Join our Folding@Home team:
Main F@H site
Our team page
Support us: Subscribe Here
and buy SoylentNews Swag
We always have a place for talented people, visit the Get Involved section on the wiki to see how you can make SoylentNews better.
RFK Jr cancels $500m in mRNA vaccine development in the US:
RFK Jr cancels $500m in funding for mRNA vaccines for diseases like Covid
The US Department of Health and Human Services (HHS) plans to cancel $500m (£376m) in funding for mRNA vaccines being developed to counter viruses that cause diseases such as the flu and Covid-19.
That will impact 22 projects being led by major pharmaceutical companies, including Pfizer and Moderna, for vaccines against bird flu and other viruses, HHS said.
Health Secretary Robert F Kennedy Jr, a vaccine sceptic, announced he was pulling the funding over claims that "mRNA technology poses more risks than benefits for these respiratory viruses".
Doctors and health experts have criticised Kennedy's longstanding questioning of the safety and efficacy of vaccines and his views on health policies.
The development of mRNA vaccines to target Covid-19 was critical in helping slow down the pandemic and saving millions of lives, said Peter Lurie, a former US Food and Drug Administration official.
He told the BBC that the change was the US "turning its back on one of the most promising tools to fight the next pandemic".
In a statement, Kennedy said his team had "reviewed the science, listened to the experts, and acted". "[T]he data show these vaccines fail to protect effectively against upper respiratory infections like COVID and flu," he said.
He said the department was shifting the funding toward "safer, broader vaccine platforms that remain effective even as viruses mutate".
Kennedy also claimed that mRNA vaccines can help "encourage new mutations and can actually prolong pandemics as the virus constantly mutates to escape the protective effects of the vaccine".
Health experts have said that viruses mutate regardless of whether vaccines exist for them.
This was true every year for the flu virus, for example, said Dr Paul Offit, the director of the Vaccine Education Center at Children's Hospital of Philadelphia.
Dr Offit said mRNA vaccines were "remarkably safe" and a key to helping prevent against severe infections from viruses like Covid-19.
HHS said the department that runs the vaccine projects, Biomedical Advanced Research and Development Authority (BARDA), would focus on "platforms with stronger safety records and transparent clinical and manufacturing data practices".
While some vaccines use an inactivated virus to trigger an immune response, mRNA vaccines work by teaching cells how to make proteins that can trigger an immune response. Moderna and Pfizer's mRNA vaccines were tested in thousands of people before being rolled out and were found to be safe and effective.
Dr Offit, who invented the rotavirus vaccine, said the funding cancellation could put the US in a "more dangerous" position to respond to any potential future pandemic. He noted mRNA vaccines have a shorter development cycle, which is why they were crucial to responding to the Covid-19 pandemic.
Since taking office, Kennedy has taken a number of steps to transform how the nation's health department develops and regulates vaccines.
In June, he fired all 17 members of a committee that issues official government recommendations on immunisations, replacing them with some people who have criticized the safety and efficacy of vaccines.
He also removed the Covid-19 vaccine from the Center for Disease Control and Prevention's recommended immunization schedule for healthy children and pregnant women.
Related stories at the BBC:
Is RFK Jr's divisive plan to Make America Healthy Again fearmongering - or revolutionary?
RFK Jr sacks entire US vaccine committee
RFK Jr's vaccine panel to review long-approved jabs for children
The two faces of Robert F Kennedy Jr
Linuxiac reports that another malicious package has been uploaded to the Arch User Repository (AUR). This time around the package was google-chrome-stable, which installed a remote-access trojan along with Google Chrome.
The good news—if you can call it that—is that the google-chrome-stable package was available on the AUR only for a few hours before the malware hidden inside was discovered. Still, it did get a few upvotes, which suggests at least some users ended up installing it.
The Arch Linux project had to warn users about a similar attack less than a month ago when a user uploaded three browser packages that also installed a malicious script identified as a remote-access trojan.
Also see: https://lwn.net/Articles/1032193/
Ubuntu users will see a few changes to their command line tools with the launch of Ubuntu 25.10 in October. The wget utility for downloading files is being replaced by wcurl which offers most of the same basic functionality. It's FOSS reports: "Ubuntu Server 25.10 will no longer include wget by default, switching to wcurl instead."
