networks

46 Articles
Fog ransomware attacks use employee monitoring tool to break into business networks
Tech

Fog ransomware attacks use employee monitoring tool to break into business networks

Fog ransomware was seen using Syteca, a legitimate employee monitoring tool, to log keys and grab passwords It also used open-source tools for...

Neural networks speed up search for solid-state battery materials for safer electric cars with extended range
Tech

Neural networks speed up search for solid-state battery materials for safer electric cars with extended range

Machine learning speeds up a key stage in the search for materials for protective electrolyte coatings for solid-state batteries, a promising energy storage...

Graph neural networks show promise for detecting money laundering and collusion in transaction webs
Tech

Graph neural networks show promise for detecting money laundering and collusion in transaction webs

The tasks of GNNs at different levels. For node level, the label of each node is determined by its features and neighbors. For...

Scientists develop new mathematical model for transfer learning in neural networks
Tech

Scientists develop new mathematical model for transfer learning in neural networks

Credit: Pixabay/CC0 Public Domain Alessandro Ingrosso, researcher at the Donders Institute for Neuroscience, has developed a new mathematical method in collaboration with colleagues...

Assessing the potential of hydrogen and carbon dioxide networks for the future of European energy systems
Tech

Assessing the potential of hydrogen and carbon dioxide networks for the future of European energy systems

A comparison chart of system costs across different scenarios, which clearly demonstrates the economic advantages of combining both networks. Credit: Hofmann et al....

AI-powered intrusion detection system outperforms traditional methods in securing IoT networks
Tech

AI-powered intrusion detection system outperforms traditional methods in securing IoT networks

Infrastructure of the RT_IoT2022 Dataset. Credit: Data Science and Management (2025). DOI: 10.1016/j.dsm.2025.02.005 As Internet of Things (IoT) devices proliferate in sectors like...

Social networks are vulnerable to relatively simple AI manipulation and polarization
Tech

Social networks are vulnerable to relatively simple AI manipulation and polarization

Credit: Pixabay/CC0 Public Domain It seems that no matter the topic of conversation, online opinion around it will be split into two seemingly...

Magnetic microrobot swarm enables 3D imaging of vascular networks
Tech

Magnetic microrobot swarm enables 3D imaging of vascular networks

The concept of the active exploration and reconstruction strategy. Credit: Nature Machine Intelligence (2025). DOI: 10.1038/s42256-025-01012-y Angiography is a widely used medical imaging...

Palo Alto Networks gateways facing huge number of possible security attacks
Tech

Palo Alto Networks gateways facing huge number of possible security attacks

GreyNoise observed a spike in scanning throughout March 2025 Thousands of IP addresses were scanning PAN-OS GlobalProtect portals These activities usually lead up...