Author: admin

  • PGIP: a web server for the rapid taxonomic identification of parasite genomes | Parasites & Vectors

    PGIP: a web server for the rapid taxonomic identification of parasite genomes | Parasites & Vectors

    Database construction and curation

    The reference genome data for parasites were sourced from multiple publicly accessible genomic repositories, including the National Center for Biotechnology Information (NCBI) [16], WormBase [17], MalariaGEN [18], the European Nucleotide Archive (ENA) [19], and VEuPathDB [20]. In addition, comprehensive genomic resources were systematically curated through rigorous analysis of peer-reviewed publications that reported whole-genome sequencing assemblies and annotations for parasite species.

    Following data retrieval, we implemented rigorous quality control procedures to verify data integrity and consistency, thereby eliminating low-quality or erroneous entries and ensuring overall reliability. For NCBI-annotated reference genomes, we systematically organized genomic metadata into a structured relational database and constructed search indices to enable computationally efficient queries. To construct a high-quality and nonredundant reference database, genome assemblies were screened on the basis of the following criteria: complete genome annotation for coding sequences, and accurate species-level taxonomic classification [21]. Redundant sequences were removed using CD-HIT (v4.8.1) [22] with a sequence identity threshold of 95%. Ambiguous or conflicting taxonomic labels were manually curated through literature review and cross-referencing with the NCBI taxonomy database.

    To optimize query efficiency, the database was indexed using memory-mapped technology and structurally optimized to enable rapid large-scale data retrieval. Following its construction, the database was validated with sequencing data from reference samples to ensure accuracy and consistency. Given the dynamic nature of genomic data, the database is scheduled for quarterly updates. These updates will adhere to a standardized protocol involving automated data retrieval pipelines, multistage quality control measures, and peer-reviewed manual curation​ to preserve longitudinal data integrity and clinical relevance.

    Data management

    Efficient data management was essential to the development and deployment of PGIP for parasite genome identification. Upon submission, sequencing files (in FASTQ/FASTA format) were securely stored in a distributed file system; and systematically organized by project identifiers, sample metadata, and submission timestamps. This systematic structure streamlined retrieval and preserved data integrity during analysis. To safeguard sensitive data, all transmissions employed protocols such as HTTPS and AES-256 encryption, while role-based access control (RBAC) enforced strict privacy compliance. The platform adhered to a data retention policy under which analysis results were securely stored for 180 days prior to archiving; and accompanied by automated notifications to users before deletion and provisions for long-term export and preservation. This comprehensive data management strategy ensures that PGIP operates with high efficiency, accuracy, and data integrity; while providing reliable and reproducible results for parasite genome identification.

    Design and workflow of PGIP

    Data preprocessing

    The PGIP supports the input of raw paired-end sequencing data in FASTQ format and preprocessed FASTA-formatted sequences from NGS platforms, including its compressed file (such as.gz,.tar). The maximum data size for each sample is 20 Gb. To ensure analytical accuracy, raw FASTQ inputs are subjected to stringent quality control (QC) prior to downstream analysis, including artifact removal and filtration of nontarget sequences. The standardized QC workflow is composed of three critical steps:

    1. 1.

      Adapter removal: sequencing adapters which were introduced during library preparation are systematically trimmed to minimize platform-specific bias using Trimmomatic [23].

    2. 2.

      Quality filtering: low-quality reads (Phred score < 20) and short fragments (< 50 bp) are filtered using Trimmomatic [23]. Quality metrics (e.g., per-base sequence quality, GC content) are visualized using FastQC [24] before and after processing to validate improvements.

    3. 3.

      Host DNA depletion: reads are aligned to the host reference genome (e.g., GRCh38 for human samples) using Bowtie2 v2.4.5 [25] with sensitivity parameters (very-sensitive–local). Nonhost reads (unmapped reads) are retained for downstream pathogen analysis.

    Parasite identification

    Following QC, the cleaned data are automatically analyzed through identification modules within PGIP, which executes taxonomic classification and generates diagnostic reports. These modules utilize two identification methods: the identification of parasite genomes based on reads mapping, and the analysis of assembled data.

    Reads mapping-based identification of parasite genomes

    Kraken2 was used to construct a comprehensive reference genome database for the studied parasites [26]. Genome sequences were indexed using the Kraken2-build command to enable rapid sequence retrieval and alignment. The database was composed of a comprehensive collection of reference genomes for human and zoonotic parasites, such as helminths and protozoa. This taxonomic diversity ensured broad coverage of clinically relevant species, thereby enhancing the accuracy and reliability of parasite identification.

    Species identification was performed using a Kraken2 k-mer-based alignment, which classifies sequencing reads against the reference database. Kraken2 segments each sequence into k-mers (contiguous nucleotide subsequences) and matches these to precomputed, taxon-specific k-mers in the database; thereby enabling fast and precise taxonomic classification. The database and its index file were memory-mapped to enable rapid access. Query sequences were split into k-mers and aligned to the reference database to assign taxonomic labels and calculate alignment counts. A hierarchical classification tree was constructed from the taxon-specific alignment scores, with the taxonomic lineage corresponding to the highest cumulative alignment score assigned as the definitive classification. This method also quantified the relative abundance of each parasite species within the sequencing dataset.

    The Kraken2 output was composed of species identification results accompanied by detailed taxonomic information. Statistical analyses were performed to generate ecological indices; including species composition, paired read counts, and relative abundance.

