Think Forward.

You Graduated and Don’t Know What to Focus On for a PhD Position? 2212

I assume you’ve just earned your master’s degree. You might be feeling a bit lost. You’ve started applying for opportunities — Industry or Academia — but you’re still waiting for that interview opportunity. No one is answering your emails. I get it. You might be feeling frustrated, maybe even battling imposter syndrome. You’re thinking about enrolling in new courses to acquire enough skills to be ready for any opportunity, but you still feel very lost. Let me tell you exactly what I would do if I were in your place three years ago. Please read this article until the end. You will enjoy it, and I made it especially for you as a source of motivation, giving you exactly what you should focus on. Let’s assume first that you want to enroll in a good PhD program. Whenever I apply for an opportunity, I put myself in the interviewer’s shoes — in this case, your future supervisor. What does your future supervisor want from you? What’s your added value to their lab? Why should they recruit you? Your supervisor wants you to be the greatest version of yourself, wants to be proud of you, and wants your success to be their success as well. First, they want you to avoid distractions and focus on your PhD, producing great, interesting results, and discoveries that lead to high-quality publications. They want you to step out of your comfort zone, present at international conferences, bring added value to the lab, be a great representative, and never outshine them. Control your ego, be easygoing with the team — not a toxic presence — and remember, they don’t expect perfection, but they do expect you to do your best. I know you can be like that, but there are a few things you can do to make your application stand out. When writing emails to potential supervisors, have you read some of their most interesting, highly cited articles? Did you do some research beforehand and address specific points within your email? What did you accomplish during your master’s degree? Were you just an average student who passed exams, or did you do something exceptional that made you unique compared to most students? If yes, then mention it, talk about it, and sell it to your supervisor in your application. Show that you are unique. When writing an email, motivation letter, or research proposal, stop using templates or AI-generated content. Your supervisor is smarter than you think, and they will spot that because they’ve seen a ton of applications. They want originality; they want to know who you are and what you can do. Be original. You don’t have to make it perfect, just be yourself. I want you to create a unique application that will impress any professor who reads it. Make it stand out. Use your own creativity — you’ve graduated, which means your brain is still fresh, and you are smart. SHOW THEM THAT! Don’t apply for just one position — make different plans. You gotta be smart about it. Reach out to your previous professors, especially those whose work you found impressive, and gently ask them for a recommendation letter. Use your contacts, and take your time to make different plans, because this step is a big one toward your future goals. Be wise about it. This isn’t just about getting one position; it’s about setting up a foundation for your future. Different plans give you options, and options give you control over your path. Last but not least, if I were you, I would focus on reading a bunch of review papers in the field I’m interested in. Start doing the things your future supervisor would expect you to do in your first year: identify the scientific question that interests you, find your unique approach, and start working on answering it. It’s your mission to find the gap in your field and fill it. You can begin working on that right now, while also doing the things I mentioned above. I’m not going to dig into the details here because I’ve kept this article a bit general, but if you have any questions, feel free to ask them directly.
Anas Bedraoui

Anas Bedraoui

Anas Bedraoui is a PhD candidate at FMS, UM6P, Morocco. He is a member of the Early Career Advisory Group at eLife, Cambridge, UK. Anas is interested in writing about science, research, and psychology. He loves the BLUWR community.