Fresh installations will see this change when 25.10 releases in October. wget has been the standard command-line download tool on Linux systems for years. Most server administrators and scripts rely on its straightforward syntax for file downloads. On the other hand, wcurl is a simple curl wrapper that lets you download files without remembering curl parameters, using curl under the hood with sane defaults."
The report goes on to note another GNU utility, the screen command, will be dropped in favour of Tmux.
Hiding secret codes in light can protect against fake videos
A team of Cornell researchers has developed a way to "watermark" light in videos, which they can use to detect if video is fake or has been manipulated.
The idea is to hide information in nearly-invisible fluctuations of lighting at important events and locations, such as interviews and press conferences or even entire buildings, like the United Nations Headquarters. These fluctuations are designed to go unnoticed by humans, but are recorded as a hidden watermark in any video captured under the special lighting, which could be programmed into computer screens, photography lamps and built-in lighting. Each watermarked light source has a secret code that can be used to check for the corresponding watermark in the video and reveal any malicious editing.
Peter Michael, a graduate student in the field of computer science who led the work, will present the study, "Noise-Coded Illumination for Forensic and Photometric Video," on Aug. 10 at SIGGRAPH 2025 in Vancouver, British Columbia.
Editing video footage in a misleading way is nothing new. But with generative AI and social media, it is faster and easier to spread misinformation than ever before.
"Video used to be treated as a source of truth, but that's no longer an assumption we can make," said Abe Davis, assistant professor of computer science in the Cornell Ann S. Bowers College of Computing and Information Science, who first conceived of the idea. "Now you can pretty much create video of whatever you want. That can be fun, but also problematic, because it's only getting harder to tell what's real."
To address these concerns, researchers had previously designed techniques to watermark digital video files directly, with tiny changes to specific pixels that can be used to identify unmanipulated footage or tell if a video was created by AI. However, these approaches depend on the video creator using a specific camera or AI model—a level of compliance that may be unrealistic to expect from potential bad actors.
By embedding the code in the lighting, the new method ensures that any real video of the subject contains the secret watermark, regardless of who captured it. The team showed that programmable light sources, like computer screens and certain types of room lighting, can be coded with a small piece of software, while older lights, like many off-the-shelf lamps, can be coded by attaching a small computer chip about the size of a postage stamp. The program on the chip varies the brightness of the light according to the secret code.
So, what secret information is hidden in these watermarks, and how does it reveal when video is fake? "Each watermark carries a low-fidelity time-stamped version of the unmanipulated video under slightly different lighting. We call these code videos," Davis said. "When someone manipulates a video, the manipulated parts start to contradict what we see in these code videos, which lets us see where changes were made. And if someone tries to generate fake video with AI, the resulting code videos just look like random variations."
Part of the challenge in this work was getting the code to be largely imperceptible to humans. "We used studies from human perception literature to inform our design of the coded light," Michael said. "The code is also designed to look like random variations that already occur in light called 'noise," which also makes it difficult to detect, unless you know the secret code."
If an adversary cuts out footage, such as from an interview or political speech, a forensic analyst with the secret code can see the gaps. And if the adversary adds or replaces objects, the altered parts generally appear black in recovered code videos.
The team has successfully used up to three separate codes for different lights in the same scene. With each additional code, the patterns become more complicated and harder to fake.
"Even if an adversary knows the technique is being used and somehow figures out the codes, their job is still a lot harder," Davis said. "Instead of faking the light for just one video, they have to fake each code video separately, and all those fakes have to agree with each other."
They have also verified that this approach works in some outdoor settings and on people with different skin tones.
Davis and Michael caution, however, that the fight against misinformation is an arms race, and adversaries will continue to devise new ways to deceive.
"This is an important ongoing problem," Davis said. "It's not going to go away, and in fact, it's only going to get harder."
More information: Peter Michael et al, Noise-Coded Illumination for Forensic and Photometric Video Analysis, ACM Transactions on Graphics (2025). DOI: 10.1145/3742892
China's biggest solar firms shed nearly one-third of their workforces last year, company filings show, as one of the industries hand-picked by Beijing to drive economic growth grapples with falling prices and steep losses:
The job cuts illustrate the pain from the vicious price wars being fought across Chinese industries, including solar and electric vehicles, as they grapple with overcapacity and tepid demand. The world produces twice as many solar panels each year as it uses, with most of them manufactured in China.