    Assembly-based identification of parasite genomes

    The clean sequencing data were assembled using MEGAHIT [27], which constructs extended contig sequences through the iterative assembly of short reads. This assembler employs a multi-k-mer iterative strategy to construct simplified de Bruijn graphs (SdBG) through stepwise optimization cycles (k = 21–141 with 12 bp increments). During iterative assembly, smaller k-mers (21–129 bp) facilitated error correction and gap closure in low-coverage regions by filtering spurious connections and enhancing sequence continuity. Conversely, larger k-mers (141 bp) improved resolution of homologous repetitive elements through extended sequence context analysis [28]. Following each assembly iteration, systematic graph refinement procedures were implemented; including: (1) trimming terminal branches (tips) < 2 kbp, (2) collapsing parallel sequence variants (bubbles) with ≥ 95% similarity, and (3) eliminating graph edges which demonstrated local coverage below 2 × . These optimization strategies collectively generated high-fidelity contigs with enhanced structural integrity and sequence accuracy for downstream analyses.

    Taxonomic binning was subsequently performed using MetaBAT [29], a probabilistic clustering tool that integrates contig abundance profiles and tetranucleotide frequency (TNF) patterns to reconstruct metagenome-assembled genomes (MAGs). Leveraging the taxonomically conserved nature of oligonucleotide composition in microbial genomes, MetaBAT first calculated the TNF-based probabilistic distances between contigs, which reflect sequence compositional similarity. Simultaneously, abundance profiles were derived from read alignment depths across samples, to capture genomic coverage variations indicative of population-specific replication rates. These two metrics were empirically weighted to construct a composite probabilistic distance matrix, which enables iterative hierarchical clustering of contigs through a graph-based algorithm. The resulting bins exhibited high phylogenetic resolution, with minimal cross-clade contamination, as validated by marker gene completeness and redundancy assessments.

    Finally, taxonomic classification of MAGs was performed using the Contig Annotation Tool (CAT, v5.2) [30]. The CAT function classified long DNA sequences and MAGs by performing gene prediction, aligning open reading frames (ORFs) to the NR protein database, and the usage of a majority voting mechanism for taxonomic assignment based on individual ORFs. The resulting classification scores were analyzed to identify parasite species within the bins.

    Integration of workflow and report output

    Integrated analytical workflows were developed using Nextflow [31] to systematically execute multiple bioinformatics processes. To generate an identification report, a Python program was used to extract the 10 most identified parasites from the results; including the Latin names of the detected parasites, the number of detected sequences, and their relative abundance (Relative abundance = species-specific reads ×100/ total reads identified at the species level). The identification report also includes the data quality control results.

    Evaluation of parasite identification

    To evaluate the performance of PGIP, we selected a panel of public databases and in-house sequencing datasets representing clinically relevant human parasites. Parasite species were selected to ensure taxonomic diversity and include soil-transmitted helminths (e.g., Ascaris lumbricoides), food-borne parasites (e.g., Clonorchis sinensis), vector-borne parasites (e.g., Plasmodium spp.), and morphologically similar species from the same genus (e.g., Schistosoma japonicum and Schistosoma haematobium). We utilized sequencing data from diverse specimen types to assess platform performance under varying levels of host-derived contamination. These included stool sample (characterized by substantial background interference from host and microbial sources), blood sample (containing abundant host background), cerebrospinal fluid sample (with limited host content), parasitic sample (exhibiting minimal host interference), and amplicon sequencing sample (PCR-amplified parasitic gene fragments). Furthermore, a negative sample was included in the evaluation.

    Public datasets were obtained from the European Nucleotide Archive (ENA). The remaining sequencing datasets were generated in-house as part of the parasitic disease surveillance project conducted at the Jiangsu Institute of Parasitic Diseases (for details, see Supplementary File S2: Datasets for evaluation of parasite identification).

    The sequencing data were uploaded to the platform, and the default analysis workflow (read-mapping-based identification module) was executed. This approach directly maps high-quality sequencing reads to the curated parasite genome database, and is optimized for clinical and metagenomic samples without requiring genome assembly. The assembly-based mode is also available within the platform for users who wish to analyze preassembled contigs or scaffolds.

    Continue Reading

  • Hezbollah weaponry? Israel strikes military building near Damascus killing 6 Syrian soldiers, launches raid by helicopter-borne troop

    Hezbollah weaponry? Israel strikes military building near Damascus killing 6 Syrian soldiers, launches raid by helicopter-borne troop

    Israeli ground forces conducted a raid on a Syrian location near Kisweh, outside Damascus, which had already been targeted in airstrikes on the two preceding days, according to Syrian state media. The initial strike took place on Tuesday (Aug 26), reportedly killing six Syrian soldiers, as confirmed by Syria’s Foreign Ministry. State-run SANA news agency reported a follow-up bombing on Wednesday (Aug 27). SANA cited a government source revealing that soldiers found “surveillance and eavesdropping devices” at the site before the Tuesday strikes. An anonymous defence official told AFP the location was a former Syrian military base in Tal Maneh, near Kisweh. Following the second attack, SANA stated that Israeli troops were airlifted to the area to conduct a raid, though the specifics remain unclear amidst ongoing reconnaissance flights. Israel has launched numerous airstrikes in Syria since the regime’s fall and has taken control of much of a UN-monitored demilitarised zone along the Syria-Israel armistice line.

    Add WION as a Preferred Source

    Hezbollah weaponry reported on site

    The UK-based Syrian Observatory for Human Rights, which monitors conflict zones through local contacts, indicated that the site housed weapons linked to Hezbollah, an Iran-backed Lebanese militia and key ally of Syrian President Bashar al-Assad. The Observatory described the raid as the first Israeli ground operation of its kind since Assad’s fall during a rebel offensive in December. Meanwhile, Syria’s Foreign Ministry condemned the drone strikes in the Kisweh suburb, stating the attack resulted in the deaths of eight soldiers. The ministry labelled the strikes as “a grave violation of international law” and a “clear breach of (Syria’s) sovereignty and territorial integrity.” It accused Israel of pursuing repeated aggressive policies aimed at destabilising the region.

