Research

76 stories from 12 sources

Kaspersky Securelist · 3w ago

Coruna: the framework used in Operation Triangulation

Coruna: the framework used in Operation Triangulation Kaspersky GReAT experts look into the Coruna exploit kit targeting iPhones. We discovered that the kernel exploit for CVE-2023-32434 and CVE-2023-38606 is an updated…

impact 41
Recorded Future · 18w ago

China’s Zero-Day Pipeline: From Discovery to Deployment

China’s Zero-Day Pipeline: From Discovery to Deployment China is consolidating cyber power through zero-days. Explore how state control of vulnerabilities enables long-term strategic advantage.

impact 37
Recorded Future · 9w ago

State of Security Report | Recorded Future

State of Security Report | Recorded Future Download Recorded Future's 2026 State of Security report which provides comprehensive threat intelligence on geopolitical fragmentation, state-sponsored operations, ransomware…

impact 28
arXiv AI · 5h ago

Tadabur: A Large-Scale Quran Audio Dataset

Tadabur: A Large-Scale Quran Audio Dataset arXiv:2604.18932v1 Announce Type: cross Abstract: Despite growing interest in Quranic data research, existing Quran datasets remain limited in both scale and diversity. To addr…

impact 16
arXiv Security · 5h ago

Cyclic Equalizability Characterized by Parikh Vectors

Cyclic Equalizability Characterized by Parikh Vectors arXiv:2604.19504v1 Announce Type: cross Abstract: Cyclic equalizability is a notion introduced by Shinagawa and Nuida in 2025, in the study of card-based cryptograph…

impact 16
arXiv Security · 5h ago

Benchmarking Misuse Mitigation Against Covert Adversaries

Benchmarking Misuse Mitigation Against Covert Adversaries arXiv:2506.06414v2 Announce Type: replace Abstract: Existing language model safety evaluations focus on overt attacks and low-stakes tasks. In reality, an attack…

impact 16
Nature · 9h ago

The misunderstood sex chromosome: how X affects your health

The misunderstood sex chromosome: how X affects your health Nature, Published online: 22 April 2026; doi:10.1038/d41586-026-01256-7 Researchers are gaining a new appreciation for the genes on the X and Y chromosomes and…

impact 16
Recorded Future · 1d ago

Emerging Enterprise Security Risks of AI

Emerging Enterprise Security Risks of AI Agentic AI adoption is accelerating rapidly as enterprise software and applications increasingly incorporate task-specific AI agents, enabling autonomous execution of complex tas…

impact 16
Nature · 2d ago

How hidden contributions power modern research

How hidden contributions power modern research Nature, Published online: 20 April 2026; doi:10.1038/d41586-026-01260-x The people who work behind the scenes to keep research moving say that there should be more recognit…

impact 16
Recorded Future · 2w ago

Understanding and Anticipating Venezuelan Government Actions

Understanding and Anticipating Venezuelan Government Actions Explore an in-depth analysis of Venezuela’s political landscape following the January 2026 US operation to capture Nicolás Maduro. This executive summary exam…

impact 16
Recorded Future · 4w ago

ClickFix Campaigns Targeting Windows and macOS

ClickFix Campaigns Targeting Windows and macOS Insikt Group reveals five ClickFix social engineering clusters (QuickBooks, Booking.com, Birdeye) targeting Windows and macOS. Learn how threat actors exploit native system…

impact 16
Recorded Future · 8w ago

Preparing for Russia’s New Generation Warfare in Europe

Preparing for Russia’s New Generation Warfare in Europe Russia is escalating its hybrid warfare against NATO into a coordinated, full-scale campaign blending cyber attacks, sabotage, and influence operations. Read the f…

impact 16
Recorded Future · 8w ago

2025 Cloud Threat Hunting and Defense Landscape

2025 Cloud Threat Hunting and Defense Landscape Threat actors are doubling down on cloud infrastructure — exploiting misconfigurations, abusing native services, and pivoting through hybrid environments to maximize impac…

impact 16
Recorded Future · 15w ago

GRU-Linked BlueDelta Evolves Credential Harvesting

GRU-Linked BlueDelta Evolves Credential Harvesting Insikt Group reveals how GRU-linked BlueDelta evolved credential-harvesting campaigns targeting government, energy, and research organizations across Europe and Eurasia.

impact 16
MIT Tech Review · 12h ago

The new word in home construction could be “plastics”