Longi Green Energy (601012.SS), Trina Solar , Jinko Solar (688223.SS), JA Solar ( 002459.SZ), and Tongwei (600438.SS), collectively shed some 87,000 staff, or 31% of their workforces on average last year, according to a Reuters review of employment figures in public filings.
Analysts say the previously unreported job losses were likely a mix of layoffs and attrition due to cuts to pay and hours as companies sought to stem losses.
[...] While analysts say it is unclear whether job cuts continued this year, Beijing is increasingly signalling it intends to intervene to cut capacity, sending polysilicon prices soaring nearly 70% in July while solar panel prices have increased more modestly.
[...] But many provincial governments are likely to be reluctant to crack down hard on overcapacity, analysts say. These officials are scored on jobs and economic growth and are loathe to see local champions sacrificed to meet someone else's target.
Also at ZeroHedge.
OpenAI's new open models can run on your hardware instead of in the cloud:
OpenAI is releasing new generative AI models today [Aug 05, 2025], and no, GPT-5 is not one of them. Depending on how you feel about generative AI, these new models may be even more interesting, though. The company is rolling out gpt-oss-120b and gpt-oss-20b, its first open-weight models since the release of GPT-2 in 2019. You can download and run these models on your own hardware, with support for simulated reasoning, tool use, and deep customization.
When you access the company's proprietary models in the cloud, they're running on powerful server infrastructure that cannot be replicated easily, even in enterprise. The new OpenAI models come in two variants (120b and 20b) to run on less powerful hardware configurations. Both are transformers with a configurable chain of thought (CoT), supporting low, medium, and high settings. The lower settings are faster and use fewer compute resources, but the outputs are better with the highest setting. You can set the CoT level with a single line in the system prompt.
The smaller gpt-oss-20b has a total of 21 billion parameters, utilizing mixture-of-experts (MoE) to reduce that to 3.6 billion parameters per token. As for gpt-oss-120b, its 117 billion parameters come down to 5.1 billion per token with MoE. The company says the smaller model can run on a consumer-level machine with 16GB or more of memory. To run gpt-oss-120b, you need 80GB of memory, which is more than you're likely to find in the average consumer machine. It should fit on a single AI accelerator GPU like the Nvidia H100, though. Both models have a context window of 128,000 tokens.
[...] OpenAI says it doesn't intend for anyone to replace its proprietary models with the new OSS releases. It did not set out to replicate what you can do with the mainline GPT releases here, and there are some notable limitations. For example, gpt-oss-120b and gpt-oss-20b are text-only with no multimodality out of the box. However, the company acknowledges there are times when someone might not want to rely on a big cloud-based AI—locally managed AI has lower latency and more opportunities for customization, and it can keep sensitive data secure on site.
OpenAI is cognizant that many users of the company's proprietary models are also leveraging open source models for these reasons. Currently, those firms are using non-OpenAI products for local AI, but the team designed the gpt-oss models to integrate with the proprietary GPT models. So customers can now use end-to-end OpenAI products even if they need to process some data locally.
Because these models are fully open and governed by the Apache 2.0 license, developers will be able to tune them for specific use cases. Like all AI firms, OpenAI builds controls into its models to limit malicious behavior, but it's been a few years since the company released an open model—the gpt-oss models are much more powerful than GPT-2 was in 2019.
[...] If you want to test that claim yourself, gpt-oss-120b and gpt-oss-20b are available for download today on HuggingFace. There are also GitHub repos for your perusal, and OpenAI will host stock versions of the models on its own infrastructure for testing. If you are interested in more technical details, the company has provided both a model card and a research blog post.
Arthur T Knackerbracket has processed the following story:
Cadence admits guilt in exporting chip design tools to China’s National University of Defense Technology, which is believed to be working on the Chinese nuclear program.
Cadence Design Systems, one of the leading electronic design automation (EDA) firms in the U.S., has pleaded guilty to charges, saying that it sold its chip design software to the National University of Defense Technology, located in Hunan Province in South-Central China. According to Reuters, this institution is believed to be working on nuclear explosion simulations, linking it to China’s nuclear weapons research and development efforts.
