Blog

  • Cardi B defense gets boost in $24-million civil trial

    Cardi B defense gets boost in $24-million civil trial

    Cardi B returned to the witness stand on Wednesday in a civil suit brought by a security guard who alleged that the rapper assaulted her — even scratching her with one of her nail extensions — in a 2018 incident in the hallway outside a Beverly Hills obstetrician’s office.

    On Wednesday, the performer blasted the plaintiff, saying she is looking for a payout. Emani Ellis is seeking $24 million. Cardi B said the pair went chest-to-chest and exchanged heated words but nothing more.

    The defense rested at the end of Wednesday’s session, and the jury in the Alhambra courtroom will hear closing arguments on Thursday.

    Cardi B, whose real name is Belcalis Marlenis Almánzar, reiterated in her testimony that she never touched, scratched or spat at the security guard, who she believed was taking video of her with her cellphone.

    Her defense got a boost Wednesday with the testimony of the obstetrician with whom the then-4-months-pregnant rapper had an appointment on the day of the incident — Feb. 24, 2018 — as well as from his receptionist.

    Receptionist Tierra Malcolm told jurors that she saw Ellis corner Cardi B — and then, when the receptionist got between them, the guard reached for the rapper. The receptionist said she ended up with a cut on her own forehead.

    Dr. David Finke testified that he saw the guard cause that injury and also hit the receptionist’s shoulder. He further said that Ellis had no injuries to her face. Both testified they never saw Cardi B hit Ellis.

    But the rapper testified that when a doctor’s staffer asked Ellis that day what had occurred, Ellis said, “The b— just hit me.’ … And I’m, like, so confused because … I didn’t hit you.”

    Under cross-examination by Ellis’ attorney, the rapper acknowledged she and Ellis were chest-to-chest as expletives were traded.

    Ellis filed suit in 2020, alleging assault, battery and intentional infliction of emotional distress as well as negligence and false imprisonment.

    She worked as a security guard at the building where Cardi B had her medical appointment and said during testimony on Monday that she was doing her rounds when she saw the celebrity get off the elevator. She testified that she was overcome with excitement and declared, “Wow, it’s Cardi B.”

    Ellis alleged that the performer then turned to her and said, “Why the f— are you telling people you’ve seen me?” Cardi B then accused her of trying to spread news about her being at the doctor’s office, she testified.

    Cardi B cursed at her, used the N-word and other slurs, called her names, threatened her job, body-shamed her and mocked her career, Ellis said. She alleged Cardi B spat on her, took a swing at her and scratched her left cheek with a 2- to 3-inch fingernail.

    The rapper said during Wednesday’s court proceedings that she’s 5 foot 3 and was 130 pounds and pregnant at the time. She wouldn’t have tried to fight the guard, who was far larger, she said.

    Asked if she was “disabled” during the incident, Cardi B’s comments drew laughter in the courtroom: “At that moment, when you’re pregnant, I’m very disabled,” she said with a roll of her eyes. “You want me to tell you the things I can’t do?”

    Malcolm said that Cardi B was the lone patient visiting the office that day as it had been closed for her privacy.

    When the incident occurred, the receptionist said, “I really just saw Ms. Ellis in front of her and that’s what made me rush and get in between.” Malcolm acknowledged that she did not see the entire interaction between the pair.

    When she got between them, Malcolm testified she was facing Ellis, who was reaching with her arms. Malcolm said she suffered a cut to her forehead during the incident.

    “Cardi B was behind me. The only assumption I had was that it was from Ms. Ellis as she was facing me,” she testified. “I see her hands trying to reach over me.”

    Asked if Cardi B could have caused the injury with one of her nails, she replied, “But she was behind me.” She said it was a nurse who noticed the cut to her forehead.

    The doctor said he was “just flabbergasted with the allegations that don’t seem congruent with what i saw that day.”

    Following the incident, he said he eventually persuaded Ellis to get on the elevator and leave the floor.

    Cardi B testified Wednesday that her social media followers alerted her that the guard had gone online about the incident, where she responded, calling the accusations lies.

    For the third day of the trial, the rapper, known for her daring style choices, donned a long black wig. The first day of the trial, she sported short black hair, followed the next day by a blond showgirl hairstyle.

    Continue Reading

  • Israel army launches operation in West Bank’s Nablus

    Israel army launches operation in West Bank’s Nablus

    NABLUS (Palestinian Territories) (AFP) – Dozens of Israeli soldiers stormed the occupied West Bank city of Nablus on Wednesday, witnesses and Palestinian officials said, with the Red Crescent reporting at least seven people wounded in the raid.

    Contacted by AFP, the Israeli military confirmed that its forces were conducting an operation in the northern West Bank city, without specifying its purpose.

    The raid began at around 3:00 am (0000 GMT), residents said, with soldiers in armoured vehicles storming several neighbourhoods of Nablus’s old city, which has a population of around 30,000 people.

    It came a day after Israeli forces carried out a relatively rare raid on Ramallah, seat of the Palestinian Authority, targeting a currency exchange in the city centre and leaving dozens of Palestinians wounded, according to the Palestine Red Crescent Society.

