23andMe sale for 256 million $ raises concerns about privacy of users’ genetic information

20 May 2025 2 minutes Author: Newsman

Biotech giant Regeneron is buying bankrupt genetic testing firm 23andMe for $256 million, promising to uphold its current privacy policies. But advocates and regulators are concerned about potential threats to control sensitive personal information.

Biotech giant Regeneron is buying bankrupt genetic testing firm 23andMe for $256 million, vowing to uphold its current privacy policies. But activists and regulators are concerned about potential threats to control sensitive personal information.

  • Regeneron Pharmaceuticals will acquire key assets of 23andMe, including its genomic services, research infrastructure and biobank. The company has promised to uphold a privacy policy that prevents data from being shared with insurers, employers or law enforcement without a court order. Despite the assurances, privacy experts say even the best intentions can’t make up for the lack of a nationwide privacy law.
  • 23andMe, once a pioneer in personal genetics, filed for bankruptcy in March 2025, sending shockwaves through users who had been sending their DNA samples to the company for years. The announcement was immediately followed by a wave of requests to delete genetic profiles. The California attorney general even publicly called for the company to destroy all personal information from its pages.

While Regeneron insists on privacy, the future of more than 14 million genetic profiles now depends on how honestly and openly its commitments are fulfilled — and whether users take appropriate action on their own in time.

Other related articles
News
Read more
RedisRaider is a new hacking campaign developed in Go that infects Linux servers with the XMRig cryptominer, exploiting vulnerabilities in Redis instances.
RedisRaider is a Go malware that spreads using open Redis servers on Linux. It infects the host by adding a cron` task that runs the XMRig miner for Monero. The campaign uses TTL keys and Redis configuration changes to evade detection. Protect your servers: restrict access to Redis, disable unnecessary features, and monitor for unusual activity in /etc/cron.d.
82
News
Read more
How a fake password manager led to an ESXi encryptor
In 2025, hackers distributed a fake version of KeePass — KeeLoader — through Bing ads, stealing passwords, installing Cobalt Strike, and launching an ESXi encryptor. The campaign is associated with Black Basta and used typosquatting domains.
71
News
Read more
O2 UK leaked subscriber locations over calls — bug existed for over 2 years
O2 UK’s network has been leaking geolocation data, IMSI, IMEI and other subscriber identifiers via SIP headers during VoLTE/WiFi calls for over two years. The vulnerability allowed the subscriber’s exact location to be determined even abroad. The issue was discovered by researcher Daniel Williams and was patched by Virgin Media O2 in May 2025. This highlights the importance of protecting the telecommunications signal layer.
95
Found an error?
If you find an error, take a screenshot and send it to the bot.