The university has been on the U.S. Department of Commerce’s Entity List — a list of companies, institutions, and individuals that the White House deems to be operating contrary to its national security and foreign policy interests — since 2015. Furthermore, its affiliates and aliases, including Hunan Guofang Keji University, Central South CAD Center, and CSCC, were also added to the restricted list in 2019 and 2022, respectively.
Despite this, court records reveal that the chip design company and its China subsidiary, Cadence China, delivered EDA tools to CSCC at least 56 times between 2015 and 2020. This continued even though several Cadence China employees knew that CSCC is simply an alias that NUDT used to circumvent American sanctions. Furthermore, Cadence also sold its products to Phytium Technology Co., a Chinese semiconductor company that’s known to be closely working with NUDT, without applying for the proper export licenses.
The company pleaded guilty to one count of conspiracy to commit export control violations, requiring it to pay $140 million in forfeitures, civil, and criminal penalties. Aside from that, the court is also expected to put it under probation for three years, preventing it from doing business with sanctioned institutions at the risk of even harsher penalties.
The U.S. has lifted a ban on the general export of EDA tools, including those from Cadence, earlier this month. However, this lifting only makes it readily available to institutions that aren’t included in the Entity List. So, any company that wants to do business with NUDT and its affiliates must still acquire a proper export license from the Federal government.
Cadence, so far, is the biggest company to have pleaded guilty to breaking American sanctions on Chinese companies. However, it’s not the only one facing scrutiny. Nvidia, the current world leader in AI semiconductors, has seen billions of dollars’ worth of its AI chips smuggled into China. While its CEO, Jensen Huang, continues to deny that its chips are being diverted, there is a thriving black market in China for banned GPUs like the B200 and RTX 5090.
The U.S. is tightening its grip on export controls, even pressuring its allies like Singapore and Malaysia to clamp down on smuggling rings. However, the massive demand in China makes smuggling AI technologies quite lucrative, making it nearly impossible to stop completely.
Some billing changes caused AWS to delete the entirety of developer Seuros' account rather than roll back to the old billing account on record. He has written an annotated timeline and analysis of how AWS came to not just delete a 10-year old, paid up account without warning but also give him quite a run around.
On July 23, 2025, AWS deleted my 10-year-old account and every byte of data I had stored with them. No warning. No grace period. No recovery options. Just complete digital annihilation.
[...] Lessons Learned
- Never trust a single provider—no matter how many regions you replicate across
- "Best practices" mean nothing when the provider goes rogue
- Document everything—screenshots, emails, correspondence timestamps
- The support theater is real—they literally cannot help you
- Have an exit strategy executable in hours, not days
AWS won't admit their mistake. They won't acknowledge the rogue proof of concept. They won't explain why MENA operates differently. They won't even answer whether your data exists.
But they will ask you to rate their support 5 stars.
The cloud isn't your friend. It's a business. And when their business needs conflict with your data's existence, guess which one wins?
Plan accordingly.
[....] At one point during this ordeal, I hit rock bottom. I was ready to delete everything—yank all my gems from RubyGems, delete the organizations, the websites, everything I'd created. Leave a single message: "AWS killed this."
It would have made headlines. Caused chaos for thousands of projects. Trended on HN, Reddit, YouTube. But it would have hurt the wrong people—developers who depend on my work, not AWS.
As he points out, having all your activities managed by a single provider leaves one at risk for such extinction events. But maybe moving over to another, similar cloud provider is just kicking the can down the road and asking for a repeat of events under new circumstances.
Previously:
(2023) AWS to Charge Customers for Public IPv4 Addresses From 2024
(2019) Amazon Slams Media For Not Saying Nice Things About AWS
(2019) Amazon is Saying Nothing About the DDoS Attack That Took Down AWS, but Others Are
(2019) Azure Might be Woefully Inefficient and Unprofitable
(2018) The Cloud is a Six-Horse Race, and Three of Those Have Been Lapped
Live from the bottom of the ocean. Underwater robot draws in millions of people watching it live as it explores the bottom of the sea.
A robot is navigating the dark, cold depths of the South Atlantic seabed, streaming images of dazzling coral and previously unseen fish, while scientists provide live commentary on YouTube – and Argentines are captivated. It's the first time human eyes, albeit remotely, are witnessing this underwater oasis in real time, where the frigid, nutrient-rich Malvinas current meets the warm, salty waters of the Brazil Current.
https://www.france24.com/en/americas/20250803-the-bright-side-underwater-robot-live-stream-mesmerizes-argentines
https://www.youtube.com/watch?v=oAanpXjQpN8 [10:05:00 Fascinating. Audio in Spanish. --JE]
Infrared contact lens helps people see in the dark, even with their eyes closed:
Researchers have developed a contact lens that can convert infrared light, which is normally invisible to our eyes, into visible light.
