Toggle light / dark theme

Microsoft releases Windows 10 KB5078885 extended security update

Microsoft has released the Windows 10 KB5078885 extended security update to fix the March 2026 Patch Tuesday vulnerabilities, including 2 zero-days and an issue that prevents some devices from shutting down.

If you are running Windows 10 Enterprise LTSC or are enrolled in the ESU program, you can install this update like normal by going into Settings, clicking on Windows Update, and manually performing a ’Check for Updates.’

After installing this update, Windows 10 will be updated to build 19045.7058, and Windows 10 Enterprise LTSC 2021 will be updated to build 19044.7058.

Microsoft March 2026 Patch Tuesday fixes 2 zero-days, 79 flaws

Today is Microsoft’s March 2026 Patch Tuesday with security updates for 79 flaws, including 2 publicly disclosed zero-day vulnerabilities.

This Patch Tuesday also addresses three “Critical” vulnerabilities, 2 of which are remote code execution flaws and the other is an information disclosure flaw.

Chrome Extension Turns Malicious After Ownership Transfer, Enabling Code Injection and Data Theft

Interestingly, the original extension developer has published several other extensions under their name on the Chrome Web Store, and all of them have received a Featured badge. The developer also has an account on ExtensionHub, although no extensions are currently listed for sale. What’s more, the individual has attempted to sell domains like “AIInfraStack[.]com” for $2,500, stating the “strong keyword domain” is “relevant for [sic] rapidly growing AI ecosystem.”

“This is the extension supply chain problem in a nutshell,” Annex Security said. “A ‘Featured,’ reviewed, functional extension changes hands, and the new owner pushes a weaponized update to every existing user.”

The disclosure comes as Microsoft warned of the malicious Chromium‑based browser extensions that masquerade as legitimate AI assistant tools to harvest LLM chat histories and browsing data.

Decoding alzheimer’s: The role of EEG rhythms and aperiodic components in cognitive decline

[Alzheimer’s disease: AD] Zhang et al.: “Increased theta band power was statistically significant in AD patients, highlighting its critical role in AD pathology.”


Your browser extensions or network settings have blocked the security verification process required by www.sciencedirect.com. To resolve this, try the following steps:

Temporarily disable browser extensions:

Liquid-metal pupil helps an artificial eye adapt to sudden light changes

Computer vision technologies are artificial intelligence (AI)-powered systems that can capture, analyze, and interpret visual data captured from real-world environments. While these systems are now widely used, many of them perform poorly under some lighting conditions and when the light in captured scenes changes abruptly.

Researchers at University of North Carolina at Chapel Hill, Westlake University and other institutes have developed a new artificial eye that draws inspiration from the eyes of humans, cats and other animals. This artificial eye, introduced in a paper published in Science Robotics, could be used to advance the sensing capabilities of robots, advanced security systems and autonomous vehicles.

“Our project grew from a simple problem: traditional machine vision systems (like the cameras deployed in self-driving cars or robots) struggle with extreme light changes, such as changes from pitch black to bright sunlight,” Dr. Kun Liang, first author of the paper, told Tech Xplore.

Persistent Sex Disparities in Pre‐Hospital Delay Among Patients With STEMI Despite Overall Improvements: Findings From the Chinese Cardiovascular Association Chest Pain Center Registry

Despite overall improvements, women with STEMI in China still face longer pre-hospital delays than men, especially in rural areas. The gap is driven mostly by delayed EMS calls. Cardiology.

HealthEquity STEMI


This website uses a security service to protect against malicious bots. This page is displayed while the website verifies you are not a bot.

Progression Independent of Relapse Activity in Aquaporin-4-IgG–Positive NMOSDA Decade-Long Cohort Study

This study assessed the frequency of PIRA in a well-characterized cohort of patients with AQP4-IgG–positive NMOSD with over a decade of follow-up.


This website uses a security service to protect against malicious bots. This page is displayed while the website verifies you are not a bot.

Making mini-lightning in a block of plastic

Lightning formation and the conditions triggering it have long been shrouded in a cloud of mystery, but new research led by Penn State scientists is lifting the fog. Using mathematical calculations, the researchers have discovered that lightning-like discharge doesn’t require a storm cloud—it could be made inside everyday material on a lab bench. The study is published in the journal Physical Review Letters.

“We applied the same exact models that we use for lightning research but shrank down the scale to slightly larger than a deck of cards,” said Victor Pasko, professor of electrical engineering at Penn State and lead author on the paper. “We calculated that when supplied with a high-powered electron source, lightning can be triggered in everyday insulating materials like glass, acrylic and quartz.”

The team used detailed numerical simulations to show that lightning-like radiation bursts could form inside small solid blocks, under conditions achievable in the lab. The work, if proven experimentally, could have implications for more compact and potentially safer X-ray sources in doctors’ offices and security checkpoints, the researchers said. The primary benefit, however, would be to enable the study of a powerful natural phenomenon on a lab bench.

Google says 90 zero-days were exploited in attacks last year

Google Threat Intelligence Group (GTIG) tracked 90 zero-day vulnerabilities actively exploited throughout 2025, almost half of them in enterprise software and appliances.

The figure is a 15% increase compared to 2024, when 78 zero-days were exploited in the wild, but lower than the record 100 zero days tracked in 2023.

Zero-day vulnerabilities are security issues in software products that attackers exploit, usually before the vendor learns about them and develops a patch. They are highly valued by threat actors because they often enable initial access, remote code execution, or privilege escalation.

/* */