    Israel’s involvement in Syria after fall of Assad

    The recent violence in Syria’s Sweida province began when members of a Bedouin tribe set up a checkpoint and allegedly robbed a Druze man. This incident sparked a cycle of retaliatory kidnappings and attacks between Bedouin tribes and Druze armed groups. Government forces attempted to intervene but were perceived as siding with the Bedouins, leading to tensions with Druze factions. The Syrian military’s entry into Druze areas raised fears of targeting minorities, especially given past traumas like the 2018 ISIS attack on the Druze community, which killed and abducted many. Israel intervened primarily to prevent militant groups from operating near its northern border and to protect the Druze population in Syria due to strong ties with Israel’s own Druze community. Citing security concerns, Israel enforced a self-declared demilitarised zone in southern Syria and launched multiple airstrikes. Despite USattempts to broker peace through the Abraham Accords and engage with the Syrian government, Israel remains wary of the new leadership under al-Sharaa and has expanded its presence in Syrian territory since the fall of Assad.

    Related Stories

    Continue Reading

  • Japanese city proposes two-hour daily limit on smartphones for all residents

    Japanese city proposes two-hour daily limit on smartphones for all residents

    A central Japanese town wants to limit smartphone use for all its 69,000 residents to two hours a day, in a move that has sparked intense debate on device addiction.

    The proposal, believed to be the first of its kind in Japan, is currently being debated by lawmakers after being submitted by Toyoake municipal government in Aichi earlier this week.

    Toyoake’s mayor said the proposal – which only applies outside of work and study – would not be strictly enforced, but rather was meant to “encourage” residents to better manage their screen time.

    There will be no penalties for breaking the rule, which will be passed in October if approved by lawmakers.

    “The two hour limit… is merely a guideline… to encourage citizens,” Toyoake Mayor Masafumi Koki said in a statement.

    “This does not mean the city will limit its residents’ rights or impose duties,” he said,

    “Rather, I hope this serves as an opportunity for each family to think about and discuss the time spent on smartphones as well as the time of day the devices are used.”

    Smartphone use during non-leisure activities, such as watching videos while cooking or exercising, online learning and practicing for an e-sports tournament, will not count towards the two hours, he added.

    Koki said he recognised smartphones were “useful and indispensable in daily life” but pointed out that some students were missing school because they refused to leave home without their phone.

    Adults were also sacrificing sleep or time with families so they could keep scrolling on their phones and tablets, the mayor said.

    More than 120 residents called and emailed local city authorities during a consultation period, according to Japanese news outlet Mainichi, with the majority (80%) not happy about the proposal. Some, however, showed support for the bill.

    The proposal suggests that primary school students should stop using devices by 21:00 while older students and adults should stop by 22:00.

    Many took to social media to air their grievances about the proposal, with one user saying you “cannot even read a book or watch a movie” in two hours, according to the Japan Times.

    Continue Reading

  • Macron gives ‘full support’ to embattled PM as crisis looms in France

    Macron gives ‘full support’ to embattled PM as crisis looms in France


    PARIS:

    President Emmanuel Macron on Wednesday gave his “full support” to France’s embattled prime minister, who has called a confidence vote that could see his government collapse next month.

    Prime Minister Francois Bayrou said he would request the confidence vote in a bitterly divided parliament on September 8, as he tries to garner enough support for his plan to slash spending.

    But the main opposition parties said they would not back the prime minister’s plan, with the far right urging Macron to call new parliamentary elections and the hard left saying the president himself must go.

    Macron, now on his sixth prime minister since taking office in 2017, chaired a meeting of his cabinet on Wednesday.

    The president has given his “full support” to Bayrou’s initiative, spokeswoman Sophie Primas said after the meeting.

    Macron also called on France’s political parties “to act responsibly”, Primas added.

    “The French president said — and I’ll use his exact words — that there is neither denial of reality nor exaggeration of France’s financial situation,” the spokeswoman said.

    “France is a solid country, with economic resilience and significant financial capacity.”

    Bayrou has vowed to “fight like a dog” to stay in power and is expected to discuss the vote of confidence on television on Wednesday evening.

    Macron is weighing his options as he seeks to contain the looming political crisis.

    If the government falls, he could appoint a new prime minister, dissolve parliament again or resign.

    Macron gambled on snap polls last summer in a bid to head off the far-right and bolster his authority, but the move backfired and left a deadlocked parliament.

    Continue Reading

  • Study concludes that heart attacks “may be an infectious disease”

    Study concludes that heart attacks “may be an infectious disease”

    Most people hear “heart attack” and think of clogged arteries packed with fat and cholesterol. That picture is mostly right, but it may be missing a a key component. According to new research, common mouth bacteria that usually stay in their lane may drift into the bloodstream and trigger heart attacks.

    The study suggests that mouth microbes don’t just float through the bloodstream and disappear, as has always been understood to be the case.


    They may take up residence inside arterial plaque and help spark the kind of inflammation that makes a weak spot crack. That is the sort of crack that can set off a clot and cut off blood flow to the heart.

    Bacteria and heart artery plaques

    Plaques form inside blood vessels over time. They are made of fats, cholesterol, immune cells, and scar-like tissue. Many sit there without causing trouble.