Because infrared light can pass through our eyelids, study participants wearing the contact lenses could see with their eyes shut.
The contact lenses can only give the wearer blurry infrared "sight", but the researchers say they're working on increasing resolution for uses like night vision.
Many people have wished for night vision on a dark walk home. But have you ever wondered if it's possible to see with your eyes closed?
Both are feasible with a contact lens that allows the wearer to see light that's usually invisible to our eyes — and can pass through our eyelids.
The infrared lens, which was developed by researchers in China, was unveiled in the journal Cell today.
Tian Xue, a neuroscientist at the University of Science and Technology of China and study co-author, said the material had the potential to give people "super-vision".
But in the shorter term, the team's ambitions are more modest.
"Flickering infrared light could be used to transmit information in security, rescue, encryption or anti-counterfeiting settings," Professor Xue said in a press release.
Our eye cells only register light in a small proportion of the electromagnetic spectrum.
If we could see longer wavelengths — just outside the visible spectrum into the near-infrared — we'd be able to see humans and other warm-blooded animals "glow" faintly as they emit infrared light.
Devices like night-vision goggles often work by tuning into near-infrared wavelengths, sometimes accompanied by an infrared light source to illuminate the surrounding area.
But these devices usually need an external power source to work, making them bulky.
They also tend to have a very limited of field of view, according to Paul Martin, a researcher in ophthalmology at the University of Sydney.
"One helicopter pilot, who has used them for night-time missions, has told me it is like staring through toilet paper rolls to find what you are looking for,"
[...] While it's possible to buy "infrared" contact lenses online, typically marketed for cheating at card games, these lenses don't allow users to see infrared light.
Instead, Professor Martin said they filter out higher wavelengths of light to make it easier to see light at a desired wavelength — usually, one tuned to an invisible ink sold with the contact lenses.
Researchers around the world, including in Australia, have been working on less cumbersome materials that can perform "wavelength shifting": absorbing invisible infrared light and re-emitting it as light we can see.
The researchers behind the new study had previously developed particles roughly the size of a small virus by mixing gold atoms with a few other elements, including the metals ytterbium and erbium.
The team injected these particles into the eyes of mice and found it gave them infrared vision. But they wanted to make the process less invasive before testing it on humans.
In the newest study, the researchers mixed their nanoparticles with polymers used in commercial contact lenses, and moulded this mixture into contacts.
They found people wearing the contact lenses could see visible light as normal. But they could also see a flashing infrared light — even when their eyes were shut.
Our eyelids have evolved to block visible light, but infrared light can pass right through them.
In fact, Professor Xue said participants were better at detecting the infrared flashes when their eyes were shut, because there was less interference from visible light.
The researchers could tweak their nanoparticles to convert specific infrared wavelengths into specific visible wavelengths, so the participants could see different shades of infrared light in different visible colours.
They tested this by showing the study participants different letters made from infrared light, which the participants could read in different colours.
Professor Martin, who was not involved with the research, called the study a "marvellous technical tour de force".
"One big and exciting promise of the present study is that the contact lenses or glasses could become a new basis for human-worn surveillance devices."
While the research is promising, Professor Martin believes these contact lenses are a long way away from practical use.
People using the lenses could see infrared light, but they weren't granted fine night vision.
"The contact lenses, because they are on the surface of the eye, would allow at best a very blurry image, like opening your eyes underwater,"
Journal References:
Near-infrared spatiotemporal color vision in humans enabled by upconversion contact lenses
Enhanced Infrared Vision by Nonlinear Up-Conversion in Nonlocal Metasurfaces
https://www.nextron-systems.com/2025/08/01/plague-a-newly-discovered-pam-based-backdoor-for-linux/
As part of our ongoing threat hunting efforts, we identified a stealthy Linux backdoor that appears to have gone publicly unnoticed so far. We named it Plague. The implant is built as a malicious PAM (Pluggable Authentication Module), enabling attackers to silently bypass system authentication and gain persistent SSH access.
