Toggle light / dark theme

Get the latest international news and world events from around the world.

Log in for authorized contributors

Quantum Memory Isn’t What We Thought: Physicists Reveal a Hidden Duality

An international team of scientists has taken a closer look at how memory functions in quantum systems and their time evolution. Their study reveals that whether a quantum process appears to have memory depends on how it is examined. From one angle, the process may seem completely memoryless. From another, traces of past behavior remain visible. The findings open new paths for research in quantum science and emerging technologies.

In classical physics, memory is defined in a straightforward way. If a system’s future behavior depends only on its current condition, it is considered memoryless. If earlier states continue to influence what happens next, the system is said to have memory.

Quantum physics complicates this picture. Quantum systems can store and transmit information in ways that have no counterpart in classical science. In addition, measurement is not just a passive observation. It plays an active and fundamental role in how quantum systems evolve.

Google says 90 zero-days were exploited in attacks last year

Google Threat Intelligence Group (GTIG) tracked 90 zero-day vulnerabilities actively exploited throughout 2025, almost half of them in enterprise software and appliances.

The figure is a 15% increase compared to 2024, when 78 zero-days were exploited in the wild, but lower than the record 100 zero days tracked in 2023.

Zero-day vulnerabilities are security issues in software products that attackers exploit, usually before the vendor learns about them and develops a patch. They are highly valued by threat actors because they often enable initial access, remote code execution, or privilege escalation.

Chinese state hackers target telcos with new malware toolkit

A China-linked advanced persistent threat actor tracked as UAT-9244 has been targeting telecommunication service providers in South America since 2024, compromising Windows, Linux, and network-edge devices.

According to Cisco Talos researchers, the adversary is closely associated with the FamousSparrow and Tropic Trooper hacker groups, but is tracked as a separate activity cluster.

This assessment has high confidence and is based on similar tooling, tactics, techniques, and procedures (TTPs), and victimology observed in attacks attributed to the threat actors.

Spyware-grade Coruna iOS exploit kit now used in crypto theft attacks

A previously undocumented set of 23 iOS exploits named “Coruna” has been deployed by multiple threat actors in targeted espionage campaigns and financially motivated attacks.

The Coruna kit contains five full iOS exploit chains, the most sophisticated leveraging non-public techniques and mitigation bypasses, for iOS versions 13.0 through 17.2.1 (released in December 2023).

Google Threat Intelligence Group (GTIG) researchers first observed activity related to the Coruna exploit kit in February 2025, in activity attributed to a surveillance vendor customer.

/* */