    Nablus Governor Ghassan Daghlas told AFP that Wednesday’s “assault… is merely a show of force with no justification”.

    One witness, who declined to give his name, reported that soldiers had expelled an elderly couple from their home.

    Israeli troops “are storming and searching houses and shops inside the old city, while some houses have been turned into military posts”, said Ghassan Hamdan, head of the Palestinian Medical Relief organisation in Nablus.

    AFP footage showed Israeli forces and military vehicles deployed on the streets, with some troops taking position on a rooftop.

    Daghlas said the army had informed Palestinian authorities that the raid would last until 4:00 pm.

    Local sources said clashes broke out at the eastern entrance to the old city, where young people threw stones at Israeli soldiers, who responded with tear gas and live ammunition.

    ‘ESCALATION’

    The Red Crescent said its teams treated five people wounded by rubber bullets, one person hit by live bullet shrapnel and another following “physical assault”.

    One more person was injured in a “fall” during the raid, the medical organisation added, and at least 27 others suffered from tear gas inhalation.

    Palestinian presidential spokesman Nabil Abu Rudeineh, in a statement carried by official news agency Wafa, slammed “the Israeli escalation in cities and refugee camps”, calling a recent uptick in raids “dangerous, condemned and unacceptable”.

    The old city of Nablus has been the focus of several major Israeli raids, including in 2022 and 2023 during large-scale operations targeting a local grouping of armed fighters, as well as in 2002 during the second Palestinian intifada, or uprising.

    In early June 2025, an Israeli military operation there resulted in two Palestinians killed.

    Since the start of the Gaza war in October 2023, violence has surged in the West Bank, which Israel has occupied since 1967.

    Israeli troops or settlers in the West Bank have killed at least 972 Palestinians, including militants and civilians, since the beginning of the Gaza war, according to an AFP tally based on Palestinian Authority figures.

    In the same period, at least 36 Israelis, both civilians and security forces, have been killed in attacks or during military operations in the territory, according to Israeli figures.

     


    Related Topics



    Subscribe Dunya News on YouTube

    ‘ ; r_text[1] = ” ; r_text[2] = ” ; r_text[3] = ” ; r_text[4] = ” ; r_text[5] = ” ; r_text[6] = ” ; var i = Math.floor(r_text.length * Math.random()); document.write(r_text[i]);

    Continue Reading

  • Multi-analyte test accurately identifies brain cancers using small cerebrospinal fluid

    Multi-analyte test accurately identifies brain cancers using small cerebrospinal fluid

    A novel, multi-analyte test developed by researchers at the Johns Hopkins Kimmel Cancer Center, its Ludwig Center and the Johns Hopkins Department of Neurosurgery can accurately identify brain cancers using small samples of cerebrospinal fluid (CSF), offering a promising new tool to guide clinical decision-making. 

    The findings, supported by funding from the National Institutes of Health, were published Aug. 25 in Cancer Discovery and demonstrate that combining multiple biological markers, including tumor-derived DNA and immune cell signatures, is more effective for diagnosing central nervous system cancers than using any one marker alone. 

    “This study highlights how much more information we can gain when we evaluate several analytes together,” says senior study author Chetan Bettegowda, M.D., Ph.D., Harvey Cushing Professor and Director of the Department of Neurosurgery at the Johns Hopkins University School of Medicine, director of the Reza Khatib Brain Tumor Research Center at Johns Hopkins, medical director of the Ludwig Center, and a senior author on the study. “The ability to detect cancers with high specificity and also gain insight into the immune environment of the brain could be an important advance in the care of patients with brain tumors.” 

    To evaluate the potential of a multi-analyte approach, investigators analyzed 206 CSF samples, including samples from patients with high-grade gliomas, medulloblastomas, metastases and central nervous system lymphomas. Their test, called CSF-BAM (cerebrospinal fluid–B/T cell receptor, aneuploidy and mutation), measured chromosomal abnormalities, tumor-specific mutations, and T and B cell receptor sequences. In combination, these markers identified brain cancers with more than 80% sensitivity (ability to detect cancer) and 100% specificity (correctly identified those who were cancer-free) in the validation cohort. The 100% specificity means no false positives were recorded among individuals with noncancerous conditions. 

    The study also showed that the assay could distinguish between the immune cell populations present in cancer and noncancer cases, offering additional biological context that could be helpful in more-challenging clinical scenarios. Investigators say this ability to categorize T and B cell populations in the CSF provides insights into both disease presence and immune response. 

    Many patients with brain lesions face invasive diagnostic procedures to confirm a cancer diagnosis. A tool like this could help us make better-informed decisions about who really needs a biopsy and who doesn’t.”


    Christopher Douville, M.D., assistant professor of oncology and senior study author

    Researchers say the test could be particularly useful for cases in which conventional imaging or cytology is inconclusive, or in situations when obtaining tissue for diagnosis is risky or not possible. The multi-analyte approach, they say, enables clinicians to better detect cancer and better understand the disease status, supporting a more tailored approach to patient care. 

