Skip to main content

Researchers Just Solved a Big, 70-Year-Old Problem for Fusion Energy

1 month ago
Fusion energy "took one step closer to reality," announced the University of Texas at Austin, as their researchers joined with a team from Los Alamos National Laboratory and Type One Energy Group and "solved a longstanding problem in the field" — how to contain high-energy particles inside fusion reactors. When high-energy alpha particles leak from a reactor, that prevents the plasma from getting hot and dense enough to sustain the fusion reaction. To prevent them from leaking, engineers design elaborate magnetic confinement systems, but there are often holes in the magnetic field, and a tremendous amount of computational time is required to predict their locations and eliminate them. In their paper published in Physical Review Letters, the research team describes having discovered a shortcut that can help engineers design leak-proof magnetic confinement systems 10 times as fast as the gold standard method, without sacrificing accuracy... "What's most exciting is that we're solving something that's been an open problem for almost 70 years," said Josh Burby, assistant professor of physics at UT and first author of the paper. "It's a paradigm shift in how we design these reactors...." This new method also can help with a similar but different problem in another popular magnetic fusion reactor design called a tokamak. In that design, there's a problem with runaway electrons — high-energy electrons that can punch a hole in the surrounding walls. This new method can help identify holes in the magnetic field where these electrons might leak.

Read more of this story at Slashdot.

EditorDavid

Over 3,200 Cursor Users Infected by Malicious Credential-Stealing npm Packages

1 month ago
Cybersecurity researchers have flagged three malicious npm packages that target the macOS version of AI-powered code-editing tool Cursor, reports The Hacker News: "Disguised as developer tools offering 'the cheapest Cursor API,' these packages steal user credentials, fetch an encrypted payload from threat actor-controlled infrastructure, overwrite Cursor's main.js file, and disable auto-updates to maintain persistence," Socket researcher Kirill Boychenko said. All three packages continue to be available for download from the npm registry. "Aiide-cur" was first published on February 14, 2025... In total, the three packages have been downloaded over 3,200 times to date.... The findings point to an emerging trend where threat actors are using rogue npm packages as a way to introduce malicious modifications to other legitimate libraries or software already installed on developer systems... "By operating inside a legitimate parent process — an IDE or shared library — the malicious logic inherits the application's trust, maintains persistence even after the offending package is removed, and automatically gains whatever privileges that software holds, from API tokens and signing keys to outbound network access," Socket told The Hacker News. "This campaign highlights a growing supply chain threat, with threat actors increasingly using malicious patches to compromise trusted local software," Boychenko said. The npm packages "restart the application so that the patched code takes effect," letting the threat actor "execute arbitrary code within the context of the platform."

Read more of this story at Slashdot.

EditorDavid