Toggle light / dark theme

Get the latest international news and world events from around the world.

Log in for authorized contributors

Discoveries rewrite how some minerals form and dissolve

Two related discoveries detailing nanocrystalline mineral formation and dynamics have broad implications for managing nuclear waste, predicting soil weathering, designing advanced bioproducts and materials and optimizing commercial alumina production.

The two recently published studies combine detailed molecular imaging and molecular modeling to sort out how gibbsite, a common aluminum-containing mineral, forms and dissolves in exquisite detail.

Metal–metal bonded molecule achieves stable spin qubit state, opening path toward quantum computing materials

Researchers at Kumamoto University, in collaboration with colleagues in South Korea and Taiwan, have discovered that a unique cobalt-based molecule with metal–metal bonds can function as a spin quantum bit (spin qubit)—a fundamental unit for future quantum computers. The findings provide a new design strategy for molecular materials used in quantum information technologies.

The study is published in the journal Chemical Communications.

A New UV Laser Sends Messages in Trillionths of a Second

Ultrafast UV-C light just took a leap forward, opening the door to lightning-fast communications and next-generation photonic technologies.

Devices that work with ultraviolet light in the UV-C range (100−280 nm) are becoming increasingly important across many fields, including super-resolution microscopy and optical communications. Scientists are especially interested in UV-C light because it scatters strongly in the atmosphere, a property that makes it useful for non-line-of-sight communication. This means data could be sent even when a clear line of sight is blocked, such as in cluttered or obstructed environments. Despite these advantages, progress has been slow because researchers have lacked practical components that can reliably generate and detect UV-C light.

A new platform for ultrafast UV-C pulses.

Cloud file-sharing sites targeted for corporate data theft attacks

A threat actor known as Zestix has been offering to sell corporate data stolen from dozens of companies likely after breaching their ShareFile, Nextcloud, and OwnCloud instances.

According to cybercrime intelligence company Hudson Rock, initial access may have been obtained through credentials collected by info-stealing malware such as RedLine, Lumma, and Vidar deployed on employee devices.

The three infostealers are usually distributed through malvertising campaigns or ClickFix attacks. This type of malware commonly targets data stored by web browsers (credentials, credit cards, personal info), messaging apps, and cryptocurrency wallets.

NordVPN denies breach claims, says attackers have “dummy data”

NordVPN denied allegations that its internal Salesforce development servers were breached, saying that cybercriminals obtained “dummy data” from a trial account on a third-party automated testing platform.

The company’s statement comes after a threat actor (using the 1,011 handle) claimed on a hacking forum over the weekend that they stole more than 10 databases containing sensitive information like Salesforce API keys and Jira tokens, following a brute-force attack against a NordVPN development server.

“Today i am leaking +10 DB’s source codes from a nordvpn development server. This information was acquired by bruteforcing a misconfigured server of Nordypn, which has salesforce and jira information stored. Compromissed information: SalesForce api keys, jira tokens and more,” the threat actor said.

ClickFix attack uses fake Windows BSOD screens to push malware

A new ClickFix social engineering campaign is targeting the hospitality sector in Europe, using fake Windows Blue Screen of Death (BSOD) screens to trick users into manually compiling and executing malware on their systems.

A BSOD is a Windows crash screen displayed when the operating system encounters a fatal, unrecoverable error that causes it to halt.

In a new campaign first spotted in December and tracked by researchers at Securonix as “PHALT#BLYX,” phishing emails impersonating Booking.com led to a ClickFix social engineering attack that deployed malware.

/* */