Toggle light / dark theme

Get the latest international news and world events from around the world.

Log in for authorized contributors

Chinese cyberspies breached dozens of telecom firms, govt agencies

Google’s Threat Intelligence Group (GTIG), Mandiant, and partners disrupted a global espionage campaign attributed to a suspected Chinese threat actor that used SaaS API calls to hide malicious traffic in attacks targeting telecom and government networks.

The campaign has been active since at least 2023 and has impacted 53 organizations in 42 countries, with suspected infections in at least 20 more countries.

The initial access vector is unknown, but the researchers note that the threat actor, which Google tracks internally as UNC2814, has previously gained access by exploiting flaws in web servers and edge systems.

The OpenClaw Hype: Analysis of Chatter from Open-Source Deep and Dark Web

OpenClaw has sparked heavy Telegram and dark web chatter, but Flare’s data shows more research hype than mass exploitation. Flare explains how its telemetry found real supply-chain risk in the skills marketplace, yet limited signs of large-scale criminal operationalization.

Is The Brain an Analog Computer? Consciousness as Dynamic Brainwave Organization | Earl Miller

Professor Earl Miller discusses, Mind-Body Solution podcast.

Earl K. Miller is the Picower Professor of Neuroscience at the Massachusetts Institute of Technology. He has faculty positions in The Picower Institute for Learning and Memory and the Department of Brain and Cognitive Sciences. He holds degrees from Kent State University (B.A.) and Princeton University (M.A., Ph.D.) as well as an honorary Doctor of Science from Kent State University.


For decades, neuroscience treated the brain like a digital machine — storing information in synaptic connections and sustaining activity like a switch flipped on. But what if that model is incomplete?

In this conversation, I sit down with Earl Miller, MIT professor and head of the Miller Lab, to explore a growing shift in cognitive neuroscience: the brain may compute using dynamic electrical waves.

We discuss how oscillations coordinate millions of neurons, how waves interact with spikes in a two-way system, why large-scale brain organization may depend on rhythmic patterns, and what this means for artificial intelligence.

The Man Who Stole Infinity

In 1874, German mathematician Georg Cantor published a groundbreaking paper showing that there are different sizes of infinity — a result that fundamentally changed mathematics by treating infinity as a concrete mathematical concept rather than a mere philosophical idea.

That paper became the foundation of set theory, a central pillar of modern mathematics.

Newly discovered letters from Cantor’s correspondence with fellow mathematician Richard Dedekind, believed lost until recently, suggest that a crucial part of the proof Cantor published came directly from Dedekind’s work.

Historian and journalist Demian Goos uncovered these letters while researching Cantor’s life. He found a key letter from November 30, 1873 that shows Dedekind’s proof of the countability of algebraic numbers — the same result Cantor would publish later under his own name.

Earlier histories had portrayed Cantor as a lone genius, but the new evidence reveals he relied heavily on Dedekind’s ideas and published them without proper credit, effectively erasing Dedekind’s role in the discovery.

Cantor’s strategy was partly tactical: because influential mathematician Leopold Kronecker vehemently opposed actual infinity, Cantor framed the paper under a less controversial title (about algebraic numbers), using Dedekind’s simplified methods to “sneak” in the revolutionary idea of comparing infinities.

The result was not just a new theorem but a new way of thinking about infinity, setting the stage for set theory and reshaping mathematics — even though the true story of its origins was more collaborative and ethically complicated than commonly told.

Abstract: Emily Gutierrez-Morton

Yanchang Wang and colleagues (Florida State University) show that in yeast, polo-like kinase Cdc5 promotes the phosphorylation of SUMO protease Ulp2, reducing its affinity for SUMO chains and thereby facilitating polySUMOylation.

Genetics CellCycle


1Infectious Diseases Division, Department of Medicine and.

2Division of Plastic and Reconstructive Surgery, Washington University in St. Louis School of Medicine, St. Louis, Missouri, USA.

3Department of Mathematics, Dartmouth College, Hanover, New Hampshire, USA.

Abstract: Can we identify infections earlier in patients undergoing breast implant reconstruction?

Jeffrey P. Henderson use metabolomic profiling of postimplantation drain fluid, revealing an infection-associated molecular signature that, in longitudinal samples, substantially pre-dated clinical infection diagnosis.


1Infectious Diseases Division, Department of Medicine and.

2Division of Plastic and Reconstructive Surgery, Washington University in St. Louis School of Medicine, St. Louis, Missouri, USA.

3Department of Mathematics, Dartmouth College, Hanover, New Hampshire, USA.

Immune cells selectively pull DNA from dying nuclei, revealing a process dubbed nucleocytosis

Over the years, cell biology has built a detailed picture of how cells compartmentalize their internal functions. Central to this organization is the nucleus, which houses the genetic material and is separated from the cytoplasm by a robust nuclear envelope.

Traditionally, the nuclear membrane has been considered a strict barrier, maintaining nuclear integrity except during carefully controlled processes such as mitosis. As a result, the release of nuclear material has largely been associated with cellular damage or death.

However, recent work by a research team in Japan suggests that this view may be incomplete.

/* */