What caught our attention: although several variants of this backdoor have been uploaded to VirusTotal over the past year, not a single antivirus engine flags them as malicious (see screenshot). To our knowledge, there are no public reports or detection rules available for this threat, suggesting that it has quietly evaded detection across multiple environments. [...]
This malware features anti-debugging capabilities to thwart analysis and reverse engineering attempts, string obfuscation to make detection more difficult, hardcoded passwords for covert access, as well as the ability to hide session artifacts that would normally reveal the attacker's activity on infected devices.
Once loaded, it will also scrub the runtime environment of any traces of malicious activity by unsetting SSH-related environment variables and redirecting command history to /dev/null to prevent logging, eliminating audit trails and login metadata, and erasing the attacker's digital footprint from system history logs and interactive sessions.
"Plague integrates deeply into the authentication stack, survives system updates, and leaves almost no forensic traces. Combined with layered obfuscation and environment tampering, this makes it exceptionally hard to detect using traditional tools," threat researcher Pierre-Henri Pezier said.
"The malware actively sanitizes the runtime environment to eliminate evidence of an SSH session. Environment variables such as SSH_CONNECTION and SSH_CLIENT are unset using unsetenv, while HISTFILE is redirected to /dev/null to prevent shell command logging."
While analyzing the malware, the researchers also discovered compilation artifacts indicating active development over an extended period, with samples compiled using various GCC versions across different Linux distributions.
Article continues @: https://www.nextron-systems.com/2025/08/01/plague-a-newly-discovered-pam-based-backdoor-for-linux/
Article archived @: https://archive.ph/gzh9Z
Article referenced @: https://www.bleepingcomputer.com/news/security/new-plague-malware-backdoors-linux-devices-removes-ssh-session-traces/
Russian volcano erupts for first time in centuries:
Russian volcano erupts for first time in more than 500 years ShareSaveShareSaveAdam DurbinBBC NewsShareSave
A volcano in far eastern Russia has erupted for the first time in more than 500 years, which experts say may be linked to last week's massive earthquake.
The Krasheninnikov Volcano in Kamchatka threw up an ash plume up to six kilometres (3.7 miles) high overnight. There are no threats to populated areas, Russia's emergency ministry said.
Hours later, another large earthquake in Russia led to tsunami warnings in three areas of the peninsula.
Both events may be connected to a massive 8.8 magnitude earthquake which hit a similar area last week, which caused tsunami warnings as far away as French Polynesia and Chile.
Russian experts had warned strong aftershocks were possible for several weeks after Wednesday's earthquake - which was one of the strongest ever recorded and saw millions of people evacuate.
Sunday's 7.0 magnitude quake hit the Kuril Islands and could lead to waves of up to 18cm (7in), Russia's emergency ministry reported.
It said people in three areas of Kamchatka "must still move away from the shore", despite the low wave heights.
The last recorded eruption of Krasheninnikov was in the 15th century, according to the head of the Kamchatka Volcanic Eruption Response Team.
Olga Girina also said it may be linked to the earlier 8.8 magnitude earthquake, according to Russian state news agency RIA.
The Kamchatka Peninsula is remote but lies in the "Pacific Ring of Fire" - so called because of the high number of earthquakes and volcanoes that occur here.
MOSCOW: A volcano erupted for the first time in 475 years in Russia's eastern Kamchatka region, the nation's emergency authority said on Sunday (Aug 3), days after one of the strongest earthquakes on record hit the region.
Pictures released by Russian state media show a towering plume of ash spewing from the Krasheninnikov volcano, which last erupted in 1550, according to the Smithsonian Institution's Global Volcanism Program.
The plume is estimated to have reached an altitude of 6,000m, Kamchatka's Ministry of Emergency Situations said in a post on Telegram.
"The plume is spreading eastward from the volcano toward the Pacific Ocean. There are no populated areas along its path, and no ashfall has been recorded in inhabited localities," the ministry said.
The volcano has been assigned an "orange" aviation hazard code, the ministry added, meaning flights in the area may be disrupted.
It came after Klyuchevskoy, another volcano in the region - the highest active in Europe and Asia - erupted on Wednesday.
Eruptions of Klyuchevskoy are quite common, with at least 18 occurring since 2000, according to the Global Volcanism Program.