    The risk rises when the thin outer layer – the fibrous cap – breaks. Once that cover fails, the plaque’s contents meet the bloodstream; a clot can form, and a heart attack can follow.

    This study focused on whether bacteria from the mouth, especially a group called viridans streptococci, could be tucked into those plaques.

    The central question was: were bacteria hiding out and then helping to drive inflammation right where it hurts most?

    How the study was done

    Researchers analyzed artery plaques from two sources: people who died suddenly and patients having surgery to clear clogged neck arteries.

    They did not rely on one test. They used DNA methods to detect bacterial genetic traces, special stains to locate bacteria in tissue, and gene activity analyses to see which immune pathways were active.

    They also tested how different bacterial components trigger early warning signals in immune cells.

    Pattern recognition receptors – the body’s “burglar alarms” – were a key focus, including a pathway called TLR2 that is well known for spotting bacterial signatures.

    Biofilm bacteria and the heart

    Inside the deeper parts of many plaques, the team found signs that viridans streptococci were living together as a biofilm.

    A biofilm is a community of bacteria embedded in a protective matrix that helps them stick to a surface and shield themselves from stress.

    In those plaque cores, immune cells called macrophages did not appear to react to the biofilm. In other words, the bacteria appeared tucked away where the body’s defenses were not mounting a response.

    When bacteria break bad

    The picture changed at the edges of plaques that were cracked or appeared unstable. There, the researchers saw scattered bacteria that appeared to have broken free from the hidden biofilm.

    That shift coincided with activation of immune alarms. Pattern recognition receptors lit up – especially through TLR2 – a classic “we found bacteria” signal.

    The alarm did not just activate the rapid innate immune response; it also drew in the slower, more targeted adaptive immune system.

    “Bacterial involvement in coronary artery disease has long been suspected, but direct and convincing evidence has been lacking,” explained Professor Pekka Karhunen, lead author of this research.

    “Our study demonstrated the presence of genetic material – DNA – from several oral bacteria inside atherosclerotic plaques.”

    Heart disease and bacteria signals

    Samples that tested positive for viridans streptococci tended to come from plaques that were more advanced and complicated.

    In the autopsy series, bacterial signals lined up with deaths due to coronary heart disease and heart attacks.

    That association does not prove the bacteria caused the deaths, but it strengthens the idea that they may play a role in a dangerous chain of events.

    Daily life implications

    Oral health has long been linked with heart health in population studies. Everyday activities like brushing or chewing can push mouth bacteria into the bloodstream, especially when gums are inflamed.

    The new findings point to a path where certain mouth bacteria might colonize plaques, lie low in biofilms, and then shed pieces that trigger inflammation right where the plaque is fragile.

    This is not a call for antibiotics to prevent heart attacks. It does not turn brushing into a magic shield against heart disease.

    Cholesterol levels, high blood pressure, smoking, diabetes, and family history still carry a lot of weight.

    The study suggests bacteria – especially in biofilm form – may be another player that nudges risky plaques toward rupture.

    More questions need answers

    To sum it all up, this surprising, peer-reviewed study links oral bacteria within arterial plaques to inflammation associated with plaque rupture, highlighting a plausible mouth-heart connection.

    The next steps include testing whether targeting biofilms, improving oral health, or dialing down specific immune alarms could make plaques more stable.

    Researchers will also need to sort out cause versus correlation and identify which bacterial features matter most inside human arteries.

    What you should do

    In the meantime, continue to follow the basic guidelines urged by the American Heart Association.

    Keep LDL cholesterol in check. Do not smoke or vape. Move your body most days. Sleep well. Eat in a way that supports cardiovascular health.

    Keep up with dental basics also – regular brushing, flossing, and routine checkups reduce the chances that mouth bacteria slip into your blood.

    None of these habits are cure-alls on their own, but together they lower risk.

    The full study was published in the Journal of the American Heart Association.

    —–

    Like what you read? Subscribe to our newsletter for engaging articles, exclusive content, and the latest updates.

    Check us out on EarthSnap, a free app brought to you by Eric Ralls and Earth.com.

    —–

    Continue Reading

  • Threat Spotlight: How Attackers Poison AI Tools and Defences

    Barracuda has reported on how generative AI is being used to create and distribute spam emails and craft highly persuasive phishing attacks. These threats continue to evolve and escalate – but they are not the only ways in which attackers leverage AI. Security researchers are now seeing threat actors manipulate companies’ AI tools and tamper with their AI security features to steal and compromise information and weaken a target’s defences. 

    AI assistants and the Large Language Models (LLMs) that support their functionality are vulnerable to abuse.

    Barracuda’s threat analysts have found attacks where malicious prompts are hidden inside benign looking emails. This malicious payload is designed to manipulate the behaviour of the target’s AI information assistants.

    For example, a recently reported – and fixed – vulnerability in Microsoft 365’s AI assistant, Copilot, could allow anyone to extract information from a network without authorisation. Threat actors can exploit to collect and exfiltrate sensitive information from a target.

    They do this by leveraging the ability of internal AI assistants to look for and collate contextual data from internal emails, messages and documents when answering queries or completing tasks.

    • First, the attackers send one or more employees a seemingly harmless email containing a concealed and embedded malicious prompt payload.
    • This email needs no interaction from the user and lives benignly in their inbox.
    • When the employee asks the AI assistant for help with a task or query, the assistant scans look through older emails, files and data to provide context for its response. As a result, the AI assistant unwittingly infects itself with the malicious prompt.
    • The malicious prompt could then ask the AI assistant to silently exfiltrate sensitive information, to execute malicious commands or to alter data.

