Results 71 to 80 of about 318,491 (290)
We investigated the toxicity of 12 active compounds commonly found in herbal weight loss supplements (WLS) using human liver and colon cell models. Epigallocatechin‐3‐gallate was the only compound showing significant toxicity. Metabolic profiling revealed protein degradation, disrupted energy and lipid metabolism suggesting that the inclusion of EGCG ...
Emily C. Davies +3 more
wiley +1 more source
In the past decade, a growing number of cyberattacks have been reported, enabling unprecedented levels of personalization, automation, and deception. For instance, recent industry surveys have reported sharp increases in unique social engineering attacks
Kely Gonzaga +3 more
doaj +1 more source
dUTPases are involved in balancing the appropriate nucleotide pools. We showed that dUTPase is essential for normal development in zebrafish. The different zebrafish genomes contain several single‐nucleotide variations (SNPs) of the dut gene. One of the dUTPase variants displayed drastically lower protein stability and catalytic efficiency as compared ...
Viktória Perey‐Simon +6 more
wiley +1 more source
Dapagliflozin prevents methylglyoxal‐induced retinal cell death in ARPE‐19 cells
Diabetic macular oedema is a diabetes complication of the eye, which may lead to permanent blindness. ARPE‐19 are human retinal cells used to study retinal diseases and potential therapeutics. Methylglyoxal is a compound increased in uncontrolled diabetes due to elevated blood glucose.
Naina Trivedi +7 more
wiley +1 more source
Synthetic Social Engineering Scenario Generation Using LLMs for Awareness-Based Attack Resilience
Social engineering is found in a strong majority of cyberattacks today, as it is a powerful manipulation tactic that does not require the technical skills of hacking.
Jade Webb, Faranak Abri, Sayma Akther
doaj +1 more source
On the influence of topological characteristics on robustness of complex networks
In this paper, we explore the relationship between the topological characteristics of a complex network and its robustness to sustained targeted attacks.
Kasthurirathna, Dharshana +2 more
core +1 more source
Social Engineering Attacks in Cybersecurity
Abstract: In recent years, social engineering has become one of the most insidious forms of cyber attack, exploiting human vulnerabilities rather than technical flaws. This paper aims to dissect the landscape of social engineering attacks, especially in the context of recent developments during 2024 and 2025.
Dr. S. Gomathi Alias Rohini +2 more
openaire +1 more source
On the anatomy of social engineering attacks—A literature‐based dissection of successful attacks [PDF]
AbstractThe aim of this study was to explore the extent to which persuasion principles are used in successful social engineering attacks. Seventy‐four scenarios were extracted from 4 books on social engineering (written by social engineers) and analysed.
Bullée, Jan Willem Hendrik (author) +4 more
openaire +4 more sources
The inhibition of mitochondrial dihydroorotate dehydrogenase (DHODH) impairs syncytialization and induces cellular senescence via mitochondrial and endoplasmic reticulum stress in human trophoblast stem cells, elevating sFlt1/PlGF levels, a hallmark of placental dysfunction in hypertensive disorders of pregnancy.
Kanoko Yoshida +6 more
wiley +1 more source
Enzymes of the 2‐hydroxyacyl‐CoA lyase group catalyze the condensation of formyl‐CoA with aldehydes or ketones. Thus, by structural adaptation of active sites, practically any pharmaceutically and industrially important 2‐hydroxyacid could be biotechnologically synthesized. Combining crystal structure analysis, active site mutations and kinetic assays,
Michael Zahn +4 more
wiley +1 more source