Both recent eruptions followed one of the strongest earthquakes recorded, which struck on Wednesday, sparking tsunami warnings and evacuations of millions of people from coastal areas from Japan to Hawaii to Ecuador.
The worst damage was seen in Russia, where a tsunami crashed through the port of Severo-Kurilsk and submerged a fishing plant, officials said.
The 8.8-magnitude quake struck off Petropavlovsk on Russia's Kamchatka peninsula and was the strongest since 2011, when a 9.1-magnitude quake off Japan caused a tsunami that killed more than 15,000 people.
Inspired by astronauts, researchers use high-tech pants to uncover heart issues on MRI:
Astronauts wear lower body negative-pressure (LBNP) pants to simulate the effect of gravity during space travel. Now, a new study published in European Heart Journal – Cardiovascular Imaging suggests the same basic technology could significantly improve the performance of MRI-based exercise stress testing.
Researchers with the University of Texas at Arlington (UTA) first got the idea while watching an astronaut floating in space. If LBNP pants can help astronauts in space, they thought, perhaps it could help patients undergoing a stress test inside an MRI scanner.
The group put this theory to the test by developing new LBNP pants that could be worn during an MRI stress test, improving the patient's ability to move and—hopefully—providing more effective stress test results that can be used to put together a treatment strategy. By simulating the effect of standing up, clinicians are able to evaluate the stress test results and gain a much better understanding of how the patient moves—and how their heart is functioning.
According to the first-in-human data published in European Heart Journal – Cardiovascular Imaging, this new-look technology does show substantial potential. But much more research will still be necessary before anything gains regulatory approval.
"Our initial proof-of-concept data clearly highlights the strength and promise of this approach," lead author Brandon Hathorn, a PhD student with UTA, said in a statement.
"We've completely transformed the way we look at exercise cardiac MRI," added Michael Nelson, PhD, an associate professor and director of the Clinical Imaging Research Center (CIRC) at UTA. "In my opinion, the recent developments we've made should become the new standard. You shouldn't be doing exercise cardiac MRI without lower body negative-pressure pants."
UTA's CIRC includes a 3.0T MRI scanner with a 70-cm bore. Equipment this large is ideal for MRI-based exercise stress tests, which can be used to help evaluate a patient's quality of life and calculate their risk of experiencing adverse outcomes in the future.
Astronauts wear lower body negative-pressure (LBNP) pants to simulate the effect of gravity during space travel. Now, a new study published in European Heart Journal – Cardiovascular Imaging suggests the same basic technology could significantly improve the performance of MRI-based exercise stress testing.[1]
Researchers with the University of Texas at Arlington (UTA) first got the idea while watching an astronaut floating in space. If LBNP pants can help astronauts in space, they thought, perhaps it could help patients undergoing a stress test inside an MRI scanner.
The group put this theory to the test by developing new LBNP pants that could be worn during an MRI stress test, improving the patient's ability to move and—hopefully—providing more effective stress test results that can be used to put together a treatment strategy. By simulating the effect of standing up, clinicians are able to evaluate the stress test results and gain a much better understanding of how the patient moves—and how their heart is functioning.
According to the first-in-human data published in European Heart Journal – Cardiovascular Imaging, this new-look technology does show substantial potential. But much more research will still be necessary before anything gains regulatory approval.
"Our initial proof-of-concept data clearly highlights the strength and promise of this approach," lead author Brandon Hathorn, a PhD student with UTA, said in a statement.
"We've completely transformed the way we look at exercise cardiac MRI," added Michael Nelson, PhD, an associate professor and director of the Clinical Imaging Research Center (CIRC) at UTA. "In my opinion, the recent developments we've made should become the new standard. You shouldn't be doing exercise cardiac MRI without lower body negative-pressure pants."
UTA's CIRC includes a 3.0T MRI scanner with a 70-cm bore. Equipment this large is ideal for MRI-based exercise stress tests, which can be used to help evaluate a patient's quality of life and calculate their risk of experiencing adverse outcomes in the future.
Astronomers have made a groundbreaking discovery using some of the world's most advanced radio telescopes. Researchers, led by Fengqiu Adam Dong, a Jansky Fellow at the NSF Green Bank Observatory (NSF GBO), have identified an exceptionally unusual cosmic object known as a Long Period Radio Transient (LPT), named CHIME J1634+44. This object stands out as one of the most polarized LPTs ever discovered, and it is the only one observed to be spinning up (meaning its rotation is speeding up) a phenomenon never seen before in this class of astronomical objects.