    Source:

    Journal reference:

    Pearlman, A. H., et al. (2025). Detection of human brain cancers using genomic and immune cell characterization of cerebrospinal fluid through CSF-BAM. Cancer Discovery. doi.org/10.1158/2159-8290.cd-24-1788

    Continue Reading

  • Hezbollah weaponry? Israel strikes military building near Damascus killing 6 Syrian soldiers, launches raid by helicopter-borne troop

    Hezbollah weaponry? Israel strikes military building near Damascus killing 6 Syrian soldiers, launches raid by helicopter-borne troop

    Israeli ground forces conducted a raid on a Syrian location near Kisweh, outside Damascus, which had already been targeted in airstrikes on the two preceding days, according to Syrian state media. The initial strike took place on Tuesday (Aug 26), reportedly killing six Syrian soldiers, as confirmed by Syria’s Foreign Ministry. State-run SANA news agency reported a follow-up bombing on Wednesday (Aug 27). SANA cited a government source revealing that soldiers found “surveillance and eavesdropping devices” at the site before the Tuesday strikes. An anonymous defence official told AFP the location was a former Syrian military base in Tal Maneh, near Kisweh. Following the second attack, SANA stated that Israeli troops were airlifted to the area to conduct a raid, though the specifics remain unclear amidst ongoing reconnaissance flights. Israel has launched numerous airstrikes in Syria since the regime’s fall and has taken control of much of a UN-monitored demilitarised zone along the Syria-Israel armistice line.

    Add WION as a Preferred Source

    Hezbollah weaponry reported on site

    The UK-based Syrian Observatory for Human Rights, which monitors conflict zones through local contacts, indicated that the site housed weapons linked to Hezbollah, an Iran-backed Lebanese militia and key ally of Syrian President Bashar al-Assad. The Observatory described the raid as the first Israeli ground operation of its kind since Assad’s fall during a rebel offensive in December. Meanwhile, Syria’s Foreign Ministry condemned the drone strikes in the Kisweh suburb, stating the attack resulted in the deaths of eight soldiers. The ministry labelled the strikes as “a grave violation of international law” and a “clear breach of (Syria’s) sovereignty and territorial integrity.” It accused Israel of pursuing repeated aggressive policies aimed at destabilising the region.

    Israel’s involvement in Syria after fall of Assad

    The recent violence in Syria’s Sweida province began when members of a Bedouin tribe set up a checkpoint and allegedly robbed a Druze man. This incident sparked a cycle of retaliatory kidnappings and attacks between Bedouin tribes and Druze armed groups. Government forces attempted to intervene but were perceived as siding with the Bedouins, leading to tensions with Druze factions. The Syrian military’s entry into Druze areas raised fears of targeting minorities, especially given past traumas like the 2018 ISIS attack on the Druze community, which killed and abducted many. Israel intervened primarily to prevent militant groups from operating near its northern border and to protect the Druze population in Syria due to strong ties with Israel’s own Druze community. Citing security concerns, Israel enforced a self-declared demilitarised zone in southern Syria and launched multiple airstrikes. Despite USattempts to broker peace through the Abraham Accords and engage with the Syrian government, Israel remains wary of the new leadership under al-Sharaa and has expanded its presence in Syrian territory since the fall of Assad.

    Related Stories

    Continue Reading

  • PGIP: a web server for the rapid taxonomic identification of parasite genomes | Parasites & Vectors

    PGIP: a web server for the rapid taxonomic identification of parasite genomes | Parasites & Vectors

    Database construction and curation

    The reference genome data for parasites were sourced from multiple publicly accessible genomic repositories, including the National Center for Biotechnology Information (NCBI) [16], WormBase [17], MalariaGEN [18], the European Nucleotide Archive (ENA) [19], and VEuPathDB [20]. In addition, comprehensive genomic resources were systematically curated through rigorous analysis of peer-reviewed publications that reported whole-genome sequencing assemblies and annotations for parasite species.

    Following data retrieval, we implemented rigorous quality control procedures to verify data integrity and consistency, thereby eliminating low-quality or erroneous entries and ensuring overall reliability. For NCBI-annotated reference genomes, we systematically organized genomic metadata into a structured relational database and constructed search indices to enable computationally efficient queries. To construct a high-quality and nonredundant reference database, genome assemblies were screened on the basis of the following criteria: complete genome annotation for coding sequences, and accurate species-level taxonomic classification [21]. Redundant sequences were removed using CD-HIT (v4.8.1) [22] with a sequence identity threshold of 95%. Ambiguous or conflicting taxonomic labels were manually curated through literature review and cross-referencing with the NCBI taxonomy database.

    To optimize query efficiency, the database was indexed using memory-mapped technology and structurally optimized to enable rapid large-scale data retrieval. Following its construction, the database was validated with sequencing data from reference samples to ensure accuracy and consistency. Given the dynamic nature of genomic data, the database is scheduled for quarterly updates. These updates will adhere to a standardized protocol involving automated data retrieval pipelines, multistage quality control measures, and peer-reviewed manual curation​ to preserve longitudinal data integrity and clinical relevance.

