New "atlas" charts how antibodies attack spike protein variants
As the SARS-CoV-2 virus that causes COVID-19 continues to evolve, immunologists and infectious diseases experts are eager to know whether new variants are resistant to the human antibodies that recognized initial versions of the virus. Vaccines again.....»»
Machine learning cracked the protein-folding problem and won the 2024 Nobel Prize in chemistry
The 2024 Nobel Prize in chemistry recognized Demis Hassabis, John Jumper and David Baker for using machine learning to tackle one of biology's biggest challenges: predicting the 3D shape of proteins and designing them from scratch......»»
Targeting "undruggable" diseases: Researchers reveal new levels of detail in targeted protein degradation
Researchers at the University of Dundee have revealed in the greatest detail yet the workings of molecules called protein degraders which can be deployed to combat what have previously been regarded as "undruggable" diseases, including cancers and ne.....»»
Oxidative stress: How protein recycling protects against cell death
Researchers at LMU University Hospital have discovered a new molecular switch that protects against cell death......»»
Scientists discover how innate immunity envelops bacteria
The protein GBP1 is a vital component of our body's natural defense against pathogens. This substance fights against bacteria and parasites by enveloping them in a protein coat, but how the substance manages to do this has remained unknown until now......»»
Data loss incidents impact patient care
92% of healthcare organizations experienced at least one cyber attack in the past 12 months, an increase from 88% in 2023, with 69% reporting disruption to patient care as a result, according to Proofpoint. Healthcare organizations struggle to mitiga.....»»
AI-driven approach challenges traditional views on protein structure
In a recently published article in Nature Communications,, a team offers an AI-driven approach to explore structural similarities and relationships across the protein universe. The team includes members from the University of Virginia—including Phi.....»»
Internet Archive data breach exposes 31M users; under DDoS attack
An Internet Archive data breach has been confirmed by the organisation, which has also been suffering Distributed Denial-of-Service (DDoS) attacks. The home of the Wayback Machine was previously attacked back in May. At this point, it’s being su.....»»
Detailed images of key protein complexes provide new insights into bacterial photosynthesis
Researchers at the University of Liverpool and collaborators have arrived at a new understanding of bacterial photosynthesis. Using novel techniques, investigators have unveiled intricate detailed images of the key photosynthetic protein complexes of.....»»
Astronomers race to capture image of exoplanet near star
Planet AF Lep b is a world of firsts. In 2023, it was the lowest-mass planet outside our solar system to be directly observed and have its mass measured using astrometry. This is a technique that charts the subtle movements of a host star over many y.....»»
Tidal Cyber empowers organizations to improve their protection efforts
Tidal Cyber announced that it now incorporates test results from Breach and Attack Simulation (BAS) tools and other sources to complement the company’s existing Threat-Informed Defense capabilities. With this new integration, Tidal Cyber Enterprise.....»»
Protein structure and design software gets the Chemistry Nobel
One academic and two people from DeepMind take home the Nobel. On Wednesday, the Nobel Committee announced that it had awarded the Nobel Prize in chemistry to researchers who pion.....»»
Nanopore technique shows transport mechanism of chaperone proteins at the single-molecule level
Proteins control most of the body's functions, and their malfunction can have severe consequences, such as neurodegenerative diseases or cancer. Therefore, cells have mechanisms in place to control protein quality......»»
Chinese hack of US ISPs shows why Apple is right about backdoors for law enforcement
It was revealed this weekend that Chinese hackers managed to access systems run by three of the largest internet service providers (ISPs) in the US. What’s notable about the attack is that it compromised security backdoors deliberately created t.....»»
BreachLock Attack Surface Analytics strengthens enterprise CTEM capabilities
BreachLock strengthens continuous threat exposure management (CTEM) capabilities for enterprise customers with its new Attack Surface Analytics feature. Time is of the essence when Fortune 500 security teams find themselves waking up to a Code Red vu.....»»
Artificial proteasome offers insights for new trichomoniasis treatments
Researchers from IOCB Prague are furthering the understanding of how medicines work and what it takes to develop their most effective variants. In one current study, they have focused on the disease caused by the protozoan parasite Trichomonas vagina.....»»
Colleges could benefit from taking a data-driven look at hostility toward Jews on campus
In the year that has passed since the Oct. 7 attack by Hamas on Israel, college campuses have been embroiled in debates about the resulting conflict. A major focus of these debates has been the surge in reports of antisemitic harassment of Jewish stu.....»»
SOC teams are frustrated with their security tools
Security operations center (SOC) practitioners believe they are losing the battle detecting and prioritizing real threats – due to too many siloed tools and a lack of accurate attack signal, according to Vectra AI. They cite a growing distrust in v.....»»
The case for enterprise exposure management
For several years, external attack surface management (EASM) has been an important focus for many security organizations and the vendors that serve them. EASM, attempting to discover the full extent of an organization’s external attack surface and.....»»
Phage cocktail shows promise against drug-resistant bacteria
Researchers have a new battle tactic to fight drug-resistant bacterial infections. Their strategy involves using collections of bacteriophages, viruses that naturally attack bacteria. In a new study, researchers at the University of Chicago Pritzker.....»»
Cybercriminals capitalize on poorly configured cloud environments
Off-the-shelf offensive security tools and poorly configured cloud environments create openings in the attack surface, according to Elastic. Adversaries are utilizing off-the-shelf tools Offensive security tools (OSTs), including Cobalt Strike and Me.....»»