    Weaponised emails also try to manipulate AI assistants by corrupting their underlying memory or data retrieval logic. These include emails with exploits targeting vulnerabilities in RAG (Retrieval-Augmented Generation) deployments. RAG is a technique that enables the LLMs to retrieve and incorporate new information beyond their training model.

    Such attacks can lead to AI assistants making incorrect decisions, providing false information, or performing unintended actions based on corrupted data. 

    Tampering with AI-based protection

    Attackers are also learning how to manipulate the AI components of defensive technologies.

    Email security platforms are being enhanced with AI-powered features that make them easier to use and more efficient. These include features such as auto-replies, ‘smart’ forwarding, auto-triage to remove spam, automated ticket creation for issues, and more. This is expanding the potential attack surface that threat actors can target.

    If an attacker successfully manipulates these security features, they could:

    • Manipulate intelligent email security tools to autoreply with sensitive data.
    • Abuse AI security features to escalate helpdesk tickets without verification. This could lead to unauthorised access to systems or data, as attackers could exploit the escalated privileges to perform malicious activities. 
    • Trigger workflow automation based on a malicious prompt. This could lead to the execution of harmful actions, such as deploying malware, altering critical data, or disrupting business operations. 

    Casting doubt on reality

    Identity confusion and spoofing

    When AI systems operate with high levels of autonomy, they can be tricked into either impersonating users or trusting impersonators. This can lead to:

    • ‘Confused Deputy’ attacks: This involves an AI agent with higher privileges performing unauthorised tasks on behalf of a lower-privileged user (such as an attacker.)
    • Spoofed API access: This involves existing AI-based integrations with Microsoft 365 or Gmail, for example, being manipulated to leak sensitive data or send fraudulent emails.
    Cascading hallucinations: trusting the untrue

    As mentioned above, email attacks targeting AI assistants can try to manipulate the assistant’s functionality. This could lead the assistant to summarise a user’s inbox, generate reports, and set the calendar – but based on false or manipulated data.

    In such cases, a single poisoned email could:

    • Mislead task prioritisation. For example, send “urgent” emails from fake executives.
    • Skew summaries and recommendations.
    • Influence critical business decisions based on hallucinations.

    How email defenses need to adapt

    Legacy email gateways, traditional email authentication protocols such as SPF or DKIM  and standard IP blacklists are no longer enough to defend against these threats.  Organisations need an email security platform that is generative-AI resilient. This platform should include:

    • LLM-aware filtering: Able to understand email context (topic, target, type etc.), tone and behavioural patterns in addition to the email content.
    • Contextual memory validation: This helps to sanitise what AI-based filters learn over time and can prevent long-term manipulation.
    • Toolchain isolation: AI assistants need to operate in sandboxes, with measures in place to block any unverified action based on a received email prompt.
    • Scoped identity management: This involves using minimal-privilege tokens and enforcing identity boundaries for AI integrations.
    • Zero trust AI execution: Just because an email claims to be “from the CEO” doesn’t mean the AI should automatically act on it. Tools should be set to verify everything before execution.

    The future of email security is ‘agent-aware’

    The AI tools being used within organisations are increasing built on ‘agentic’ AI. These are AI systems capable of independent decision-making and autonomous behavior. These systems can reason, plan and perform actions, adapting in real time to achieve specific goals.

    This powerful capability can be manipulated by attackers and security measures must shift from passive filtering to proactive threat modelling for AI agents.

    Email is a great example. Email is becoming an AI-augmented workspace, but it remains one of the top attack vectors. Security strategies need to stop seeing email as a channel. Instead, they need to approach it as an execution environment requiring zero trust principles and constant AI-aware validation.

    How Barracuda email protection helps defend against AI attacks

    Barracuda’s integrated cybersecurity platform is purpose-built to meet the dual challenge of AI-based attacks and attacks targeting AI components.

    Our email protection suite combines intelligent detection, adaptive automation, and human-centric design to help customers outpace AI-powered threats.

    This includes:

    • Advanced AI-based detection: Barracuda uses behavioural AI and NLP to spot social engineering even without obvious malware or links. It catches impersonation, business email compromise (BEC), and tone-shift anomalies that traditional filters miss.
    • Defense in depth: Barracuda covers every stage of the kill chain from phishing prevention to account takeover detection and automated incident response, closing the gaps that attackers exploit.
    • Real time threat intelligence: With data from a global detection network, Barracuda rapidly adapts to evolving threats like prompt injection, RAG poisoning, and AI hallucination abuse.
    • User training and awareness: Technology alone isn’t enough. Barracuda empowers employees to recognise AI-powered phishing through ongoing awareness training because trust is the new vulnerability.

     

    Continue Reading

  • Doctor explains ‘silent acid reflux’: No heartburn, but has serious and damaging effects including tooth sensitivity

    Doctor explains ‘silent acid reflux’: No heartburn, but has serious and damaging effects including tooth sensitivity

    Most people hear “acid reflux” and immediately think about that fiery heartburn creeping up the chest after a pizza or a big plate of spicy food. But here’s the thing. Not all reflux shows up with that classic burning feeling. In fact, a type called silent reflux, or laryngopharyngeal reflux (LPR), creeps in without the obvious warning signs. That’s what makes it so tricky.

    What is silent acid reflux?

