Toggle light / dark theme

Get the latest international news and world events from around the world.

Log in for authorized contributors

Why do high-speed particles bounce higher in wet collisions?

Researchers have uncovered a counterintuitive phenomenon in collision dynamics: high-speed particles bounce back from wet walls much more strongly than expected. Integrating experimental observations with advanced numerical simulations revealed that increasing the impact speed induces a morphological transition in the post-collision liquid film, shifting it from a bridge to a dome shape. Further, it clarified the relevance of cavitation to such a dramatic change and to the stronger bounce.

The outcomes, published in the International Journal of Multiphase Flow, provide critical guidelines for predicting high-speed particle collisions on wet surfaces and pave the way for safer and optimized designs in applications such as next-generation aerospace and automotive rotors operating at higher speeds.

Ancient DNA Study Reveals Human Evolution Is Happening Faster Than We Thought

New research challenges long-standing assumptions about human evolution, revealing that natural selection has been more active—and more recent—than once believed. A sweeping analysis of ancient DNA from nearly 16,000 people is reshaping how scientists understand human evolution. By tracking genet

VECT 2.0 Ransomware Irreversibly Destroys Files Over 131KB on Windows, Linux, ESXi

Threat hunters are warning that the cybercriminal operation known as VECT 2.0 acts more like a wiper than a ransomware due to a critical flaw in its encryption implementation across Windows, Linux, and ESXi variants that renders recovery impossible even for the threat actors.

The fact that VECT’s locker permanently destroys large files rather than encrypting them means even victims who opt to pay the ransom cannot get their data back, as the decryption keys are discarded by the malware during the time encryption occurs.

“VECT is being marketed as ransomware, but for any file over 131KB – which is most of what enterprises actually care about – it functions as a data destruction tool,” Eli Smadja, group manager at Check Point Research, said in a statement shared with The Hacker News.

LiteLLM CVE-2026–42208 SQL Injection Exploited within 36 Hours of Disclosure

In yet another instance of threat actors quickly jumping on the exploitation bandwagon, a newly disclosed critical security flaw in BerriAI’s LiteLLM Python package has come under active exploitation in the wild within 36 hours of the bug becoming public knowledge.

The vulnerability, tracked as CVE-2026–42208 (CVSS score: 9.3), is an SQL injection that could be exploited to modify the underlying LiteLLM proxy database.

“A database query used during proxy API key checks mixed the caller-supplied key value into the query text instead of passing it as a separate parameter,” LiteLLM maintainers said in an alert last week.

Microsoft: New Remote Desktop warnings may display incorrectly

Microsoft has confirmed a new issue causing newly introduced Windows security warnings to display incorrectly when opening Remote Desktop (.rdp) files.

This known issue impacts all supported Windows versions, including Windows 11 (KB5083768 & KB5083769), Windows 10 (KB5082200), and Windows Server (KB5082063).

As Microsoft explains in updates to the original advisories, “the security warning that appears when opening Remote Desktop (RDP) files might not display correctly in some cases.”

/* */