    Data management

    Efficient data management was essential to the development and deployment of PGIP for parasite genome identification. Upon submission, sequencing files (in FASTQ/FASTA format) were securely stored in a distributed file system; and systematically organized by project identifiers, sample metadata, and submission timestamps. This systematic structure streamlined retrieval and preserved data integrity during analysis. To safeguard sensitive data, all transmissions employed protocols such as HTTPS and AES-256 encryption, while role-based access control (RBAC) enforced strict privacy compliance. The platform adhered to a data retention policy under which analysis results were securely stored for 180 days prior to archiving; and accompanied by automated notifications to users before deletion and provisions for long-term export and preservation. This comprehensive data management strategy ensures that PGIP operates with high efficiency, accuracy, and data integrity; while providing reliable and reproducible results for parasite genome identification.

    Design and workflow of PGIP

    Data preprocessing

    The PGIP supports the input of raw paired-end sequencing data in FASTQ format and preprocessed FASTA-formatted sequences from NGS platforms, including its compressed file (such as.gz,.tar). The maximum data size for each sample is 20 Gb. To ensure analytical accuracy, raw FASTQ inputs are subjected to stringent quality control (QC) prior to downstream analysis, including artifact removal and filtration of nontarget sequences. The standardized QC workflow is composed of three critical steps:

    1. 1.

      Adapter removal: sequencing adapters which were introduced during library preparation are systematically trimmed to minimize platform-specific bias using Trimmomatic [23].

    2. 2.

      Quality filtering: low-quality reads (Phred score < 20) and short fragments (< 50 bp) are filtered using Trimmomatic [23]. Quality metrics (e.g., per-base sequence quality, GC content) are visualized using FastQC [24] before and after processing to validate improvements.

    3. 3.

      Host DNA depletion: reads are aligned to the host reference genome (e.g., GRCh38 for human samples) using Bowtie2 v2.4.5 [25] with sensitivity parameters (very-sensitive–local). Nonhost reads (unmapped reads) are retained for downstream pathogen analysis.

    Parasite identification

    Following QC, the cleaned data are automatically analyzed through identification modules within PGIP, which executes taxonomic classification and generates diagnostic reports. These modules utilize two identification methods: the identification of parasite genomes based on reads mapping, and the analysis of assembled data.

    Reads mapping-based identification of parasite genomes

    Kraken2 was used to construct a comprehensive reference genome database for the studied parasites [26]. Genome sequences were indexed using the Kraken2-build command to enable rapid sequence retrieval and alignment. The database was composed of a comprehensive collection of reference genomes for human and zoonotic parasites, such as helminths and protozoa. This taxonomic diversity ensured broad coverage of clinically relevant species, thereby enhancing the accuracy and reliability of parasite identification.

    Species identification was performed using a Kraken2 k-mer-based alignment, which classifies sequencing reads against the reference database. Kraken2 segments each sequence into k-mers (contiguous nucleotide subsequences) and matches these to precomputed, taxon-specific k-mers in the database; thereby enabling fast and precise taxonomic classification. The database and its index file were memory-mapped to enable rapid access. Query sequences were split into k-mers and aligned to the reference database to assign taxonomic labels and calculate alignment counts. A hierarchical classification tree was constructed from the taxon-specific alignment scores, with the taxonomic lineage corresponding to the highest cumulative alignment score assigned as the definitive classification. This method also quantified the relative abundance of each parasite species within the sequencing dataset.

    The Kraken2 output was composed of species identification results accompanied by detailed taxonomic information. Statistical analyses were performed to generate ecological indices; including species composition, paired read counts, and relative abundance.

    Assembly-based identification of parasite genomes

    The clean sequencing data were assembled using MEGAHIT [27], which constructs extended contig sequences through the iterative assembly of short reads. This assembler employs a multi-k-mer iterative strategy to construct simplified de Bruijn graphs (SdBG) through stepwise optimization cycles (k = 21–141 with 12 bp increments). During iterative assembly, smaller k-mers (21–129 bp) facilitated error correction and gap closure in low-coverage regions by filtering spurious connections and enhancing sequence continuity. Conversely, larger k-mers (141 bp) improved resolution of homologous repetitive elements through extended sequence context analysis [28]. Following each assembly iteration, systematic graph refinement procedures were implemented; including: (1) trimming terminal branches (tips) < 2 kbp, (2) collapsing parallel sequence variants (bubbles) with ≥ 95% similarity, and (3) eliminating graph edges which demonstrated local coverage below 2 × . These optimization strategies collectively generated high-fidelity contigs with enhanced structural integrity and sequence accuracy for downstream analyses.

    Taxonomic binning was subsequently performed using MetaBAT [29], a probabilistic clustering tool that integrates contig abundance profiles and tetranucleotide frequency (TNF) patterns to reconstruct metagenome-assembled genomes (MAGs). Leveraging the taxonomically conserved nature of oligonucleotide composition in microbial genomes, MetaBAT first calculated the TNF-based probabilistic distances between contigs, which reflect sequence compositional similarity. Simultaneously, abundance profiles were derived from read alignment depths across samples, to capture genomic coverage variations indicative of population-specific replication rates. These two metrics were empirically weighted to construct a composite probabilistic distance matrix, which enables iterative hierarchical clustering of contigs through a graph-based algorithm. The resulting bins exhibited high phylogenetic resolution, with minimal cross-clade contamination, as validated by marker gene completeness and redundancy assessments.

