Toggle light / dark theme

A research team led by Prof. Zhang Tianshu at the Hefei Institutes of Physical Science of the Chinese Academy of Sciences has developed a compact all-solid-state continuous-wave (CW) single-longitudinal-mode (SLM) laser with high frequency stability using iodine-based frequency locking, advancing its application in atmospheric remote sensing and environmental monitoring. The study is published in Optics and Laser Technology.

CW SLM lasers are widely used in areas such as laser amplification, , and quantum optics. They also play a key role in atmospheric remote sensing and . These applications require not only SLM laser output but also high frequency stability, which current semiconductor and fiber lasers struggle to provide due to limited environmental adaptability.

In this study, the team introduced a ring resonator structure combined with iodine molecular absorption frequency locking technology. By locking the laser frequency to the flank of specific iodine absorption lines and employing feedback control to adjust the resonator length, they achieved long-term frequency stability.

Mysterious seismic signals from massive North Atlantic storms are rippling through Earth’s core and surfacing in remote Australia. Scientists from the Australian National University (ANU) have discovered that powerful winter storms in the North Atlantic Ocean send energy waves deep through the Ea

Cybersecurity researchers have uncovered a new account takeover (ATO) campaign that leverages an open-source penetration testing framework called TeamFiltration to breach Microsoft Entra ID (formerly Azure Active Directory) user accounts.

The activity, codenamed UNK_SneakyStrike by Proofpoint, has targeted over 80,000 user accounts across hundreds of organizations’ cloud tenants since a surge in login attempts was observed in December 2024, leading to successful account takeovers.

“Attackers leverage Microsoft Teams API and Amazon Web Services (AWS) servers located in various geographical regions to launch user-enumeration and password-spraying attempts,” the enterprise security company said. “Attackers exploited access to specific resources and native applications, such as Microsoft Teams, OneDrive, Outlook, and others.”