Toggle light / dark theme

Get the latest international news and world events from around the world.

Log in for authorized contributors

These Molecular Filters Thousands of Times Thinner Than a Human Hair Could Change How the World Cleans Water

Industrial separations sit quietly at the heart of modern manufacturing, yet they consume enormous amounts of energy and generate significant environmental costs. A new membrane technology developed by an international research team promises a more precise and sustainable alternative. Scientists

Quantum Computing Breakthrough: Scientists Finally Unlock the Secret of Majorana Qubits

Scientists have finally figured out how to read ultra-secure Majorana qubits—bringing robust quantum computing a big step closer.

“This is a crucial advance,” says Ramón Aguado, a CSIC researcher at the Madrid Institute of Materials Science (ICMM) and co author of the study. He explains that the team has shown it is possible to retrieve information stored in Majorana qubits using a technique known as quantum capacitance. According to Aguado, this method works as “a global probe sensitive to the overall state of the system,” allowing researchers to detect properties that were previously out of reach.

Why topological qubits are so hard to measure.

First Malicious Outlook Add-In Found Stealing 4,000+ Microsoft Credentials

Cybersecurity researchers have discovered what they said is the first known malicious Microsoft Outlook add-in detected in the wild.

In this unusual supply chain attack detailed by Koi Security, an unknown attacker claimed the domain associated with a now-abandoned legitimate add-in to serve a fake Microsoft login page, stealing over 4,000 credentials in the process. The activity has been codenamed AgreeToSteal by the cybersecurity company.

The Outlook add-in in question is AgreeTo, which is advertised by its developer as a way for users to connect different calendars in a single place and share their availability through email. The add-in was last updated in December 2022.

APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities

Indian defense sector and government-aligned organizations have been targeted by multiple campaigns that are designed to compromise Windows and Linux environments with remote access trojans capable of stealing sensitive data and ensuring continued access to infected machines.

The campaigns are characterized by the use of malware families like Geta RAT, Ares RAT, and DeskRAT, which are often attributed to Pakistan-aligned threat clusters tracked as SideCopy and APT36 (aka Transparent Tribe). SideCopy, active since at least 2019, is assessed to operate as a subdivision of Transparent Tribe.

“Taken together, these campaigns reinforce a familiar but evolving narrative,” Aditya K. Sood, vice president of Security Engineering and AI Strategy at Aryaka, said. “Transparent Tribe and SideCopy are not reinventing espionage – they are refining it.”

/* */