Toggle light / dark theme

Get the latest international news and world events from around the world.

Log in for authorized contributors

Cutting down on quantum-dot crosstalk: Precise measurements expose a new challenge

Devices that can confine individual electrons are potential building blocks for quantum information systems. But the electrons must be protected from external disturbances. RIKEN researchers have now shown how quantum information encoded into a so-called quantum dot can be negatively affected by nearby quantum dots. This has implications for developing quantum information devices based on quantum dots.

Quantum computers process information using so-called qubits: physical systems whose behavior is governed by the laws of quantum mechanics. An electron, if it can be isolated and controlled, is one example of a qubit platform with great potential.

One way of controlling an electron is to use a quantum dot. These tiny structures trap charged particles using electric fields at the tips of metal electrodes separated by just a few tens of nanometers.

Rolling out the carpet for spin qubits with new chip architecture

Researchers at QuTech in Delft, The Netherlands, have developed a new chip architecture that could make it easier to test and scale up quantum processors based on semiconductor spin qubits. The platform, called QARPET (Qubit-Array Research Platform for Engineering and Testing) and reported in Nature Electronics, allows hundreds of qubits to be characterized within the same test-chip under the same operating conditions used in quantum computing experiments.

“With such a complex, tightly packed quantum chip, things really start to resemble the traditional semiconductor industry,” states researcher Giordano Scappucci.

When viewed under a microscope, the structure of the QARPET chip appears almost woven. Fabrication was in fact a stress test for engineering capabilities.

A New Way to Build 2D Materials Without Harsh Chemicals Pays Off Big

MXenes are an emerging class of two-dimensional materials whose properties depend sensitively on the atoms bound to their surfaces. A new synthesis approach now allows researchers to control these surface terminations with unprecedented precision. First identified in 2011, MXenes are a fast-expan

Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems

Cybersecurity researchers have discovered a fresh set of malicious packages across npm and the Python Package Index (PyPI) repository linked to a fake recruitment-themed campaign orchestrated by the North Korea-linked Lazarus Group.

The coordinated campaign has been codenamed graphalgo in reference to the first package published in the npm registry. It’s assessed to be active since May 2025.

“Developers are approached via social platforms like LinkedIn and Facebook, or through job offerings on forums like Reddit,” ReversingLabs researcher Karlo Zanki said in a report. “The campaign includes a well-orchestrated story around a company involved in blockchain and cryptocurrency exchanges.”

Microsoft: New Windows LNK spoofing issues aren’t vulnerabilities

Today, at Wild West Hackin’ Fest, security researcher Wietze Beukema disclosed multiple vulnerabilities in Windows LK shortcut files that allow attackers to deploy malicious payloads.

Beukema documented four previously unknown techniques for manipulating Windows LNK shortcut files to hide malicious targets from users inspecting file properties.

LNK shortcuts were introduced with Windows 95 and use a complex binary format that allows attackers to create deceptive files that appear legitimate in Windows Explorer’s properties dialog but execute entirely different programs when opened.

Fake AI Chrome extensions with 300K users steal credentials, emails

A set of 30 malicious Chrome extensions that have been installed by more than 300,000 users are masquerading as AI assistants to steal credentials, email content, and browsing information.

Some of the extensions are still present in the Chrome Web Store and have been installed by tens of thousands of users, while others show a small install count.

Researchers at browser security platform LayerX discovered the malicious extension campaign and named it AiFrame. They found that all analyzed extensions are part of the same malicious effort as they communicate with infrastructure under a single domain, tapnetic[.]pro.

Apple fixes zero-day flaw used in ‘extremely sophisticated’ attacks

Apple has released security updates to fix a zero-day vulnerability that was exploited in an “extremely sophisticated attack” targeting specific individuals.

Tracked as CVE-2026–20700, the flaw is an arbitrary code execution vulnerability in dyld, the Dynamic Link Editor used by Apple operating systems, including iOS, iPadOS, macOS, tvOS, watchOS, and visionOS.

Apple’s security bulletin warns that an attacker with memory write capability may be able to execute arbitrary code on affected devices.

This $20 CISSP course bundle helps you study for this grueling certification

Want to make a career jump in 2026? If cybersecurity is on your radar, you’ll want to get prepared for the CISSP exam, one of the most prestigious credentials in the industry that signals you’re ready for high-level roles.

Now, you can learn right from the couch with the CISSP Security and Risk Management Training Bundle, on sale for just $19.99, with no coupon code required.

You don’t have to head back to school to get prepped for a cybersecurity career. The CISSP Security & Risk Management Training Bundle can prepare you in the comfort of your home. This bundle of eight courses teaches you how to protect computers, networks, and data from threats and helps you master the eight domains information security professionals should know.

/* */