Toggle light / dark theme

Multiferroic materials, in which electric and magnetic properties are combined in promising ways, will be the heart of new solutions for data storage, data transmission, and quantum computers. Meanwhile, understanding the origin of such properties at a fundamental level is key for developing applications, and neutrons are the ideal probe.

Neutrons possess a which makes them sensitive to magnetic fields generated by unpaired electrons in materials. This makes scattering techniques a powerful tool to probe the magnetic behavior of materials at atomic level.

The story of the so-called layered perovskites and the breakthrough results now published are a paradigmatic example highlighting both the role of fundamental studies in the development of applications and of the power of neutrons. Being a promising class of materials exhibiting coupled magnetic and electric ordering properties at ambient temperatures, the magnetic structure of the layered perovskites YBaCuFeO5—and thus the origin of their interesting magneto-electric behavior—was still to be unambiguously determined.

When humans kick swim through water, vortices form around their legs, generating the force that propels them forward. However, the mechanisms underlying variations in the structure of these vortices with swimming speed remain unclear.

In a new study published in Experiments in Fluids, researchers analyzed swimmer movement using an optical motion capture system and investigated vortex structure changes with varying speeds. They employed to visualize water flow dynamics.

Their results revealed that during underwater undulatory swimming, the vortex structure in the down-kick-to-up-kick transition phase changed as swimming speed increased. Specifically, with rising swimming speed, the direction of the jet flow between the two around the foot shifted to a more vertically downward orientation, a shift hypothesized to enhance forward propulsion during up-kicking.

A new study reveals that short-term exposure to particulate matter (PM) air pollution can reduce a person’s ability to focus and interpret emotions, potentially making everyday tasks — like grocery shopping — more difficult.

Scientists found that even brief exposure to high levels of PM can impair concentration, increase distractibility, and affect social behavior.

In the incident analyzed by the Canadian cybersecurity company, the initial access was gained to a targeted endpoint via a vulnerable SimpleHelp RMM instance (“194.76.227[.]171”) located in Estonia.

Upon establishing a remote connection, the threat actor has been observed performing a series of post-exploitation actions, including reconnaissance and discovery operations, as well as creating an administrator account named “sqladmin” to facilitate the deployment of the open-source Sliver framework.

The persistence offered by Sliver was subsequently abused to move laterally across the network, establishing a connection between the domain controller (DC) and the vulnerable SimpleHelp RMM client and ultimately installing a Cloudflare tunnel to stealthily route traffic to servers under the attacker’s control through the web infrastructure company’s infrastructure.

Morphisec CTO Michael Gorelik told The Hacker News that there is evidence connecting the two activity clusters, and that the deceptive Chrome installer site was previously leveraged to download the Gh0st RAT payload.

“This campaign specifically targeted Chinese-speaking users, as indicated by the use of Chinese-language web lures and applications aimed at data theft and evasion of defenses by the malware,” Gorelik said.

“The links to the fake Chrome sites are primarily distributed through drive-by download schemes. Users searching for the Chrome browser are directed to these malicious sites, where they inadvertently download the fake installer. This method exploits the users’ trust in legitimate software downloads, making them susceptible to infection.”

A 7-Zip vulnerability allowing attackers to bypass the Mark of the Web (MotW) Windows security feature was exploited by Russian hackers as a zero-day since September 2024.

According to Trend Micro researchers, the flaw was used in SmokeLoader malware campaigns targeting the Ukrainian government and private organizations in the country.

The Mark of the Web is a Windows security feature designed to warn users that the file they’re about to execute comes from untrusted sources, requesting a confirmation step via an additional prompt. Bypassing MoTW allows malicious files to run on the victim’s machine without a warning.

AMD has released mitigation and firmware updates to address a high-severity vulnerability that can be exploited to load malicious CPU microcode on unpatched devices.

The security flaw (CVE-2024–56161) is caused by an improper signature verification weakness in AMD’s CPU ROM microcode patch loader.

Attackers with local administrator privileges can exploit this weakness, resulting in the loss of confidentiality and integrity of a confidential guest running under AMD Secure Encrypted Virtualization-Secure Nested Paging (SEV-SNP).

Microsoft warns that attackers are deploying malware in ViewState code injection attacks using static ASP. NET machine keys found online.

As Microsoft Threat Intelligence experts recently discovered, some developers use ASP.NET validationKey and decryptionKey keys (designed to protect ViewState from tampering and information disclosure) found on code documentation and repository platforms in their own software.

ViewState enables ASP.NET Web Forms to control state and preserve user inputs across page reloads. However, if attackers get the machine key designed to protect it from tampering and information disclosure, they can use it in code injection attacks to craft malicious payloads by attaching crafted message authentication code (MAC).

The FCC has proposed a $4,492,500 fine against VoIP service provider Telnyx for allegedly allowing customers to make robocalls posing as fictitious FCC “Fraud Prevention Team,” by failing to comply with Know Your Customer (KYC) rules. However, Telnyx says the FCC is mistaken and denies the accusations.

The individuals behind these calls registered Telnyx accounts using the “Christian Mitchell” and “Henry Walker” names with the same address in Toronto, Canada, but IP addresses from Scotland and England. They are known as the “MarioCop” accounts because they both used email addresses on the same mariocop123.com domain.

Between February 6 and February 7, 2024, they made 1,797 imposter calls before Telnyx terminated their accounts. Ironically, their calls also reached over a dozen FCC staff and family members on their personal and work phone numbers one year ago.