Menu

Blog

Page 3049

Mar 31, 2023

Speeding up drug discovery with diffusion generative models

Posted by in category: biotech/medical

MIT researchers built DiffDock, a diffusion generative model that could potentially find new drugs faster than traditional methods and reduce the potential for adverse side effects.

Mar 31, 2023

D3dcompiler_47.dll: If AV raises an alerts about this Microsoft signed dll file, you are in trouble

Posted by in categories: cybercrime/malcode, encryption, internet

Threat actors used a well-liked piece of corporate communication software from 3CX, according to security experts. In particular, reports state that a desktop client for the 3CX VoIP (Voice over Internet Protocol) service was used to specifically target 3CX’s clients.

It is believed that the attack is a multi-part process, with the first stage using a hacked version of the 3CX desktop application. Although the.exe file and the MSI package have the same name, preliminary research indicates that the MSI package is the one that may include DLLs that have been maliciously modified.

Continue reading “D3dcompiler_47.dll: If AV raises an alerts about this Microsoft signed dll file, you are in trouble” »

Mar 31, 2023

600,000 companies networks using 3CX VoIP software infected with malware. Biggest supply chain attack

Posted by in categories: cybercrime/malcode, government

Researchers from multiple security companies have reported that a massive supply chain attack on users of 3CX, a widely utilized voice and video calling desktop client, was carried out by computer hackers working on behalf of the government of North Korea. The attack targeted users of the Windows and macOS operating systems. 3CX users may make calls, examine the status of colleagues, chat, plan a video conference, and check voicemails all from the desktop program by using the 3CXDesktopApp, which is accessible for Windows, macOS, Linux, and mobile devices.

The attack resulted in the compromising of the software build system that was used to generate and distribute versions of the app for Windows and macOS. The app delivers VoIP and PBX services to “over 600,000 clients,” some of which include American Express, Mercedes-Benz, and Price Waterhouse Cooper. Since the attackers controlled the software development system, they were able to insert malware into 3CX applications, even though those applications had been digitally signed using the official signing key for the firm.

Continue reading “600,000 companies networks using 3CX VoIP software infected with malware. Biggest supply chain attack” »

Mar 31, 2023

Control of low-mode drive asymmetry in an efficient long-pulse low gas-fill density Hohlraum

Posted by in category: futurism

Laser-driven Hohlraums filled with gas at lower densities (0.6 mg/cc) have higher efficiency compared to original ≥ 0.96 mg/cc fill because of reduced backscatter losses [Hall et al., Phys. Plasma…

Mar 31, 2023

Sparse regression for plasma physics

Posted by in category: physics

Many scientific problems can be formulated as sparse regression, i.e., regression onto a set of parameters when there is a desire or expectation that some of the parameters are exactly zero or do not substantially contribute. This includes many problems in signal and image processing, system identification, optimization, and parameter estimation methods such as Gaussian process regression. Sparsity facilitates exploring high-dimensional spaces while finding parsimonious and interpretable solutions. In the present work, we illustrate some of the important ways in which sparse regression appears in plasma physics and point out recent contributions and remaining challenges to solving these problems in this field. A brief review is provided for the optimization problem and the state-of-the-art solvers, especially for constrained and high-dimensional sparse regression.

Mar 31, 2023

Exploring the parameter space of MagLIF implosions using similarity scaling. I. Theoretical framework

Posted by in category: futurism

Magneto-inertial fusion concepts, such as the magnetized liner inertial fusion (MagLIF) platform[M. R. Gomez et al., Phys. Rev. Lett. 113, 155003 (2014)], constitute an alternative path for achiev…

Mar 31, 2023

Exploring the Borders of the Nuclear Landscape

Posted by in category: futurism

Scientists have precisely measured the masses of 19 neutron-rich nuclei, discovering a new isotope of uranium in the process.

Mar 31, 2023

Spinning Heat in Reverse

Posted by in category: futurism

When spun fast enough, a cold object can transfer heat to a nearby hot object.

Mar 31, 2023

New Accuracy Record for Molecular Lattice Clock

Posted by in category: physics

Researchers have attained a 100-fold increase in the accuracy of a molecular clock that could serve as a terahertz-frequency standard and as a platform for investigating new physics.

Mar 31, 2023

Seeing is more than believing: Exploring ‘de Sitter space’ to explain gravity in the expanding early universe

Posted by in categories: cosmology, quantum physics

Having more tools helps; having the right tools is better. Utilizing multiple dimensions may simplify difficult problems—not only in science fiction but also in physics—and tie together conflicting theories.

For example, Einstein’s theory of —which resides in the fabric of space-time warped by planetary or other massive objects—explains how gravity works in most cases. However, the theory breaks down under such as those existing in black holes and cosmic primordial soups.

An approach known as superstring theory could use another dimension to help bridge Einstein’s theory with , solving many of these problems. But the necessary evidence to support this proposal has been lacking.