Toggle light / dark theme

In the quest for ultra-secure, long-range quantum communication, two major challenges stand in the way: the unpredictable nature of atmospheric turbulence and the limitations of current optical wavefront correction techniques. Researchers at the University of Ottawa, under the supervision of Professor Ebrahim Karimi, the director of Nexus for Quantum Technologies, in collaboration with the National Research Council Canada (NRC) and the Max Planck Institute for the Science of Light (Germany), have made significant advances in overcoming both obstacles.

Their two latest breakthroughs—an AI-powered forecasting tool called TAROQQO and a high-speed Adaptive Optics (AO) system for correcting turbulence in quantum channels—represent a turning point in developing free-space quantum networks.

These advancements, published in Optics Express and Communication Physics, offer complementary solutions to the fundamental issue of atmospheric turbulence that distorts and diminishes photonic quantum states as they traverse through the air.

Two-photon vision is an emerging technique with significant potential for the future of ophthalmic diagnostics. While it offers many advantages, certain aspects still require refinement. Scientists at ICTER have advanced this technology, enhancing its capabilities and expanding its potential applications in ocular medicine.

Imagine looking through a kaleidoscope that reveals a spectrum of colors beyond human vision, where invisible light is brought into focus. In conventional sight, photons—the fleeting messengers of light—typically appear alone. However, in the phenomenon of two-photon vision, they work in pairs, allowing the human eye to perceive infrared laser pulses instead of visible light, unlocking access to an otherwise invisible world.

A crucial aspect of understanding two-photon vision is measuring the brightness of these stimuli. Until now, this was only possible for visible light. Scientists at the International Centre for Eye Research (ICTER) have achieved a groundbreaking milestone by determining the luminance value of infrared light using photometric units (cd/m²). This discovery has enabled them to connect the brightness of two-photon stimuli to a newly defined physical quantity: two-photon retinal illumination, a key factor in understanding perceived brightness.

Threat actors deploying the Black Basta and CACTUS ransomware families have been found to rely on the same BackConnect (BC) module for maintaining persistent control over infected hosts, a sign that affiliates previously associated with Black Basta may have transitioned to CACTUS.

“Once infiltrated, it grants attackers a wide range of remote control capabilities, allowing them to execute commands on the infected machine,” Trend Micro said in a Monday analysis. “This enables them to steal sensitive data, such as login credentials, financial information, and personal files.”

It’s worth noting that details of the BC module, which the cybersecurity company is tracking as QBACKCONNECT owing to overlaps with the QakBot loader, was first documented in late January 2025 by both Walmart’s Cyber Intelligence team and Sophos, the latter of which has designated the cluster the name STAC5777.

A previously undocumented polyglot malware is being deployed in attacks against aviation, satellite communication, and critical transportation organizations in the United Arab Emirates.

The malware delivers a backdoor called Sosano, which establishes persistence on the infected devices and allows the attackers to execute commands remotely.

The activity was discovered by Proofpoint in October 2024, which states that the attacks are linked to a threat actor named ‘UNK_CraftyCamel.’ While the campaign is still small, the researchers report that it is still advanced and dangerous to targeted companies.

A new botnet malware named ‘Eleven11bot’ has infected over 86,000 IoT devices, primarily security cameras and network video recorders (NVRs), to conduct DDoS attacks.

The botnet, which is loosely linked to Iran, has already launched distributed denial of service (DDoS) attacks targeting telecommunication service providers and online gaming servers.

Eleven11bot was discovered by Nokia researchers who shared the details with the threat monitoring platform GreyNoise.

New research has uncovered further links between the Black Basta and Cactus ransomware gangs, with members of both groups utilizing the same social engineering attacks and the BackConnect proxy malware for post-exploitation access to corporate networks.

In January, Zscaler discovered a Zloader malware sample that contained what appeared to be a new DNS tunneling feature. Further research by Walmart indicated that Zloader was dropping a new proxy malware called BackConnect that contained code references to the Qbot (QakBot) malware.

BackConnect is malware that acts as a proxy tool for remote access to compromised servers. BackConnect allows cybercriminals to tunnel traffic, obfuscate their activities, and escalate attacks within a victim’s environment without being detected.