The SHA-2 family of hash functions lies at the core of securing the internet today.
A recent paper by Yingxin Li, Fukang Liu, and Gaoli Wang presents new records in collision attacks for SHA-2.
For the brave, the paper can be found at: https://eprint.iacr.org/2024/349