433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Terabytes of data in a millimeter crystal

Researchers have explored a ‘quantum-inspired’ technique to make the ‘ones’ and ‘zeroes’ for classical computer memory applications out of crystal defects, each the size of an individual atom. This turns milimeter-sized crystals into computer memory devices capable of storing terabytes of data. This interdisciplinary revolution in computer memory took its inspiration from the radiation dosimeters worn by hospital employees working with X-ray machines.
http://news.poseidon-us.com/TJ2GXw

Innovative design techniques for better performance of wireless transmitters

Three innovative design techniques substantially enhance wireless transmitter performance and can boost power efficiency and elevate data rates concurrently. This effectively aligns with the growing demand for speed and efficiency, accelerating the widespread deployment of wireless devices. This enables synergistic operation of wireless electronic devices and better quality of modern life.
http://news.poseidon-us.com/TJ2GXY

Scientists optimize biohybrid ray development with machine learning

The Harvard John A. Paulson School of Engineering and Applied Sciences (SEAS) and NTT Research, Inc., a division of NTT, announced the publication of research showing an application of machine-learning directed optimization (ML-DO) that efficiently searches for high-performance design configurations in the context of biohybrid robots. Applying a machine learning approach, the researchers created mini biohybrid rays made of cardiomyocytes (heart muscle cells) and rubber with a wingspan of about 10 mm that are approximately two times more efficient at swimming than those recently developed under a conventional biomimetic approach.
http://news.poseidon-us.com/TJ2FXm

The molecular Einstein: One molecule, endless patterns

Is it possible to tile a surface with a single shape in such a way that the pattern never repeats itself? In 2022, a mathematical solution to this ‘Einstein problem’ was discovered for the first time. Researchers have now also found a chemical solution: a molecule that arranges itself into complex, non-repeating patterns on a surface. The resulting aperiodic layer could even exhibit novel physical properties.
http://news.poseidon-us.com/TJ2BmF

auDA finds a CISO

Newly created role at the domain administrator.
http://news.poseidon-us.com/TJ2B3t

The XCSSET info-stealing malware is back, targeting macOS users and devs

A new, improved variant of the XCSSET macOS malware has been spotted “in limited attacks” by Microsoft’s threat researchers. XCSSET macOS malware XCSSET in information-stealing and backdoor-injecting malware targeting Mac users. It’s usually distributed via infected Xcode projects – a collection of files, settings, and configurations that make up an app or framework developed using Xcode, Apple’s official integrated development environment (IDE) for macOS. The threat has been around for years. Past variants even used … More → The post The XCSSET info-stealing malware is back, targeting macOS users and devs appeared first on Help Net Security.
http://news.poseidon-us.com/TJ28Py

Unlocking OSINT: Top books to learn from

Discover the top Open-Source Intelligence (OSINT) books in this curated list. From investigative techniques to digital footprint analysis, these titles offer insights for security professionals, journalists, and researchers looking to master the art of gathering and analyzing publicly available data. Hunting Cyber Criminals: A Hacker’s Guide to Online Intelligence Gathering Tools and Techniques Author: Vinny Troia This is a deep dive into the world of OSINT from multiple perspectives, including those of hackers, investigators, and … More → The post Unlocking OSINT: Top books to learn from appeared first on Help Net Security.
http://news.poseidon-us.com/TJ25hB

A PostgreSQL zero-day was also exploited in US Treasury hack (CVE-2025-1094)

The suspected Chinese state-sponsored hackers who breached workstations of several US Treasury employees in December 2024 did so by leveraging not one, but two zero-days, according to Rapid7 researchers. It was initially reported that the attackers compromised the Treasury’s BeyondTrust Remote Support SaaS instances via CVE-2024-12356, a previously unknown unauthenticated command injection vulnerability. But, as Rapid7 researchers discovered (and confirmed by testing), “a successful exploit for CVE-2024-12356 had to include exploitation of CVE-2025-1094 in order … More → The post A PostgreSQL zero-day was also exploited in US Treasury hack (CVE-2025-1094) appeared first on Help Net Security.
http://news.poseidon-us.com/TJ1vbL