    According to Cleveland Clinic, with silent reflux, stomach acid doesn’t just come up and burn the esophagus in the way we normally picture. Instead, the acid makes its way into the throat, voice box, or even the airways. And because the lining in those areas is way more sensitive than the esophagus, even a small amount of acid can cause damage. But the kicker is that you might not feel the typical heartburn at all. Instead, people may notice things like a chronic sore throat, hoarseness, constant throat clearing, or even a nagging cough that just will not go away. Some folks complain of a lump-in-the-throat sensation or find themselves losing their voice more easily than before. Others might deal with unexplained breathing problems that can be confusing for months before anyone figures out silent reflux is behind it.

    The lack of obvious heartburn is part of what makes this condition dangerous

    You could have acid irritating your tissues for years and not realize it. Left untreated, silent reflux can cause serious complications. The vocal cords can get swollen and fragile, making it tough to speak comfortably. It can worsen asthma or lead to recurring respiratory infections. There is also worry that long-term exposure of the throat and esophagus to acid might increase risks of precancerous changes. In other words, it is not something to brush off.Recently, Dr. Joe Damiani – TMJ, Head & Neck Specialist, took to Instagram to highlight an unusual reason of tooth sensitivity and discussed about silent acid reflux. “Do you have sensitive teeth? One cause you might be surprised by his acid reflux… Even if you ‘ don’t have it’. You see there’s something called silent reflux, and it doesn’t feel like the traditional burning in the throat. Instead, there’s other signs that are very prominent what you may have never realized are coming from acid reflux,” he has posted. “You see the acid from reflux can damage enamel on teeth and that is what can be making them more sensitive of our time. So if you can prevent the reflux, you can protect the teeth and reduce tooth sensitivity. This is more of a root cause fix compared to just brushing your teeth with something that makes them feel less sensitive!,” he explains.

    Common symptoms of silent acid reflux are:

    Hoarseness in the voiceSore throat or lump in the throat all the timeSour taste in mouthBad breathPost nasal drip Fullness in ears

    How to manage silent acid reflux?

    Silent acid reflux is all about the small lifestyle tweaks that add up. Start by cutting back on trigger foods like chocolate, fried stuff, spicy eats, tomato products, citrus, and anything fatty. Try to eat smaller meals and don’t rush, chew slowly and give your food some time to settle before laying down. Waiting at least three hours after eating before hitting the sack is a big help, and popping a wedge or a couple of extra pillows under your head at night lets gravity keep the acid where it belongs. Losing weight, stopping smoking, and saying no to alcohol also make a big difference if any of those apply.For day-to-day relief, sipping water and herbal teas can soothe the throat. Some folks find that eating alkaline foods, like bananas, helps—or even a little aloe vera juice (after checking with a doctor). It’s all about finding what works for each person and sticking to the plan.


    Continue Reading

  • New trial will test if a low-plastic lifestyle improves your health

    New trial will test if a low-plastic lifestyle improves your health

    Scientists in Australia are launching one of the most comprehensive trials to date to test whether ditching plastics in food, personal care, and household products can lower internal chemical loads and improve markers of cardiometabolic health.

    Protocol: Randomised controlled trial of a low plastic diet and lifestyle intervention for adults with cardiometabolic risk factors: the Plastic Exposure Reduction Transforms Health (PERTH) trial – a protocol. Image Credit: Oksana Mizina / Shutterstock

    In a recent public health protocol published in BMJ Open, researchers describe the PERTH (Plastic Exposure Reduction Transforms Health) trial, a new randomized controlled study protocol designed to investigate whether a comprehensive, 4-week “low-plastic” diet and lifestyle intervention can reduce exposure to plastic-derived chemicals.

    These chemicals, such as bisphenols and phthalates, are ubiquitous endocrine disruptors with documented links to obesity and cardiometabolic disease. The PERTH trial examines whether a cohort of 60 adults with cardiometabolic risk factors, provided with all-plastic-free food, cookware, and personal care products, can demonstrate measurable reductions in plastic-associated chemical excretion and exploratory changes in cardiometabolic biomarkers.

    Background

    From the top of Mt. Everest to the bottom of the Mariana Trench, plastics from food packaging, kitchen utensils, cosmetics, and cleaning supplies can be found everywhere and comprise an inescapable part of modern life. Alarmingly, in addition to their ecological and environmental impacts, a growing body of scientific literature reports extensive physiological concerns associated with them.

    Two classes of chemicals commonly used in plastics: 1. bisphenols (like Bisphenol A [BPA]) and 2. phthalates (like diethyl phthalate [DEP]) are known endocrine disruptors. Observational research has linked higher exposure to these “plastic-associated chemicals (PACs)” with various adverse physiological outcomes, including obesity, insulin resistance, and systemic inflammation.

    Clinical evidence suggests these outcomes substantially increase individuals’ risk and severity of cardiometabolic disease. Unfortunately, whether actively and drastically reducing PAC exposure can reverse previous harm remains to be investigated through controlled intervention studies.

    About the proposed study (PERTH)

    The present public health protocol details the proposed methodology of the Plastic Exposure Reduction Transforms Health (PERTH) trial, a randomized controlled trial (RCT) designed to test the efficacy of a low-plastic lifestyle intervention on measurable health outcomes in adults with cardiometabolic risk factors.

    The study will involve 60 community-dwelling adults (aged 18–60 years) in Perth, Australia, who have established cardiometabolic risk factors. Study inclusion criteria include: 1. A body mass index (BMI) ≥30 kg/m², and 2. A high waist circumference (≥102 cm in men, ≥88 cm in women). The study will randomly assign participants into a case (“intervention”; n = 30) or control (n = 30) group.

    The intervention period will last four weeks, during which time the intervention cohort participants will receive a comprehensive, all-inclusive low-plastic lifestyle package. This includes: 1. Delivering all food and beverages in plastic-free packaging, 2. Replacement plastic-free kitchenware (e.g., stainless steel pots, glass containers), 3. Personal care products (such as shampoo and soap), and 4. Cleaning supplies.

