Toggle light / dark theme

Get the latest international news and world events from around the world.

Log in for authorized contributors

Researchers make key advances in radiation detection

Researchers in the Oregon State University College of Engineering have developed new technology for uranium enrichment measurement and trace element detection, vital for nuclear nonproliferation and supporting the development and operation of next-generation nuclear reactors.

“The technology that we are developing can support nuclear safeguards as well as nuclear energy development,” said Haori Yang, associate professor of nuclear science and engineering. “It can enable on-site enrichment measurements with minimal or no sample preparation, which means a quick turnaround time. It can also be used to monitor fuel in Gen-IV nuclear reactors, such as liquid metal–cooled reactors.”

In its naturally occurring state, uranium contains less than 1% U-235, the isotope that can sustain a nuclear chain reaction; the rest is U-238, which is much less able to do so.

Is Intelligence Genetic? Scientists Discover Heritable Brain State That Powers Cognitive Flexibility

Brain dynamics and cognition share genetic roots. Criticality may guide future brain health research. A recent study published on June 24 in PNAS presents strong evidence that brain criticality—the delicate balance between neural excitation and inhibition—is heavily influenced by genetic factors

What’s Missing in the Psychopathic Brain? Scientists Find Startling Clues

A research team has used the Julich-Brain Atlas to identify specific brain structures linked to antisocial behavior. A recent publication in the European Archives of Psychiatry and Clinical Neuroscience provides new insights into structural brain differences linked to psychopathy, a condition str

New PHP-Based Interlock RAT Variant Uses FileFix Delivery Mechanism to Target Multiple Industries

Threat actors behind the Interlock ransomware group have unleashed a new PHP variant of its bespoke remote access trojan (RAT) as part of a widespread campaign using a variant of ClickFix called FileFix.

“Since May 2025, activity related to the Interlock RAT has been observed in connection with the LandUpdate808 (aka KongTuke) web-inject threat clusters,” The DFIR Report said in a technical analysis published today in collaboration with Proofpoint.

“The campaign begins with compromised websites injected with a single-line script hidden in the page’s HTML, often unbeknownst to site owners or visitors.”

Google Gemini flaw hijacks email summaries for phishing

Google Gemini for Workspace can be exploited to generate email summaries that appear legitimate but include malicious instructions or warnings that direct users to phishing sites without using attachments or direct links.

Such an attack leverages indirect prompt injections that are hidden inside an email and obeyed by Gemini when generating the message summary.

Despite similar prompt attacks being reported since 2024 and safeguards being implemented to block misleading responses, the technique remains successful.

Interlock ransomware adopts FileFix method to deliver malware

Hackers have adopted the new technique called ‘FileFix’ in Interlock ransomware attacks to drop a remote access trojan (RAT) on targeted systems.

Interlock ransomware operations have increased over the past months as the threat actor started using the KongTuke web injector (aka ‘LandUpdate808’) to deliver payloads through compromised websites.

This shift in modus operandi was observed by researchers at The DFIR Report and Proofpoint since May. Back then, visitors of compromised sites were prompted to pass a fake CAPTCHA + verification, and then paste into a Run dialog content automatically saved to the clipboard, a tactic consistent with ClickFix attacks.

Gigabyte motherboards vulnerable to UEFI malware bypassing Secure Boot

Dozens of Gigabyte motherboard models run on UEFI firmware vulnerable to security issues that allow planting bootkit malware that is invisible to the operating system and can survive reinstalls.

The vulnerabilities could allow attackers with local or remote admin permissions to execute arbitrary code in System Management Mode (SMM), an environment isolated from the operating system (OS) and with more privileges on the machine.

Mechanisms running code below the OS have low-level hardware access and initiate at boot time. Because of this, malware in these environments can bypass traditional security defenses on the system.