    Finally, taxonomic classification of MAGs was performed using the Contig Annotation Tool (CAT, v5.2) [30]. The CAT function classified long DNA sequences and MAGs by performing gene prediction, aligning open reading frames (ORFs) to the NR protein database, and the usage of a majority voting mechanism for taxonomic assignment based on individual ORFs. The resulting classification scores were analyzed to identify parasite species within the bins.

    Integration of workflow and report output

    Integrated analytical workflows were developed using Nextflow [31] to systematically execute multiple bioinformatics processes. To generate an identification report, a Python program was used to extract the 10 most identified parasites from the results; including the Latin names of the detected parasites, the number of detected sequences, and their relative abundance (Relative abundance = species-specific reads ×100/ total reads identified at the species level). The identification report also includes the data quality control results.

    Evaluation of parasite identification

    To evaluate the performance of PGIP, we selected a panel of public databases and in-house sequencing datasets representing clinically relevant human parasites. Parasite species were selected to ensure taxonomic diversity and include soil-transmitted helminths (e.g., Ascaris lumbricoides), food-borne parasites (e.g., Clonorchis sinensis), vector-borne parasites (e.g., Plasmodium spp.), and morphologically similar species from the same genus (e.g., Schistosoma japonicum and Schistosoma haematobium). We utilized sequencing data from diverse specimen types to assess platform performance under varying levels of host-derived contamination. These included stool sample (characterized by substantial background interference from host and microbial sources), blood sample (containing abundant host background), cerebrospinal fluid sample (with limited host content), parasitic sample (exhibiting minimal host interference), and amplicon sequencing sample (PCR-amplified parasitic gene fragments). Furthermore, a negative sample was included in the evaluation.

    Public datasets were obtained from the European Nucleotide Archive (ENA). The remaining sequencing datasets were generated in-house as part of the parasitic disease surveillance project conducted at the Jiangsu Institute of Parasitic Diseases (for details, see Supplementary File S2: Datasets for evaluation of parasite identification).

    The sequencing data were uploaded to the platform, and the default analysis workflow (read-mapping-based identification module) was executed. This approach directly maps high-quality sequencing reads to the curated parasite genome database, and is optimized for clinical and metagenomic samples without requiring genome assembly. The assembly-based mode is also available within the platform for users who wish to analyze preassembled contigs or scaffolds.

    Continue Reading

  • Japanese city proposes two-hour daily limit on smartphones for all residents

    Japanese city proposes two-hour daily limit on smartphones for all residents

    A central Japanese town wants to limit smartphone use for all its 69,000 residents to two hours a day, in a move that has sparked intense debate on device addiction.

    The proposal, believed to be the first of its kind in Japan, is currently being debated by lawmakers after being submitted by Toyoake municipal government in Aichi earlier this week.

    Toyoake’s mayor said the proposal – which only applies outside of work and study – would not be strictly enforced, but rather was meant to “encourage” residents to better manage their screen time.

    There will be no penalties for breaking the rule, which will be passed in October if approved by lawmakers.

    “The two hour limit… is merely a guideline… to encourage citizens,” Toyoake Mayor Masafumi Koki said in a statement.

    “This does not mean the city will limit its residents’ rights or impose duties,” he said,

    “Rather, I hope this serves as an opportunity for each family to think about and discuss the time spent on smartphones as well as the time of day the devices are used.”

    Smartphone use during non-leisure activities, such as watching videos while cooking or exercising, online learning and practicing for an e-sports tournament, will not count towards the two hours, he added.

    Koki said he recognised smartphones were “useful and indispensable in daily life” but pointed out that some students were missing school because they refused to leave home without their phone.

    Adults were also sacrificing sleep or time with families so they could keep scrolling on their phones and tablets, the mayor said.

    More than 120 residents called and emailed local city authorities during a consultation period, according to Japanese news outlet Mainichi, with the majority (80%) not happy about the proposal. Some, however, showed support for the bill.

    The proposal suggests that primary school students should stop using devices by 21:00 while older students and adults should stop by 22:00.

    Many took to social media to air their grievances about the proposal, with one user saying you “cannot even read a book or watch a movie” in two hours, according to the Japan Times.

    Continue Reading

  • Macron gives ‘full support’ to embattled PM as crisis looms in France

    Macron gives ‘full support’ to embattled PM as crisis looms in France


    PARIS:

    President Emmanuel Macron on Wednesday gave his “full support” to France’s embattled prime minister, who has called a confidence vote that could see his government collapse next month.

    Prime Minister Francois Bayrou said he would request the confidence vote in a bitterly divided parliament on September 8, as he tries to garner enough support for his plan to slash spending.

    But the main opposition parties said they would not back the prime minister’s plan, with the far right urging Macron to call new parliamentary elections and the hard left saying the president himself must go.

    Macron, now on his sixth prime minister since taking office in 2017, chaired a meeting of his cabinet on Wednesday.

