.

Thanks for the nice interview, readers who want to be taught extra ought to go to Gurucul

DNA Microscopy Creates 3D Maps of Life From the Inside Out – NanoApps Medical – Official web site


What in case you might take an image of each gene inside a dwelling organism—not with gentle, however with DNA itself?

Scientists at the University of Chicago have pioneered a revolutionary imaging technique called volumetric DNA microscopy. It builds intricate 3D maps of genetic material by tagging and tracking molecular interactions, creating never-before-seen views inside organisms like zebrafish embryos.

New Window into Genetics

Traditional genetic sequencing can reveal a lot about the genetic material in a sample, such as a piece of tissue or a drop of blood, but it doesn’t show where specific genetic sequences are located within that sample, or how they relate to nearby genes and molecules.

To address this, researchers at the University of Chicago are developing a new technology that captures both the identity and location of genetic material. The method works by tagging individual DNA or RNA molecules and tracking how neighboring tags interact. These interactions are used to build a molecular network that reflects the spatial arrangement of genes, effectively creating a three-dimensional map of genetic activity. Known as volumetric DNA microscopy, the technique generates detailed 3D images of entire organisms from the inside out – down to the level of individual cells.

Volumetric DNA Microscopy Image of Zebrafish Embryo
Volumetric DNA microscopy image of zebrafish embryo. Credit: Weinstein Lab, University of Chicago

Imaging an Entire Organism

Joshua Weinstein, PhD, Assistant Professor of Medicine and Molecular Engineering at UChicago, has spent over a decade developing DNA microscopy, with support from the National Institutes of Health and the National Science Foundation. In a recent study published today (March 27) in Nature Biotechnology, Weinstein and postdoctoral researcher Nianchao Qian used the technique to produce a complete 3D DNA map of a zebrafish embryo—a widely used model for studying development and the nervous system.

“It’s a level of biology that no one has ever seen before,” Weinstein said. “To be able to see that kind of a view of nature from within a specimen is exhilarating.”

Rethinking Microscopy

Unlike traditional microscopes that use light or lenses, DNA microscopy creates images by calculating interactions among molecules, providing a new way to visualize genetic material in 3D. First, short DNA sequence tags called unique molecular identifiers (UMIs) are added to cells. They attach to DNA and RNA molecules and begin making copies of themselves. This starts a chemical reaction that creates new sequences, called unique event identifiers (UEIs), that are unique to each pairing.

It’s these pairings that help create the spatial map of where each genetic molecule is located. UMI pairs that are close together interact more frequently and generate more UEIs than those that are farther apart. Once the DNA and RNA are sequenced, a computational model reconstructs their original locations by analyzing the physical links between UMI-tags, creating a spatial map of gene expression.

Cell Phones and Cells: A Clever Analogy

Weinstein compares the technique to using data from cell phones pinging each other to determine people’s location in a city. Knowing the cell phone number or IP address of each person is like knowing the genetic sequence of one molecule, but if you can layer on their interactions with other phones nearby, you can work out their locations too.

“We can do this with cell phones and people, so why not do that with molecules and cells,” he said. “This turns the idea of imaging on its head. Rather than relying on an optical apparatus to shine light in, we can use biochemistry and DNA to form a massive network between molecules and encode their proximities to each other.”

Future Applications in Cancer and Immunotherapy

DNA microscopy doesn’t rely on prior knowledge of the genome or shape of a specimen, so it could be useful for understanding genetic expression in unique, unknown contexts. Tumors generate countless new genetic mutations, for example, so the tool would be able to map out the tumor microenvironment and where it interacts with the immune system. Immune cells interact with each other and respond to pathogens in context-specific ways, so DNA microscopy could help unravel those genetic mechanisms. Such applications could in turn guide more precise immunotherapy for cancer or tailor personalized vaccines.

“This is the critical foundation for being able to have truly comprehensive information about the ensemble of unique cells within the lymphatic system or tumor tissue,” Weinstein said. “There has still been this major gap in technology for allowing us to understand idiosyncratic tissue, and that’s what we’re trying to fill in here.”

DOI: 27 March 2025, Nature Biotechnology.
10.1038/s41587-025-02613-z

Additional funding for the study, “Spatial-transcriptomic imaging of an intact organism using volumetric DNA microscopy,” was provided by the Damon Runyon Foundation and the Moore Foundation.