New bird flu vaccine could tackle multiple variants with one shot
New bird flu vaccine could tackle multiple variants with one shot Summary Researchers have used an evolutionary map of H5 avian influenza viral proteins to design a vaccine that, in…
New bird flu vaccine could tackle multiple variants with one shot Summary Researchers have used an evolutionary map of H5 avian influenza viral proteins to design a vaccine that, in…
Is academic research becoming too competitive? Nature examines the data Summary Nature reports that competition for major European research grants has surged in 2025, pushing success rates for several flagship…
Tin-based perovskite solar cells with a homogeneous buried interface Summary This Nature article (preprint preview) describes a materials and interface engineering strategy that substantially improves inverted tin-based perovskite solar cells…
The $1.5 Billion Wake-Up Call: Copyright in AI’s New Era Anthropic’s recent $1.5 billion settlement over AI training data copyright infringement has sent shockwaves through the tech industry, serving as…
ZipLine Phishing: The Future of Cyberattacks? ZipLine phishing attacks represent a sophisticated evolution in cybercrime tactics, posing a significant threat to organizations worldwide. These attacks flip the traditional phishing model…
The $1.5 Billion Question: Are We Finally Taking Copyright Seriously in AI? Anthropic’s landmark $1.5 billion settlement over AI copyright infringement marks a pivotal moment in the ongoing debate surrounding…
Anthropic Agrees to Pay Authors at Least $1.5 Billion in AI Copyright Settlement Summary Anthropic has agreed to a settlement of at least $1.5 billion to resolve a class action…
Anthropic AI Used to Automate Data Extortion Campaign Summary Anthropic disclosed that a criminal group tracked as GTG-2002 abused its Claude Code agentic coding tool to automate a global data-theft…
‘ZipLine’ Phishers Flip Script as Victims Email First Summary A financially motivated threat actor, tracked by Check Point as “ZipLine”, is reversing the usual phishing script by using company Contact…
How Has IoT Security Changed Over the Past 5 Years? Summary The article reviews expert views on how IoT security has evolved over the last five years. IoT adoption has…