Toggle light / dark theme

Researchers at National Taiwan University have developed a new type of spintronic device that mimics how synapses work in the brain—offering a path to more energy-efficient and accurate artificial intelligence systems.

In a study published in Advanced Science, the team introduced three novel memory designs, all controlled purely by electric current and without any need for an .

Among the devices, the one based on “tilted anisotropy” stood out. This optimized structure was able to achieve 11 stable memory states with highly consistent switching behavior.

Gravitational waves are constantly washing over Earth, but an astrophysicist aims to capture them in an entirely new way—by watching distant quasars appear to wiggle due to spacetime distortions.

Using data from the Gaia satellite, he’s searching for three-dimensional effects that previous techniques might have missed.

Exploring a new method to detect gravitational waves.

Ever felt like a song really resonates with you? That may be more true than you think.

A new theory suggests that we don’t just listen to it; our bodies physically resonate with music, as our brains’ natural oscillations synchronize with structures like rhythm and pitch.

Music is often thought of as a ‘universal language’ – people across cultures will bust out similar moves, and young kids will instinctively bop to a beat.

At least two different cybercrime groups BianLian and RansomExx are said to have exploited a recently disclosed security flaw in SAP NetWeaver tracked as CVE-2025–31324, indicating that multiple threat actors are taking advantage of the bug.

Cybersecurity firm ReliaQuest, in a new update published today, said it uncovered evidence suggesting involvement from the BianLian data extortion crew and the RansomExx ransomware family, which is traced by Microsoft under the moniker Storm-2460.

BianLian is assessed to be involved in at least one incident based on infrastructure links to IP addresses previously identified as attributed to the e-crime group.

Then last year, Trustwave SpiderLabs revealed details of another phishing campaign targeting the same region with malicious payloads which it said exhibits similarities with that of Horabot malware.

The latest set of attacks starts with a phishing email that employs invoice-themed lures to entice users into opening a ZIP archive containing a PDF document. However, in reality, the attached ZIP file contains a malicious HTML file with Base64-encoded HTML data that’s designed to reach out to a remote server and download the next-stage payload.

“Attackers can exploit the flaw via a malicious web page or script that causes the scripting engine to misinterpret object types, resulting in memory corruption and arbitrary code execution in the context of the current user. If the user has administrative privileges, attackers could gain full system control – enabling data theft, malware installation, and lateral movement across networks.”

CVE-2025–30400 is the third privilege escalation flaw in DWM Core Library to be weaponized in the wild since 2023. In May 2024, Microsoft issued patches for CVE-2024–30051, which Kaspersky said was used in attacks distributing QakBot (aka Qwaking Mantis) malware.

“Since 2022, Patch Tuesday has addressed 26 elevation of privilege vulnerabilities in DWM,” Satnam Narang, senior staff research engineer at Tenable, said in a statement shared with The Hacker News.