[...] "You could call CHIME J1634+44 a 'unicorn', even among other LPTs," said Dong, noting this LPT's particularly unusual traits. Despite hundreds of detections across multiple observatories, including those listed above, and additional observations by the LOw Frequency ARray (LOFAR) in the Netherlands, the timing of the repeating radio bursts from CHIME J1634+44 is unclear. "The bursts seem to repeat either every 14 minutes, or 841 seconds—but there is a distinct secondary period of 4206 seconds, or 70 minutes, which is exactly five times longer. We think both are real, and this is likely a system with something orbiting a neutron star," explained Dong.
Normally, objects like neutron stars or white dwarfs slow down over time because they lose energy, so their spin period gets longer. But for CHIME J1634+44, the period is actually getting shorter—meaning it's spinning up, not slowing down. The only way to make the timing of the bursts fit together is to assume this spin-up is real, but that doesn't make sense for a lone star. Therefore, researchers believe that CHIME J1634+44 might actually be two stars orbiting each other very closely. If the orbit of this binary system is shrinking, it could be because they are losing energy, by emitting gravitational waves or interacting with each other, which could make it look like the period is getting shorter. This kind of shrinking orbit has been seen in other close pairs of white dwarfs. The radio bursts from CHIME J1634+44 are 100% circularly polarized, which means the radio waves twist in a perfect spiral as they travel—which is extremely rare. No known neutron star or white dwarf has ever been seen to do this for every burst. This suggests that the way these radio waves are being produced is different from what we see in all other known objects.
The unparalleled collection of telescopes used in this research allowed scientists to detect and study the object's unusual signals in detail. CHIME's wide field of view and daily sky scans detected the transient's periodic bursts and monitored its spin evolution. The NSF VLA, supported by realfast (a system for real-time fast transient searches at the NSF VLA via interferometric imaging), provided high-frequency follow-up observations to mitigate interstellar medium distortions and refine localization. The NSF GBT contributed sensitive, high-resolution timing data to analyze polarization and spin-up behavior, enhancing precision for gravitational wave studies. Swift searched for X-ray counterparts, and its multi-wavelength capabilities allowed the researchers to probe for high-energy signals that complemented the radio observations from the NSF GBT, NSF VLA and CHIME.
See also:
Artificial intelligence (AI) has become one of the most potent force multipliers the criminal underground has ever seen. Generative models that write immaculate prose, mimic voices, and chain exploits together have lowered the cost of sophisticated attacks to almost nothing:
This isn’t news. Last year, Jen Easterly, former Director of the U.S. Cybersecurity and Infrastructure Security Agency (CISA), warned that AI “will exacerbate the threat of cyberattacks [by making] people who are less sophisticated actually better at doing some of the things they want to do.”
The truth of that warning is already visible. The first quarter of 2025 saw an unprecedented 126% surge in ransomware incidents. Since then, there’s been a spree of high-impact attacks against high-profile brands. British retail institutions, global brands, major logistics operators, and more have all been hit by highly sophisticated attacks.
Ransomware, phishing, and deepfakes have merged into a low-barrier ecosystem where a cloud-hosted toolkit, a stolen credential, and a crypto wallet now suffice to run an international extortion ring.
[...] Dark-web marketplaces have grown into one of the world’s largest shadow economies. Listings resemble Amazon product pages, complete with escrow, loyalty discounts, and 24-hour ‘customer success’ chat. Competition drives platform fees down, so developers chase scale: more affiliates, more victims, more leverage.
[...] It’s time to move upstream and license offensive-AI capabilities the way we already license explosives, narcotics, and zero-day exports. Any model that can autonomously scan, exploit, or deepfake at scale should sit behind the regulatory equivalent of a locked cabinet, complete with audited access logs, financial surety, and criminal liability for willful leaks. Cloud providers and model builders love to invoke “dual-use,” but dual-use is exactly why controlled-substance laws exist: society decided that convenience doesn’t trump harm. Apply the same logic here, and we choke supply instead of eternally mopping the floor.
Related: Uncovering WormGPT: A Cybercriminal’s Arsenal