Toggle light / dark theme

Get the latest international news and world events from around the world.

Log in for authorized contributors

Roadmap charts three paths to room-temperature quantum materials for cooler computing

Imagine a laptop that never gets hot, a phone that holds its charge for days, or a computer memory chip designed to permanently retain data, even when the power goes out. This is the possibility sitting inside a remarkable family of materials that a team of researchers from the University of Ottawa and the Massachusetts Institute of Technology (MIT) has spent years trying to understand, and they just published a comprehensive roadmap of the field to date in the journal Newton.

Magnetic topological materials sit at the crossroads of magnetism and topology in modern physics. Topology is the mathematical study of shapes that cannot be continuously deformed into one another. In these materials, that idea protects the flow of electrons in a way that normal materials simply cannot.

“Magnetic topological materials offer a unique platform where magnetism and quantum physics work together in ways we are only beginning to fully understand,” explains Hang Chi, Canada Research Chair in Quantum Electronic Devices and Circuits and Assistant Professor at uOttawa’s Department of Physics. “This review brings together the field’s most significant advances and gives researchers a shared foundation to build on.”

NASA’s Roman Space Telescope Could Finally Find the Milky Way’s Missing Neutron Stars

NASA’s Roman Telescope could finally expose the Milky Way’s hidden population of invisible neutron stars. Astronomers believe neutron stars should be scattered throughout the Milky Way, left behind after massive stars explode in supernova blasts. But despite their expected abundance, most of thes

New Brain “Bypass” Technology Could Transform Treatment for Neurological Disorders

A new technology called LinCx allows scientists to create custom electrical connections between neurons with high precision. Researchers say it may help treat disorders caused by damaged brain circuits. Damage to brain circuits plays a major role in many neurological disorders. Researchers at Duk

INTERPOL Operation Ramz Disrupts MENA Cybercrime Networks with 201 Arrests

Group-IB, which was one of the private sector companies that participated in the effort, said it provided “actionable intelligence” on over 5,000 compromised accounts, including those that were associated with government infrastructure, and shared details about active phishing infrastructure across the region.

“Cybercrime is borderless, and the only effective response is one that is equally borderless,” Joe Sander, CEO of Team Cymru, said. “Operation Ramz is exactly that kind of response, law enforcement and trusted private-sector partners pooling intelligence, moving in concert, and dismantling the infrastructure that criminals depend on.”

Countries that took part in Operation Ramz included Algeria, Bahrain, Egypt, Iraq, Jordan, Lebanon, Libya, Morocco, Oman, Palestine, Qatar, Tunisia, and the U.A.E.

Ivanti, Fortinet, SAP, VMware, n8n Patch RCE, SQL Injection, Privilege Escalation Flaws

Ivanti, Fortinet, n8n, SAP, and VMware have released security fixes for various vulnerabilities that could be exploited by bad actors to bypass authentication and execute arbitrary code.

Topping the list is a critical flaw impacting Ivanti Xtraction (CVE-2026–8043, CVSS score: 9.6) that could be exploited to achieve information disclosure or client-side attacks.

“External control of a file name in Ivanti Xtraction before version 2026.2 allows a remote authenticated attacker to read sensitive files and write arbitrary HTML files to a web directory, leading to information disclosure and possible client-side attacks,” Ivanti said in an advisory.

SHub macOS infostealer variant spoofs Apple security updates

A new variant of the ‘SHub’ macOS infostealer uses AppleScript to show a fake security update message and installs a backdoor.

Dubbed Reaper, the new version steals sensitive browser data, collects documents and files that may contain financial details, and hijacks crypto wallet apps.

Unlike earlier SHub campaigns that relied on “ClickFix” tactics, tricking users into pasting and executing commands in Terminal, the Reaper relies on the applescript:// URL scheme to launch the macOS Script Editor preloaded with a malicious AppleScript.

/* */