Toggle light / dark theme

Get the latest international news and world events from around the world.

Log in for authorized contributors

This Tiny World in the Outer Solar System Should Be Airless, but It Has an Atmosphere

A tiny world in our Solar System has an atmosphere it shouldn’t—hinting something dramatic happened there recently.

A group of Japanese astronomers, including both professionals and amateur observers, has found signs of a thin atmosphere surrounding a small object far beyond Neptune. The discovery is surprising because the object is so small that it should not be able to hold onto gas for long. This raises new questions about when the atmosphere formed and what is keeping it there. Additional observations will be needed to better understand this unusual finding.

Why most trans-neptunian objects are airless.

Canvas login portals hacked in mass ShinyHunters extortion campaign

The ShinyHunters extortion gang has breached education technology giant Instructure again, this time exploiting a vulnerability to deface Canvas login portals for hundreds of colleges and universities.

The defacements, which were visible for roughly 30 minutes before being taken offline, displayed a message from ShinyHunters claiming responsibility for the earlier Instructure breach and threatening to leak stolen data if a ransom is not paid.

The message warns that Instructure and schools have until May 12 to contact them to negotiate a ransom, or students’ data will be leaked.

New TCLBanker malware self-spreads over WhatsApp and Outlook

A new trojan named TCLBanker, which targets 59 banking, fintech, and cryptocurrency platforms, uses a trojanized MSI installer for Logitech AI Prompt Builder to infect systems.

Additionally, the malware includes self-spreading worm modules for WhatsApp and Outlook that automatically infect new victims.

The new banking trojan was discovered by Elastic Security Labs, whose researchers believe it’s a major evolution of the older Maverick/Sorvepotel malware family.

Webinar: Why modern attacks require both security and recovery

Modern cyberattacks are designed to bypass traditional security controls, with phishing and business email compromise campaigns becoming increasingly personalized and difficult to detect.

However, the challenge for MSPs does not end once an attacker gains access. Many organizations lack the recovery planning and backup strategies needed to quickly restore operations after ransomware, SaaS compromise, or destructive attacks.

This webinar will examine where traditional MSP security strategies fall short after initial compromise, and why cyber resilience now depends on combining strong defenses with rapid recovery capabilities.

New PCPJack worm steals credentials, cleans TeamPCP infections

A new malware framework called PCPJack is stealing credentials from exposed cloud infrastructure while actively removing TeamPCP’s access to the systems.

Among the targeted services are Docker, Kubernetes, Redis, MongoDB, RayML, and vulnerable web applications. In many cases, the threat actor moves laterally on the network.

SentinelLabs researchers say that PCPJack appears designed for large-scale credential theft, and likely monetizes its activity via financial fraud, spam operations, credential resale, or extortion.

Physicists just found a tiny flaw in time itself

Physicists are rethinking one of quantum mechanics’ biggest puzzles: how fuzzy possibilities become definite reality. New research suggests that spontaneous “collapse” processes—possibly linked to gravity—could subtly blur time itself. This wouldn’t affect clocks we use today, but it reveals a hidden limit to how precise time can ever be. The findings open a new path toward uniting quantum physics with gravity.

Effect of Cognitive Reserve on Age at Symptom Onset and Cognitive Decline in Individuals With Dominantly Inherited Alzheimer Disease

This website uses a security service to protect against malicious bots. This page is displayed while the website verifies you are not a bot.

Leukemia stem cells cause treatments to fail, but findings open new avenues to overcome resistance

Scientists from the German Cancer Research Center (DKFZ) and the HI-STEM Stem Cell Institute have deciphered a key mechanism that contributes to treatment failure in acute myeloid leukemia (AML). They show that there are not just one, but four different subtypes of leukemia stem cells. This diversity could explain why one of the most important AML drugs does not work sufficiently in some patients or loses its effectiveness over time—resulting in the return of leukemia.

This discovery lays an important foundation for more precise and long-term successful treatment strategies that could specifically overcome resistance mechanisms. The findings are published in the journal Cell Stem Cell.

Acute myeloid leukemia (AML) is an aggressive form of blood cancer that primarily affects older people and often has a poor prognosis despite improved therapies. In recent years, the targeted drug venetoclax has significantly improved treatment. In combination with other drugs, venetoclax often shows good therapeutic success in AML and will, at least in part, replace highly aggressive chemotherapy in the future. However, AML returns in nearly all patients—usually because individual cancer stem cells become resistant to the drug.

/* */