13200

0

The Greek Magical Papyri 108

The Greek Magical Papyri (Latin: Papyri Graecae Magicae, abbreviated PGM) represent one of the most important and enigmatic bodies of esoteric literature from the ancient world. Comprising a collection of spells, rituals, hymns, and invocations compiled between the 2nd century BCE and the 5th century CE, these papyri offer an extraordinary glimpse into the syncretic spiritual practices of Greco-Roman Egypt. Preserved mainly on fragile scrolls and manuscripts written in Greek (with occasional Coptic, Demotic, and even Hebrew terms), the PGM bridge the realms of religion, folk magic, and mystery traditions. They are not only historical artifacts but also bear witness to a time when the boundaries between magic, religion, and science were fluid and deeply interconnected. The texts were discovered primarily in Egypt, particularly in the city of Thebes, and made their way to European collections during the 19th century. They were finally compiled and published in the early 20th century, most notably by Karl Preisendanz, and later translated into English by scholars such as Hans Dieter Betz. The rituals recorded in the PGM range from practical spells—such as those for healing, protection, love, and curse-breaking—to theurgic operations intended to invoke divine beings and achieve ecstatic union with the cosmos. One of the most distinctive features of the Greek Magical Papyri is their religious syncretism. The practitioner calls upon gods and spirits from various traditions: Greek deities like Hermes, Hekate, and Apollo appear alongside Egyptian gods such as Thoth and Isis, and even Jewish and Gnostic elements—like references to Iao (YHWH) or archons—are present. This reflects the religious pluralism of Hellenistic and Roman Egypt, where practitioners saw divine power not as confined to one pantheon, but as accessible through many forms, names, and languages. In this sense, the papyri reflect a universalist approach to the sacred, a distinctive characteristic of late antiquity’s mystery cults and Hermeticism. The goals of the rituals varied widely. Some texts focus on personal gain—attracting lovers, gaining favor from rulers, or acquiring wealth. Others describe elaborate invocations of daemons or spirits, often accompanied by complex visualizations, sacred names (called voces magicae), and symbolic gestures. One famous category of these rituals is the “Headless Rite”, an invocation of a cosmic spirit that transcends the gods themselves. The magician declares mastery over heaven and earth and seeks personal transformation and empowerment through divine contact. This ritual later influenced Western ceremonial magic, especially in the Hermetic Order of the Golden Dawn and Thelemic traditions. The PGM also contain magical alphabets, sigils, amulets, and magical words—often long, untranslatable sequences of syllables intended to carry vibrational power. These expressions may represent remnants of older oral traditions or attempts to imitate divine or non-human speech. The importance of divine names—often in long, hybrid strings—is central, reflecting the ancient belief that knowing the true name of a deity conferred control or communion with that entity. Rather than being fringe documents, the Greek Magical Papyri reveal that magic was integrated into daily life and spiritual aspiration in antiquity. Priests, philosophers, and laypersons alike sought access to divine power through these rites. Far from the later Christian demonization of magic, the practitioners of these texts viewed themselves as mystai—seekers of truth and harmony with the cosmos. In modern times, the PGM have become an essential source for scholars of religion, anthropology, and occultism. They offer direct insight into ancient ritual techniques, influencing contemporary esoteric traditions such as Hermeticism, Neopaganism, and Chaos Magic. Moreover, they have helped to reconstruct ancient mystery practices that had otherwise been lost to time. In conclusion, the Greek Magical Papyri stand as a testament to the richness, complexity, and spiritual depth of ancient magical traditions. They are not merely spells or superstitions, but part of a larger sacred worldview in which humanity, the gods, and the cosmos were intimately connected. In these texts, we hear the voices of ancient magicians calling out to the stars—not just for power, but for divine communion and wisdom.

