Toggle light / dark theme

Get the latest international news and world events from around the world.

Log in for authorized contributors

New neutrino detector in China is coming online

Neutrinos are one of the most enigmatic particles in the standard model. The main reason is that they’re so hard to detect. Despite the fact that 400 trillion of them created in the sun are passing through a person’s body every second, they rarely interact with normal matter, making understanding anything about them difficult. To help solve their mysteries, a new neutrino detector in China recently started collecting data, and hopes to provide insight on between forty and sixty neutrinos a day for the next ten years.

The detector, known as the Jiangmen Underground Neutrino Observatory, or JUNO, is located in between two huge nuclear plants at Yangjian and Taishan. Both of those fission plants create their own artificial neutrinos in addition to the ones created by the sun, meaning the general area should be awash with barely interacting particles.

That’s despite the fact that, like most , it’s located underground. 700 meters underground, in fact. The physical bulk of Earth’s crust is meant to block most other particles, like muons, from getting to it, and at other installations, like IceCube, it does a pretty good job.

6 Browser-Based Attacks Security Teams Need to Prepare For Right Now

Attacks that target users in their web browsers have seen an unprecedented rise in recent years. In this article, we’ll explore what a “browser-based attack” is, and why they’re proving to be so effective.

What is a browser-based attack?

First, it’s important to establish what a browser-based attack is.

New Phoenix attack bypasses Rowhammer defenses in DDR5 memory

Academic researchers have devised a new variant of Rowhammer attacks that bypass the latest protection mechanisms on DDR5 memory chips from SK Hynix.

A Rowhammer attack works by repeatedly accessing specific rows of memory cells at high-speed read/write operations to cause enough electrical interference to alter the value of the nearby bits from one to zero and vice-versa (bit flipping).

An attacker could potentialluy corrupt data, increase their privileges on the system, execute malicious code, or gain access to sensitive data.

OpenAI’s new GPT-5 Codex model takes on Claude Code

OpenAI is rolling out the GPT-5 Codex model to all Codex instances, including Terminal, IDE extension, and Codex Web (chatgpt.com/codex).

Codex is an AI agent that allows you to automate coding-related tasks. You can delegate your complex tasks to Codex and watch it execute code for you.

Even if you don’t know programming languages, you can use Codex to “vibe code” your apps and web apps.

FinWise insider breach impacts 689K American First Finance customers

FinWise Bank is warning on behalf of corporate customers that it suffered a data breach after a former employee accessed sensitive files after the end of their employment.

“On May 31, 2024, FinWise experienced a data security incident involving a former employee who accessed FinWise data after the end of their employment,” reads a data breach notification sent by FinWise on behalf of American First Finance (AFF).

American First Finance (AFF) is a company that offers consumer financing products, including installment loans and lease-to-own programs, for a diverse range of products and services. Customers use AFF to apply for and manage the loans, with the company handling the services, account setup, repayment process, and customer support.

/* */