    Interventional group participants will receive detailed instructions on how to minimize plastic exposure in their daily lives. In contrast, the control group will be asked to maintain their routine lifestyle and dietary patterns.

    Study outcomes will be measured by evaluating the change in a composite z-score of urinary bisphenol concentrations (BPA and BPS) between participants in the intervention and control groups. Secondary and tertiary outcomes will include changes in urinary phthalate metabolites and a range of key health markers, including cardiometabolic biomarkers, blood pressure, and body composition. Participants will also collect their own stool and nasal lavage samples to support exploratory analyses.

    Participants’ sociodemographic information will be recorded at baseline, and all biomedical measurements will be taken at baseline, midpoint (week 2), and at the end of the 4-week intervention.

    Study design and significance

    By providing all food and products to the intervention group, the PERTH trial will be the most comprehensive and rigorously controlled trial ever conducted on the topic. Impressively, pilot trials have already revealed that BPA was detectable in over 91% of urine samples derived from healthy (no cardiometabolic disease) adults, confirming that PAC exposure is widespread in Australia.

    These pilots further demonstrated that a 7-day low-plastic intervention could significantly reduce urinary PAC levels, providing a strong basis for this larger, longer trial. Notably, while laboratory staff will be blinded to participant allocation, both participants and investigators cannot be blinded due to the nature of the intervention.

    Finally, the PERTH study leverages the Plastic-Associated Chemical-exposure Questionnaire (PACeQ) to meticulously track and assess all potential routes of plastic exposure (ingestion, inhalation, and absorption), ensuring robust and trustworthy results. The protocol also highlights the ethical rationale for the holistic intervention approach, as it avoids artificial PAC exposure in controls due to safety concerns.

    Conclusions

    The PERTH trial is a critically important study that will provide the first protocolised attempt to test the causal effects of whether a comprehensive reduction in exposure to everyday plastic chemicals can lead to exploratory improvements in cardiometabolic health markers.

    Study outcomes have the potential to significantly impact public health guidelines, inform regulatory policy on the use of chemicals in consumer products, and empower individuals with practical, evidence-based strategies to reduce their body’s plastic burden. While the study’s Australian focus prevents its global generalizability, it comprises the first significant step from observational links to real-world interventions.

    Journal reference:

    • Lucas, A., Harray, A., Duong, L., Herrmann, S., Vlaskovsky, P., Trevenen, M., Chan, D., Papendorf, H., Smith, T., Flint, L., Liu, A., Gaudieri, S., Wang, X., Mueller, J., Thomas, K. V., Murray, K., Symeonides, C., & Lucas, M. (2025). Randomised controlled trial of a low plastic diet and lifestyle intervention for adults with cardiometabolic risk factors: the Plastic Exposure Reduction Transforms Health (PERTH) trial—a protocol. BMJ Open, 15(8), e099330. DOI – 10.1136/bmjopen-2025-099330. https://bmjopen.bmj.com/content/15/8/e099330

    Continue Reading

  • Venice jury chief says films don’t change the world

    Venice jury chief says films don’t change the world


    VENICE:

    US director Alexander Payne, president of the jury at this year’s Venice Film Festival, said on Wednesday that while movies rarely alter the course of society, they serve as vital documents of their times and shape memory.

    “Can a film really change society or culture? I don’t know. Doubtful,” Payne said, recalling that films such as Charlie Chaplin’s “The Great Dictator” did not stop World War II, but rather showed that people were aware of what was going on.

    “We have those as documents and, as such, we can try to learn from them,” Payne, whose credits include the Oscar-winning comedies “Sideways” and “The Holdovers”, said ahead of the formal opening of the 11-day festival later on Wednesday.

    He lamented the shrinking space for theatrical releases in the age of streaming, saying movies that were only seen online struggled to make a broad impact on society. “It’s typically films which have theatrical release, which become a part of a cinema conversation, of a cultural conversation, and then have some kind of impact,” he said.

    Big streamers such as Netflix and Amazon regularly showcase their films at Venice but then offer little or no exposure for those movies in cinemas, reserving them instead for their subscribers.

    In the run-up to the 2025 event, some 1,500 film industry figures signed a petition urging the festival to take a robust stand over the war in Gaza, calling on the organisers to promote Palestinian voices and denounce Israeli actions.

    Payne declined to say if he supported their call, while the head of the festival, Alberto Barbera, said he welcomed open debate but rejected suggestions that Israeli filmmakers or actors should be banned. “We reject outright the demand to disinvite artists who wish to take part in the festival.

    The Venice festival opened on Wednesday night with the world premiere of Italian director Paolo Sorretino’s “La Grazia.” The event ends on September 6 when Payne and his fellow jury members announce who has won the top Golden Lion award.

    The Festival kicked off with Hollywood royalty heading to Italy. Julia Roberts and George Clooney are some of the biggest names expected at the 82nd edition of the world’s longest-running festival, with top directors from Kathryn Bigelow and Guillermo del Toro to Jim Jarmusch all due to arrive on the sandy Lido across the Venice lagoon.

    Protesters held up a “Free Palestine” banner in front of the festival’s main building, while a group of Italian film professionals have called on organisers to openly condemn Israel’s invasion of Gaza. The festival has selected a film about the war for its main competition — “The Voice of Hind Rajab” by Franco-Tunisian director Kaouther Ben Hania, which reconstructs the death of six-year-old Palestinian girl Hind Rajab who was killed last year by Israeli forces.