Moroccan cybersecurity dangerously undermined by successive attacks 323

Since April 2025, Morocco has been facing a series of major cyberattacks claimed by a collective of hackers allegedly Algerian, named "JabaRoot DZ." These cyberattacks have targeted key economic and administrative institutions, notably the Ministry of Employment, the National Social Security Fund (CNSS), and more recently the Ministry of Justice, as well as platforms related to land registry and property conservation. What is clear, let’s say it outright, is that Algeria does not possess the technological power or expertise for such operations. It is highly likely that its services call upon "skills," notably from Eastern Europe, to attack the Kingdom’s interests in its ongoing global war against its "classic enemy." If this hypothesis proves true, the question would then be who else might have the hacked information and for what purpose. The first intrusion, which occurred in early April 2025, began with the hacking of the Ministry of Employment’s website and quickly extended to the CNSS database. This attack led to the leak of thousands of sensitive documents, exposing the personal information of nearly two million employees and the administrative data of about 500,000 Moroccan companies. Among the leaked data were pay slips detailing names, social security numbers, salaries, and sometimes identity card numbers of very important personalities and leaders of Royal Air Maroc, Attijariwafa Bank, Banque Centrale Populaire, and the Mohammed VI Investment Fund. Less than two months later, in June 2025, JabaRoot DZ claimed a new "large-scale" cyberattack against the National Agency for Land Conservation, Cadastre, and Cartography (ANCFCC). Although the ANCFCC denied any direct intrusion into its servers, it was revealed that the vulnerability originated from an electronic platform used by some notary offices for archiving land documents. The hackers claim to have obtained about 4 terabytes of data, including millions of land titles, contractual documents, copies of identity cards, passports, as well as banking documents and information concerning high-ranking officials and public figures. This leak led to the temporary shutdown of the platform by the ANCFCC for security reasons. The hackers justify these attacks as retaliation for alleged Moroccan hacking attempts against Algerian institutions, notably the Twitter account of the Algerian Press Agency (APS). They also threatened further actions in case of future attacks against Algerian interests. These events occur in the context of geopolitical tensions between Morocco and Algeria, exacerbated by recent developments related to the Sahara issue and regional rivalries; Morocco has been recording victory after victory at a rapid pace. Algeria, in its official and unofficial media, no longer hides and even implicitly claims responsibility for the hacking, ignoring that this amounts to a form of state terrorism. These cyberattacks have had serious consequences: they have eroded citizens’ trust in digital public services, increased the risks of identity theft and banking fraud, and damaged the reputation of the affected companies. The Moroccan government has condemned these acts as "criminal" and announced measures to strengthen cybersecurity while launching internal investigations. The series of attacks especially highlights major vulnerabilities in the cybersecurity of Moroccan institutions. The massive centralization of sensitive data on single platforms and the creation of junctions between multiple actors and platforms facilitate things for citizens and institutions in the context of digitalization, but also make it easier for hackers to gain massive access in case of a breach. It is therefore crucial to thoroughly and promptly review the national data protection strategy. To better distribute its data and strengthen its security, Morocco could adopt several complementary strategies, relying notably on the 2030 National Cybersecurity Strategy and international best practices. It should likely avoid excessive centralization by distributing sensitive data across multiple secure systems, segment networks to limit lateral movements by hackers, and use data transmission techniques through several distinct channels to reduce the risk of simultaneous theft. Morocco must also integrate decentralized cybersecurity solutions based on blockchain and collective intelligence, establish a national sovereign cloud with local hosting and end-to-end encryption guaranteeing the protection of critical information. Moreover, the country should develop an agile and adapted legal framework, build a national pool of qualified cybersecurity professionals through specialized curricula and certifications, and establish a high-performance Security Operations Center combining advanced detection tools and local teams capable of managing threats specific to the Moroccan context. A higher cybersecurity school, where carefully selected students—true specialists—would be trained, could be a major strategic advance guaranteeing both competence and independence in this field. Faced with rising cyber threats, it is urgent for Morocco to adopt a proactive and innovative cybersecurity policy based on a decentralized technical architecture. Strengthening regional and international cooperation is not a luxury here. The real-time exchange of critical information is crucial; as is encouraging public-private collaboration through threat intelligence-sharing platforms to anticipate and respond quickly to incidents. Today, it is clear that many claim to master the issue, offering services that will soon expose their limits and incompetence. Administrations and companies must be very cautious before engaging or hiring skills in this very sensitive domain. This sphere relies on agile governance, the development of human skills, and active cooperation at national and international levels. An integrated approach is essential to build a resilient, sovereign cyberspace capable of supporting the country’s ambitious digital transformation while effectively protecting its security, institutions, citizens, and economy.