A long-standing assumption about evolution is being challenged by new research showing that vastly different species can rely on the same genetic pathways to develop similar traits.
A new sound-based laser could measure gravity with unprecedented precision and reshape navigation technology.
Since their introduction in the 1960s, lasers have fueled major advances in science and everyday technology, from supermarket scanners to eye surgery. Traditional lasers operate by controlling photons, which are particles of light. Over the past two decades, researchers have expanded this concept to other particles, including phonons, which represent tiny units of vibration or sound. Learning to control phonons could unlock new capabilities, including access to unusual quantum effects such as entanglement.
Squeezed Phonon Laser Advances Precision.
The repeated evolution of similar phenotypes, or convergent evolution, is widespread in nature, but there are few studies investigating the genetic mechanisms across wide evolutionary timescales. This study examines convergent wing pattern evolution across highly divergent Lepidopteran lineages and reports parallel genetic reuse, indicating strong constraints and high predictability in evolutionary outcomes.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a recently disclosed security flaw impacting various Linux distributions to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild.
The vulnerability, tracked as CVE-2026–31431 (CVSS score: 7.8), is a case of local privilege escalation (LPE) flaw that could allow an unprivileged local user to obtain root. The nine-year-old flaw is also tracked as Copy Fail by Theori and Xint. Fixes have been made available in Linux kernel versions 6.18.22, 6.19.12, and 7.0.
“Linux Kernel contains an incorrect resource transfer between spheres vulnerability that could allow for privilege escalation,” CISA said in an advisory.
The Amazon Simple Email Service (SES) is being increasingly abused to send convincing phishing emails that can bypass standard security filters and render reputation-based blocks ineffective.
Although the resource has been leveraged for malicious activity in the past, the current spike may be due to a large number of AWS Identity and Access Management access keys exposed in public assets.
Because it is a legitimate, trusted resource, phishing operations can leverage Amazon SES to send out malicious emails that pass authentication checks.
A malicious version of the PyTorch Lightning package published on the Python Package Index (PyPI) delivers a credential-stealing payload targeting browsers, environment files, and cloud services.
The developer disclosed the supply-chain attack on April 30, saying that version 2.6.3 of the package included a hidden execution chain that downloads and executes a JavaScript payload.
PyTorch Lightning is a deep learning framework used for pretraining and fine-tuning AI models. It is a popular package, amassing more than 11 million downloads last month.