Toggle light / dark theme

In a crowded room, we naturally move slower than in an empty space. Surprisingly, worms can show the exact opposite behavior: In an environment with randomly scattered obstacles, they tend to move faster when there are more obstructions. Viewing the worms as “active, polymerlike matter,” researchers at the University of Amsterdam have now explained this surprising fact.

The research was published in Physical Review Letters this week, and was selected by the editors of that journal as an Editors’ Suggestion.

One way in which differ from humans is, of course, their shape: a worm’s length is much larger than its width (i.e., it is spaghetti-like), and moreover it is wiggly—or in more scientific terms: It behaves like an active polymer. The researchers suspected that this active, polymer-like behavior is what makes the worms behave in their counterintuitive way.

Pioneering new research could help unlock exciting new potential to create ultrafast, laser-driven storage devices. The study, led by experts from the University of Exeter, could revolutionize the field of data storage through the development of laser-driven magnetic domain memories.

The new research is based on creating a pivotal new method for using heat to manipulate magnetism with unprecedented precision in two-dimensional (2D) van der Waals materials. It is published in the journal Nature Communications.

Typically, heat is an unwanted byproduct of power consumption in , especially in semiconductors. As devices become smaller and more compact, managing heat has become one of the major challenges in modern electronics.

Cybersecurity researchers have shed light on a new phishing-as-a-service (PhaaS) platform that leverages the Domain Name System (DNS) mail exchange (MX) records to serve fake login pages that impersonate about 114 brands.

DNS intelligence firm Infoblox is tracking the actor behind the PhaaS, the phishing kit, and the related activity under the moniker Morphing Meerkat.

Whether it’s CRMs, project management tools, payment processors, or lead management tools — your workforce is using SaaS applications by the pound. Organizations often rely on traditional CASB solutions for protecting against malicious access and data exfiltration, but these fall short for protecting against shadow SaaS, data damage, and more.

A new report, Understanding SaaS Security Risks: Why CASB Solutions Fail to Cover ‘Shadow’ SaaS and SaaS Governance, highlighting the pressing security challenges faced by enterprises using SaaS applications. The research underscores the growing inefficacy of traditional CASB solutions and introduces a revolutionary browser-based approach to SaaS security that ensures full visibility and real-time protection against threats.

Below, we bring the main highlights of the report. Read the full report here.

The legacy domain for Microsoft Stream was hijacked to show a fake Amazon site promoting a Thailand casino, causing all SharePoint sites with old embedded videos to display it as spam.

Microsoft Stream is an enterprise video streaming service that allows organizations to upload and share videos in Microsoft 365 apps, such as Teams and SharePoint.

Video content hosted on Microsoft Stream was accessed or embedded through a portal at microsoftstream.com.

Dozens of vulnerabilities in products from three leading makers of solar inverters, Sungrow, Growatt, and SMA, could be exploited to control devices or execute code remotely on the vendor’s cloud platform.

The potential impact of the security problems has been assessed as severe because they could be used in attacks that could at least influence grid stability, and affect user privacy.

In a grimmer scenario, the vulnerabilities could be exploited to disrupt or damage power grids by creating an imbalance between power generation and demand.

Mozilla has released Firefox 136.0.4 to patch a critical security vulnerability that can let attackers escape the web browser’s sandbox on Windows systems.

Tracked as CVE-2025–2857, this flaw is described as an “incorrect handle could lead to sandbox escapes” and was reported by Mozilla developer Andrew McCreight.

The vulnerability impacts the latest Firefox standard and extended support releases (ESR) designed for organizations that require extended support for mass deployments. Mozilla fixed the security flaw in Firefox 136.0.4 and Firefox ESR versions 115.21.1 and 128.8.1.