    The president has given his “full support” to Bayrou’s initiative, spokeswoman Sophie Primas said after the meeting.

    Macron also called on France’s political parties “to act responsibly”, Primas added.

    “The French president said — and I’ll use his exact words — that there is neither denial of reality nor exaggeration of France’s financial situation,” the spokeswoman said.

    “France is a solid country, with economic resilience and significant financial capacity.”

    Bayrou has vowed to “fight like a dog” to stay in power and is expected to discuss the vote of confidence on television on Wednesday evening.

    Macron is weighing his options as he seeks to contain the looming political crisis.

    If the government falls, he could appoint a new prime minister, dissolve parliament again or resign.

    Macron gambled on snap polls last summer in a bid to head off the far-right and bolster his authority, but the move backfired and left a deadlocked parliament.

    Continue Reading

  • Study concludes that heart attacks “may be an infectious disease”

    Study concludes that heart attacks “may be an infectious disease”

    Most people hear “heart attack” and think of clogged arteries packed with fat and cholesterol. That picture is mostly right, but it may be missing a a key component. According to new research, common mouth bacteria that usually stay in their lane may drift into the bloodstream and trigger heart attacks.

    The study suggests that mouth microbes don’t just float through the bloodstream and disappear, as has always been understood to be the case.


    They may take up residence inside arterial plaque and help spark the kind of inflammation that makes a weak spot crack. That is the sort of crack that can set off a clot and cut off blood flow to the heart.

    Bacteria and heart artery plaques

    Plaques form inside blood vessels over time. They are made of fats, cholesterol, immune cells, and scar-like tissue. Many sit there without causing trouble.

    The risk rises when the thin outer layer – the fibrous cap – breaks. Once that cover fails, the plaque’s contents meet the bloodstream; a clot can form, and a heart attack can follow.

    This study focused on whether bacteria from the mouth, especially a group called viridans streptococci, could be tucked into those plaques.

    The central question was: were bacteria hiding out and then helping to drive inflammation right where it hurts most?

    How the study was done

    Researchers analyzed artery plaques from two sources: people who died suddenly and patients having surgery to clear clogged neck arteries.

    They did not rely on one test. They used DNA methods to detect bacterial genetic traces, special stains to locate bacteria in tissue, and gene activity analyses to see which immune pathways were active.

    They also tested how different bacterial components trigger early warning signals in immune cells.

    Pattern recognition receptors – the body’s “burglar alarms” – were a key focus, including a pathway called TLR2 that is well known for spotting bacterial signatures.

    Biofilm bacteria and the heart

    Inside the deeper parts of many plaques, the team found signs that viridans streptococci were living together as a biofilm.

    A biofilm is a community of bacteria embedded in a protective matrix that helps them stick to a surface and shield themselves from stress.

    In those plaque cores, immune cells called macrophages did not appear to react to the biofilm. In other words, the bacteria appeared tucked away where the body’s defenses were not mounting a response.

    When bacteria break bad

    The picture changed at the edges of plaques that were cracked or appeared unstable. There, the researchers saw scattered bacteria that appeared to have broken free from the hidden biofilm.

    That shift coincided with activation of immune alarms. Pattern recognition receptors lit up – especially through TLR2 – a classic “we found bacteria” signal.

    The alarm did not just activate the rapid innate immune response; it also drew in the slower, more targeted adaptive immune system.

    “Bacterial involvement in coronary artery disease has long been suspected, but direct and convincing evidence has been lacking,” explained Professor Pekka Karhunen, lead author of this research.

    “Our study demonstrated the presence of genetic material – DNA – from several oral bacteria inside atherosclerotic plaques.”

    Heart disease and bacteria signals

    Samples that tested positive for viridans streptococci tended to come from plaques that were more advanced and complicated.

    In the autopsy series, bacterial signals lined up with deaths due to coronary heart disease and heart attacks.

    That association does not prove the bacteria caused the deaths, but it strengthens the idea that they may play a role in a dangerous chain of events.

    Daily life implications

    Oral health has long been linked with heart health in population studies. Everyday activities like brushing or chewing can push mouth bacteria into the bloodstream, especially when gums are inflamed.

    The new findings point to a path where certain mouth bacteria might colonize plaques, lie low in biofilms, and then shed pieces that trigger inflammation right where the plaque is fragile.

    This is not a call for antibiotics to prevent heart attacks. It does not turn brushing into a magic shield against heart disease.

    Cholesterol levels, high blood pressure, smoking, diabetes, and family history still carry a lot of weight.

    The study suggests bacteria – especially in biofilm form – may be another player that nudges risky plaques toward rupture.

    More questions need answers

    To sum it all up, this surprising, peer-reviewed study links oral bacteria within arterial plaques to inflammation associated with plaque rupture, highlighting a plausible mouth-heart connection.

    The next steps include testing whether targeting biofilms, improving oral health, or dialing down specific immune alarms could make plaques more stable.

    Researchers will also need to sort out cause versus correlation and identify which bacterial features matter most inside human arteries.

    What you should do

    In the meantime, continue to follow the basic guidelines urged by the American Heart Association.