The new word in home construction could be “plastics” Single-use plastics are a persistent source of environmental pollution, and the need to house a growing global population puts increasing pressure on resources such…

impact 16
Nature · 1d ago

Yellow glass shows insect wings at their best

Yellow glass shows insect wings at their best Nature, Published online: 21 April 2026; doi:10.1038/d41586-026-00915-z An experiment to preserve the vivid colour of insect wings in displays and a disagreement about peer…

impact 16
DeepMind · 44w ago

How we're supporting better tropical cyclone prediction with AI

How we're supporting better tropical cyclone prediction with AI We’re launching Weather Lab, featuring our experimental cyclone predictions, and we’re partnering with the U.S. National Hurricane Center to support their…

impact 16
Recorded Future · 19w ago

Implications of Russia-India-China Trilateral Cooperation

Implications of Russia-India-China Trilateral Cooperation Examines Russia-India-China trilateral cooperation, U.S. tariffs and sanctions, why a formal bloc is unlikely, and implications for governments and business.

impact 16
Recorded Future · 13w ago

PurpleBravo’s Targeting of the IT Software Supply Chain

PurpleBravo’s Targeting of the IT Software Supply Chain Discover how PurpleBravo, a North Korean threat group, exploits fake job offers to target software supply chains, using RATs and infostealers like BeaverTail.

impact 16
Recorded Future · 4w ago

2025 Year in Review: Malicious, Infrastructure

2025 Year in Review: Malicious, Infrastructure Explore Insikt Group’s 2025 Malicious Infrastructure Report. Gain insights into Cobalt Strike, Vidar infostealers, and AI-driven threats to secure your 2026 strategy.

impact 16
Dark Reading · 1d ago

Serial-to-IP Devices Hide Thousands of Old & New Bugs

Serial-to-IP Devices Hide Thousands of Old & New Bugs The OT devices that translate machine talk into Internet-speak are riddled with vulnerabilities and more frequently targeted for attacks, researchers say.

impact 16
Recorded Future · 18w ago

BlueDelta’s Persistent Campaign Against UKR.NET

BlueDelta’s Persistent Campaign Against UKR.NET Discover how Russia’s BlueDelta targets UKR.NET users with advanced credential-harvesting campaigns, evolving tradecraft, and multi-stage phishing techniques.

impact 16
Nature · 7d ago

Four rising stars shaping the future of cancer research

Four rising stars shaping the future of cancer research Nature, Published online: 15 April 2026; doi:10.1038/d41586-026-00688-5 Meet the creative minds that aim to improve cancer detection and treatment.

impact 16
Nature · 5d ago

Immune cells have a surprising role in exercise endurance

Immune cells have a surprising role in exercise endurance Nature, Published online: 17 April 2026; doi:10.1038/d41586-026-01245-w Study in mice suggests that B cells help to regulate muscle performance.

impact 16
Recorded Future · 2w ago

Panorama del cibercrimen en América Latina y el Caribe

Panorama del cibercrimen en América Latina y el Caribe Este informe ofrece una visión general de las tendencias y desarrollos en el ecosistema cibercriminal de América Latina y el Caribe (LAC) en 2025.

impact 15
Recorded Future · 18w ago

Palestine Action: Operations and Global Network

Palestine Action: Operations and Global Network Explores Palestine Action’s post-designation global network, tactics, and targets, and evaluates key physical risks and mitigations for organizations.

impact 15
Recorded Future · 2w ago

Panorama do cibercrime na América Latina e Caribe

Panorama do cibercrime na América Latina e Caribe Este relatório oferece uma visão geral das tendências e desenvolvimentos no ecossistema cibercriminoso da América Latina e do Caribe (LAC) em 2025.

impact 15
MIT Tech Review · 12h ago

This tool could show how consciousness works

This tool could show how consciousness works How does the physical matter in our brains translate into thoughts, sensations, and emotions? It’s hard to explore that question without neurosurgery.

impact 15
DeepMind · 24w ago

Accelerating discovery with the AI for Math Initiative

Accelerating discovery with the AI for Math Initiative The initiative brings together some of the world's most prestigious research institutions to pioneer the use of AI in mathematical research.

impact 15
Recorded Future · 2w ago

Latin America and the Caribbean Cybercrime Landscape

Latin America and the Caribbean Cybercrime Landscape This report provides an overview of trends and developments in the cybercriminal ecosystem of Latin America and the Caribbean (LAC) in 2025.

impact 15
DeepMind · 3w ago

Protecting people from harmful manipulation

Protecting people from harmful manipulation Google DeepMind researches AI's harmful manipulation risks across areas like finance and health, leading to new safety measures.

impact 15

All Categories