Chinese Hospitals Lead in Retraction Rates: A Shocking Look at Academic Fraud

2025-02-20
Chinese Hospitals Lead in Retraction Rates: A Shocking Look at Academic Fraud

A global analysis of institutional retraction rates reveals alarmingly high numbers for certain Chinese hospitals, some exceeding the global average by more than 50 times. This surge is largely attributed to young physicians purchasing fabricated papers to meet job promotion requirements. While the Chinese government has implemented measures to combat academic misconduct, the high retraction rates highlight weaknesses in research integrity and the negative consequences of overemphasizing publication numbers. The study underscores vast disparities in research integrity across countries and institutions, and the potential of data analytics in identifying and addressing academic fraud.

Read more

Txeo: A Modern C++ Wrapper for TensorFlow Achieving Near-Native Performance

2025-02-21
Txeo: A Modern C++ Wrapper for TensorFlow Achieving Near-Native Performance

Txeo is a lightweight and intuitive C++ wrapper for TensorFlow designed to simplify TensorFlow C++ development while maintaining high performance and flexibility. Built entirely with Modern C++, Txeo enables developers to use TensorFlow with the ease of a high-level API, eliminating the complexity of its low-level C++ interface. Benchmarks show negligible performance overhead compared to native TensorFlow, ranging from 0.65% to 1.21%. Currently supports Linux, with Windows and macOS support planned.

Read more
Development

Russian Threat Actors Exploit Microsoft Device Code Authentication in Widespread Attacks

2025-02-15
Russian Threat Actors Exploit Microsoft Device Code Authentication in Widespread Attacks

Volexity has uncovered multiple Russian threat actors employing sophisticated social engineering and spear-phishing campaigns to compromise Microsoft 365 accounts via Device Code Authentication phishing. These attacks exploit the less-familiar Device Code Authentication workflow, making them difficult for users to recognize as phishing attempts. The campaigns, often politically themed (e.g., focusing on the US administration), impersonate individuals from organizations like the US Department of State and the Ukrainian Ministry of Defence, luring victims into fake Microsoft Teams meetings or application access. Volexity is tracking three threat actors, one potentially linked to CozyLarch (overlapping with DarkHalo, APT29). The effectiveness of this attack stems from exploiting users' unfamiliarity with device code authentication, bypassing traditional security measures. Volexity recommends organizations block device code authentication via conditional access policies and enhance user security awareness training.

Read more
1 2 589 590 591 592 593 594 595 597 Next →