    Keep LDL cholesterol in check. Do not smoke or vape. Move your body most days. Sleep well. Eat in a way that supports cardiovascular health.

    Keep up with dental basics also – regular brushing, flossing, and routine checkups reduce the chances that mouth bacteria slip into your blood.

    None of these habits are cure-alls on their own, but together they lower risk.

    The full study was published in the Journal of the American Heart Association.

    —–

    Like what you read? Subscribe to our newsletter for engaging articles, exclusive content, and the latest updates.

    Check us out on EarthSnap, a free app brought to you by Eric Ralls and Earth.com.

    —–

    Continue Reading

  • Threat Spotlight: How Attackers Poison AI Tools and Defences

    Barracuda has reported on how generative AI is being used to create and distribute spam emails and craft highly persuasive phishing attacks. These threats continue to evolve and escalate – but they are not the only ways in which attackers leverage AI. Security researchers are now seeing threat actors manipulate companies’ AI tools and tamper with their AI security features to steal and compromise information and weaken a target’s defences. 

    AI assistants and the Large Language Models (LLMs) that support their functionality are vulnerable to abuse.

    Barracuda’s threat analysts have found attacks where malicious prompts are hidden inside benign looking emails. This malicious payload is designed to manipulate the behaviour of the target’s AI information assistants.

    For example, a recently reported – and fixed – vulnerability in Microsoft 365’s AI assistant, Copilot, could allow anyone to extract information from a network without authorisation. Threat actors can exploit to collect and exfiltrate sensitive information from a target.

    They do this by leveraging the ability of internal AI assistants to look for and collate contextual data from internal emails, messages and documents when answering queries or completing tasks.

    • First, the attackers send one or more employees a seemingly harmless email containing a concealed and embedded malicious prompt payload.
    • This email needs no interaction from the user and lives benignly in their inbox.
    • When the employee asks the AI assistant for help with a task or query, the assistant scans look through older emails, files and data to provide context for its response. As a result, the AI assistant unwittingly infects itself with the malicious prompt.
    • The malicious prompt could then ask the AI assistant to silently exfiltrate sensitive information, to execute malicious commands or to alter data.

    Weaponised emails also try to manipulate AI assistants by corrupting their underlying memory or data retrieval logic. These include emails with exploits targeting vulnerabilities in RAG (Retrieval-Augmented Generation) deployments. RAG is a technique that enables the LLMs to retrieve and incorporate new information beyond their training model.

    Such attacks can lead to AI assistants making incorrect decisions, providing false information, or performing unintended actions based on corrupted data. 

    Tampering with AI-based protection

    Attackers are also learning how to manipulate the AI components of defensive technologies.

    Email security platforms are being enhanced with AI-powered features that make them easier to use and more efficient. These include features such as auto-replies, ‘smart’ forwarding, auto-triage to remove spam, automated ticket creation for issues, and more. This is expanding the potential attack surface that threat actors can target.

    If an attacker successfully manipulates these security features, they could:

    • Manipulate intelligent email security tools to autoreply with sensitive data.
    • Abuse AI security features to escalate helpdesk tickets without verification. This could lead to unauthorised access to systems or data, as attackers could exploit the escalated privileges to perform malicious activities. 
    • Trigger workflow automation based on a malicious prompt. This could lead to the execution of harmful actions, such as deploying malware, altering critical data, or disrupting business operations. 

    Casting doubt on reality

    Identity confusion and spoofing

    When AI systems operate with high levels of autonomy, they can be tricked into either impersonating users or trusting impersonators. This can lead to:

    • ‘Confused Deputy’ attacks: This involves an AI agent with higher privileges performing unauthorised tasks on behalf of a lower-privileged user (such as an attacker.)
    • Spoofed API access: This involves existing AI-based integrations with Microsoft 365 or Gmail, for example, being manipulated to leak sensitive data or send fraudulent emails.
    Cascading hallucinations: trusting the untrue

    As mentioned above, email attacks targeting AI assistants can try to manipulate the assistant’s functionality. This could lead the assistant to summarise a user’s inbox, generate reports, and set the calendar – but based on false or manipulated data.

    In such cases, a single poisoned email could:

    • Mislead task prioritisation. For example, send “urgent” emails from fake executives.
    • Skew summaries and recommendations.
    • Influence critical business decisions based on hallucinations.

    How email defenses need to adapt

    Legacy email gateways, traditional email authentication protocols such as SPF or DKIM  and standard IP blacklists are no longer enough to defend against these threats.  Organisations need an email security platform that is generative-AI resilient. This platform should include:

    • LLM-aware filtering: Able to understand email context (topic, target, type etc.), tone and behavioural patterns in addition to the email content.
    • Contextual memory validation: This helps to sanitise what AI-based filters learn over time and can prevent long-term manipulation.
    • Toolchain isolation: AI assistants need to operate in sandboxes, with measures in place to block any unverified action based on a received email prompt.
    • Scoped identity management: This involves using minimal-privilege tokens and enforcing identity boundaries for AI integrations.
    • Zero trust AI execution: Just because an email claims to be “from the CEO” doesn’t mean the AI should automatically act on it. Tools should be set to verify everything before execution.

