Toggle light / dark theme

Get the latest international news and world events from around the world.

Log in for authorized contributors

How to improve the performance of qubits: Super-fast fluctuation detection achieved

Using commercially available technology and innovative methods, researchers at NBI have pushed the limits of how fast you can detect changes in the sensitive quantum states in the qubit. Their work allows researchers to follow rapid changes in qubit performance that were previously invisible. The study is published in the journal Physical Review X.

The workhorse of any quantum-based application aimed at the coveted, but not yet fully realized quantum computer is the qubit. It is, however, a rather fragile workhorse.

Qubits, and quantum processors in general, are highly sensitive to their environment. Typically, the materials in which they are embedded contain microscopic defects that are still not fully understood. These defects can spatially fluctuate extremely fast, sometimes hundreds of times per second. As they fluctuate, the rate at which a qubit loses energy, and therefore useful quantum information, also changes.

Stanford Scientists Cure Type 1 Diabetes in Mice Without Insulin or Immune Suppression

An “immune system reset” eliminated autoimmune, or Type 1, diabetes in mice in a study conducted at Stanford Medicine. Researchers say the strategy could also have potential for treating other autoimmune diseases and improving outcomes in organ transplantation. In a new study from Stanford Medici

Malicious npm Packages Harvest Crypto Keys, CI Secrets, and API Tokens

Cybersecurity researchers have disclosed what they say is an active “Shai-Hulud-like” supply chain worm campaign that has leveraged a cluster of at least 19 malicious npm packages to enable credential harvesting and cryptocurrency key theft.

The campaign has been codenamed SANDWORM_MODE by supply chain security company Socket. As with prior Shai-Hulud attack waves, the malicious code embedded into the packages comes with capabilities to siphon system information, access tokens, environment secrets, and API keys from developer environments and automatically propagate by abusing stolen npm and GitHub identities to extend its reach.

“The sample retains Shai-Hulud hallmarks and adds GitHub API exfiltration with DNS fallback, hook-based persistence, SSH propagation fallback, MCP server injection with embedded prompt injection targeting AI coding assistants, and LLM API Key harvesting,” the company said.

/* */