A new study reveals how intertwined forms of frustration in quantum materials can give rise to unconventional magnetic states.
Scientists have finally figured out how to read ultra-secure Majorana qubits—bringing robust quantum computing a big step closer.
“This is a crucial advance,” says Ramón Aguado, a CSIC researcher at the Madrid Institute of Materials Science (ICMM) and co author of the study. He explains that the team has shown it is possible to retrieve information stored in Majorana qubits using a technique known as quantum capacitance. According to Aguado, this method works as “a global probe sensitive to the overall state of the system,” allowing researchers to detect properties that were previously out of reach.
Why topological qubits are so hard to measure.
Cybersecurity researchers have discovered what they said is the first known malicious Microsoft Outlook add-in detected in the wild.
In this unusual supply chain attack detailed by Koi Security, an unknown attacker claimed the domain associated with a now-abandoned legitimate add-in to serve a fake Microsoft login page, stealing over 4,000 credentials in the process. The activity has been codenamed AgreeToSteal by the cybersecurity company.
The Outlook add-in in question is AgreeTo, which is advertised by its developer as a way for users to connect different calendars in a single place and share their availability through email. The add-in was last updated in December 2022.
Indian defense sector and government-aligned organizations have been targeted by multiple campaigns that are designed to compromise Windows and Linux environments with remote access trojans capable of stealing sensitive data and ensuring continued access to infected machines.
The campaigns are characterized by the use of malware families like Geta RAT, Ares RAT, and DeskRAT, which are often attributed to Pakistan-aligned threat clusters tracked as SideCopy and APT36 (aka Transparent Tribe). SideCopy, active since at least 2019, is assessed to operate as a subdivision of Transparent Tribe.
“Taken together, these campaigns reinforce a familiar but evolving narrative,” Aditya K. Sood, vice president of Security Engineering and AI Strategy at Aryaka, said. “Transparent Tribe and SideCopy are not reinventing espionage – they are refining it.”