    The future of email security is ‘agent-aware’

    The AI tools being used within organisations are increasing built on ‘agentic’ AI. These are AI systems capable of independent decision-making and autonomous behavior. These systems can reason, plan and perform actions, adapting in real time to achieve specific goals.

    This powerful capability can be manipulated by attackers and security measures must shift from passive filtering to proactive threat modelling for AI agents.

    Email is a great example. Email is becoming an AI-augmented workspace, but it remains one of the top attack vectors. Security strategies need to stop seeing email as a channel. Instead, they need to approach it as an execution environment requiring zero trust principles and constant AI-aware validation.

    How Barracuda email protection helps defend against AI attacks

    Barracuda’s integrated cybersecurity platform is purpose-built to meet the dual challenge of AI-based attacks and attacks targeting AI components.

    Our email protection suite combines intelligent detection, adaptive automation, and human-centric design to help customers outpace AI-powered threats.

    This includes:

    • Advanced AI-based detection: Barracuda uses behavioural AI and NLP to spot social engineering even without obvious malware or links. It catches impersonation, business email compromise (BEC), and tone-shift anomalies that traditional filters miss.
    • Defense in depth: Barracuda covers every stage of the kill chain from phishing prevention to account takeover detection and automated incident response, closing the gaps that attackers exploit.
    • Real time threat intelligence: With data from a global detection network, Barracuda rapidly adapts to evolving threats like prompt injection, RAG poisoning, and AI hallucination abuse.
    • User training and awareness: Technology alone isn’t enough. Barracuda empowers employees to recognise AI-powered phishing through ongoing awareness training because trust is the new vulnerability.

     

    Continue Reading

  • Doctor explains ‘silent acid reflux’: No heartburn, but has serious and damaging effects including tooth sensitivity

    Doctor explains ‘silent acid reflux’: No heartburn, but has serious and damaging effects including tooth sensitivity

    Most people hear “acid reflux” and immediately think about that fiery heartburn creeping up the chest after a pizza or a big plate of spicy food. But here’s the thing. Not all reflux shows up with that classic burning feeling. In fact, a type called silent reflux, or laryngopharyngeal reflux (LPR), creeps in without the obvious warning signs. That’s what makes it so tricky.

    What is silent acid reflux?

    According to Cleveland Clinic, with silent reflux, stomach acid doesn’t just come up and burn the esophagus in the way we normally picture. Instead, the acid makes its way into the throat, voice box, or even the airways. And because the lining in those areas is way more sensitive than the esophagus, even a small amount of acid can cause damage. But the kicker is that you might not feel the typical heartburn at all. Instead, people may notice things like a chronic sore throat, hoarseness, constant throat clearing, or even a nagging cough that just will not go away. Some folks complain of a lump-in-the-throat sensation or find themselves losing their voice more easily than before. Others might deal with unexplained breathing problems that can be confusing for months before anyone figures out silent reflux is behind it.

    The lack of obvious heartburn is part of what makes this condition dangerous

    You could have acid irritating your tissues for years and not realize it. Left untreated, silent reflux can cause serious complications. The vocal cords can get swollen and fragile, making it tough to speak comfortably. It can worsen asthma or lead to recurring respiratory infections. There is also worry that long-term exposure of the throat and esophagus to acid might increase risks of precancerous changes. In other words, it is not something to brush off.Recently, Dr. Joe Damiani – TMJ, Head & Neck Specialist, took to Instagram to highlight an unusual reason of tooth sensitivity and discussed about silent acid reflux. “Do you have sensitive teeth? One cause you might be surprised by his acid reflux… Even if you ‘ don’t have it’. You see there’s something called silent reflux, and it doesn’t feel like the traditional burning in the throat. Instead, there’s other signs that are very prominent what you may have never realized are coming from acid reflux,” he has posted. “You see the acid from reflux can damage enamel on teeth and that is what can be making them more sensitive of our time. So if you can prevent the reflux, you can protect the teeth and reduce tooth sensitivity. This is more of a root cause fix compared to just brushing your teeth with something that makes them feel less sensitive!,” he explains.

    Common symptoms of silent acid reflux are:

    Hoarseness in the voiceSore throat or lump in the throat all the timeSour taste in mouthBad breathPost nasal drip Fullness in ears

    How to manage silent acid reflux?

    Silent acid reflux is all about the small lifestyle tweaks that add up. Start by cutting back on trigger foods like chocolate, fried stuff, spicy eats, tomato products, citrus, and anything fatty. Try to eat smaller meals and don’t rush, chew slowly and give your food some time to settle before laying down. Waiting at least three hours after eating before hitting the sack is a big help, and popping a wedge or a couple of extra pillows under your head at night lets gravity keep the acid where it belongs. Losing weight, stopping smoking, and saying no to alcohol also make a big difference if any of those apply.For day-to-day relief, sipping water and herbal teas can soothe the throat. Some folks find that eating alkaline foods, like bananas, helps—or even a little aloe vera juice (after checking with a doctor). It’s all about finding what works for each person and sticking to the plan.


    Continue Reading