    Paolo Sorrentino’s “La Grazia” — about an Italian president grappling with doubts over whether to sign into law a euthanasia bill — was the first in-competition movie screened to the media on Wednesday, the latest from the director best known outside Italy for “The Great Beauty”. Francis Ford Coppola will present daredevil German director Werner Herzog (“Grizzly Man”, “Fitzcarraldo”) with a Golden Lion for Lifetime Achievement for his more than 70 films over a 60-year career at the opening ceremony Wednesday.

    Herzog’s latest documentary, “Ghost Elephants”, about a lost herd in Angola, will premiere out of competition in Venice. On the same night is the premiere of sci-fi comedy “Bugonia” from Greek director Yorgos Lanthimos, which stars Emma Stone as a pharmaceutical executive kidnapped by people who mistake her for an alien. Winners of the festival’s prestigious Golden Bear top prize often go on to Oscar glory, such as “Nomadland” or “Joker” in previous years. The flurry of premieres also includes Del Toro’s big-budget remake of “Frankenstein”, starring Oscar Isaac, or Bigelow’s political thriller “A House of Dynamite”, starring Idris Elba.

    Continue Reading

  • The University of Tokyo and DENSO Jointly Establish a Social Cooperation Program: “Building Sustainable Production System Infrastructure with Advanced AI Technology” | Newsroom | News

    The University of Tokyo and DENSO Jointly Establish a Social Cooperation Program: “Building Sustainable Production System Infrastructure with Advanced AI Technology” | Newsroom | News

    ■Background
    While Japanese manufacturing is distinguished by its strength in lean manufacturing technologies, the industry is currently facing serious challenges such as a declining labor force and difficulties in passing down specialized skills and expertise. To overcome these issues and achieve sustainable growth, it is imperative to accelerate digitalization on the factory floor and leverage AI technologies.

    Although enormous amounts of data are accumulated daily at production sites, the reality is that this data is not being fully utilized. Furthermore, the expert skills and judgment possessed by experienced workers—often referred to as “tacit knowledge”—are inherently difficult to formalize and transfer, making knowledge succession a significant challenge. In order to dramatically enhance productivity and build resilient production systems capable of adapting to change, it is essential to integrate extensive data with expert knowledge through AI technologies, thereby creating new value for the manufacturing sector.

    ■Overview
    Program Name: “Building Sustainable Production System Infrastructure with Advanced AI Technology”
    Duration: April 1, 2025, to March 31, 2029
    Affiliated Department: Graduate School of Engineering, The University of Tokyo
    Collaborating Company: DENSO CORPORATION
    Responsible faculty member:
    Jun Ota (Professor, Research into Artifacts, Center for Engineering (RACE), School of Engineering, The University of Tokyo)
    Yasushi Umeda (Professor, Department of Precision Engineering, School of Engineering, The University of Tokyo)
    Tatsunori Hara (Associate Professor, Research into Artifacts, Center for Engineering (RACE), School of Engineering, The University of Tokyo)
    Kohei Kaminishi (Project Lecturer, Research into Artifacts, Center for Engineering (RACE), School of Engineering, The University of Tokyo)
    dedicated website: https://denso.fa.race.t.u-tokyo.ac.jp/

    ■Contents of Specific Research
    Systematization of Knowledge on Data Analysis Processes and Logic for Production System Operations

    We will systematize the processes and logic for analyzing operational data obtained from manufacturing sites and translating these insights into improvements, establishing them as reusable knowledge.

    Extraction of Information from Operational Data and Process/Equipment Models; Analysis and Inference of Causes of Abnormality and Countermeasures
    We will combine detailed operational data such as sensor data and images with models of production processes and equipment and use AI to extract useful information. Based on this, we are developing technology to automatically analyze and infer the causes of production abnormalities and countermeasures.

    Model and Knowledge Management for the Sustainable Development of Production System Operation Platforms
    We will establish effective model management and knowledge management methods to keep the developed knowledge models and accumulated knowledge up to date, enabling the production system to continuously evolve and develop.

    Systematization of Research Outcomes and Application to Next-Generation Monozukuri Education
    We will organize and systematize the research outcomes obtained through this course and apply them to the development of educational programs designed to cultivate talent for the future of Monozukuri, where AI and data utilization are essential.

    We aim to establish methods that contribute to the construction of a sustainable next-generation production system operation platform by combining the University of Tokyo’s cutting-edge AI research capabilities with DENSO’s manufacturing knowledge and technologies cultivated over many years.

    Reference 1: To commemorate the launch of this joint lecture series, we will hold a public kickoff symposium to introduce its activities to a wide audience. Through presentations on research topics by lecture series members and panel discussions by speakers, we will examine the future of next-generation production systems.

    Symposium Overview
    Date: Tuesday, October 21, 2025, 2:00 PM – 5:30 PM (Optional Tour: 1:00 PM – 1:50 PM)
    Venue: Room 51, 1st Floor, Building 5, Faculty of Engineering, Hongo Campus, The University of Tokyo, and online (via Zoom)
    Participation fee: Free
    For details such as how to apply, please refer to the website of the Research into Artifacts, Center for Engineering (RACE), The University of Tokyo. (https://race.t.u-tokyo.ac.jp/)

    Reference 2: To foster a sense of unity between the University of Tokyo and DENSO, and to encourage deeper empathy with DENSO’s philosophy, the dedicated classroom in Building 5 of the Faculty of Engineering at the University of Tokyo used for this course will be decorated with DENSO’s corporate colors and logo from September 2025 until March 2029, when the course concludes.

    Continue Reading