Toggle light / dark theme

New GPUBreach attack enables system takeover via GPU rowhammer

A new attack, dubbed GPUBreach, can induce Rowhammer bit-flips on GPU GDDR6 memories to escalate privileges and lead to a full system compromise.

GPUBreach was developed by a team of researchers at the University of Toronto, and full details will be presented at the upcoming IEEE Symposium on Security & Privacy on April 13 in Oakland.

The researchers demonstrated that Rowhammer-induced bit flips in GDDR6 can corrupt GPU page tables (PTEs) and grant arbitrary GPU memory read/write access to an unprivileged CUDA kernel.

Linux devs start removing support for 37-year-old Intel 486 CPU — head honcho Linus Torvalds says ‘zero real reason’ to continue support

Perhaps it is time to send your 37-year-old Intel 486 system into retirement, as far as modern Linux goes, as OS kernel developers appear to have started to dismantle support for this legendary CPU. Phoronix reports that the change seems to have been confirmed in patches destined for the Linux 7.1 kernel. So, those still cherishing their 486 PCs and using them to run a modern version of Linux should probably now make sure they run one of the existing Linux LTS kernels to squeeze a few more years from the platform. Alternatively, they could upgrade to a Pentium or even one of the best CPUs available in 2026.

The patching out of 486 support isn’t really a surprise. Firstly, it is ancient, with the first examples released in 1989, and modern Linux distros continue to grow more resource-hungry. Secondly, Linux creator Linus Torvalds hinted not long ago that 486 support may get the axe. The Linux mogul said that there was “zero real reason” to continue support for the 486 CPU. In fact, he indicated that continuing support for it was detrimental to upstream Linux kernel development efforts.

Dozens of hidden star streams found in the outskirts of our Milky Way galaxy

To find them, Chen developed a computer algorithm called StarStream, which searches for streams using a physics-based model rather than relying on visual patterns alone, according to the study. The team then applied the method to Gaia data, which from 2014 to 2025 mapped the positions and motions of billions of stars in the Milky Way.

“It turns out that it’s a lot easier to find things when you have a theoretical expectation of what you’re looking for when you have a simple phenomenological picture,” Gnedin said in the statement.

The results also revealed that many streams do not match the classic expectation of thin, well-aligned trails. Instead, the study reports that some of the newfound streams are shorter, wider or even misaligned with their parent clusters’ orbits — suggesting earlier searches may have missed them by focusing only on the most obvious structures.

A 200-year-old light trick just transformed quantum encryption

Scientists have unveiled a new approach to ultra-secure communication that could make quantum encryption simpler and more efficient than ever before. By harnessing a 19th-century optics phenomenon called the Talbot effect, researchers developed a system that sends information using multiple states of single photons instead of just two, dramatically boosting data capacity. Even more impressive, the setup works with standard components and requires only a single detector, reducing cost and complexity.

Novel approach to quantum error correction portends a scalable future for quantum computing

A University of Sydney quantum physicist has developed a new approach to quantum error correction that could significantly reduce the number of physical qubits required to build large-scale, fault-tolerant quantum computers. The study, co-authored by Dr. Dominic Williamson from the School of Physics, is titled “Low-overhead fault-tolerant quantum computation by gauging logical operators” and published in Nature Physics.

The work was done while Dr. Williamson was on a sabbatical working at global technology firm IBM in California. Elements of the new design have been integrated into IBM’s plan to build large-scale quantum computing.

“We’re at a point where theory and experiment are beginning to align,” Dr. Williamson said. “The big question now is how to design quantum computers that can be scaled efficiently to solve useful problems. Our work provides a promising blueprint.”

Quantum coherence could be preserved at large scales in realistic environments

Quantum states are notoriously fragile, and can be destroyed simply through interactions, measurements, and exposure to their surrounding environments. In a new theoretical study published in Physical Review X, Rohan Mittal and colleagues at the University of Cologne have discovered a new way to protect quantum behavior on large scales within systems driven far from equilibrium. Their results could have promising implications for the design of more robust quantum devices.

When quantum many-body systems are driven out of equilibrium, they undergo decoherence, causing quantum correlations and superpositions to break down. Even when such a system is built from entirely quantum components, the effect can cause its behavior to become indistinguishable from that of a classical system on larger scales, making it unsuitable for technologies such as quantum computing or sensing.

So far, researchers have attempted to solve the decoherence problem by fine-tuning two independent parameters: one to push the system to the boundary between two distinct quantum phases, and another to ensure that quantum coherence is maintained at this boundary. In practice, however, the need to account for two parameters simultaneously has made this approach both fragile and experimentally daunting.

Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners

As recently observed in the FAUX#ELEVATE campaign, “WinRing0x64.sys,” a legitimate, signed, and vulnerable Windows kernel driver, is abused to obtain kernel-level hardware access and modify CPU settings to boost hash rates, thereby enabling performance improvement. The use of the driver has been observed in many cryptojacking campaigns over the years. The functionality was added to XMRig miners in December 2019.

Elastic said it also identified another campaign that leads to the deployment of SilentCryptoMiner. The miner, besides using direct system calls to evade detection, takes steps to disable Windows Sleep and Hibernate modes, set up persistence via a scheduled task, and uses the “Winring0.sys” driver to fine-tune the CPU for mining operations.

Another notable component of the attack is a watchdog process that ensures the malicious artifacts and persistence mechanisms are restored in the event they are deleted. The campaign is estimated to have accrued 27.88 XMR ($9,392) across four tracked wallets, indicating that the operation is yielding consistent financial returns to the attacker.

Ending the Sun’s Monopoly: The Future of Stellarator Fusion — Brian Berzin, CEO, Thea Energy

“with Brian Berzin — Co-Founder & CEO of Thea Energy.


What if we could build a fusion reactor that runs continuously—without the instability issues that have plagued the field for years?

Brian Berzin is the Co-Founder and CEO of Thea Energy (https://thea.energy/), a next-generation fusion company focused on advancing stellarator technology—one of the most promising but historically underexplored approaches to magnetic confinement fusion.

Brian brings a unique combination of deep technical and financial expertise, with a background spanning electrical engineering, venture capital, private equity, and investment banking.

Prior to founding Thea Energy, Brian served as Vice President of Strategy at General Fusion, where he helped shape commercialization strategy and led engagement with global capital markets during a pivotal period for privately funded fusion.

/* */