US Justice Department Disrupts Massive IoT Botnets Behind Record-Breaking DDoS Attacks

Law enforcement officials and hackers dismantling IoT botnets in a high-tech setting.

The US Department of Justice (DoJ) has led a large‑scale operation to disrupt the command‑and‑control (C2) infrastructure of several major Internet of Things (IoT) botnets — AISURU, Kimwolf, JackSkid and Mossad. These Mirai‑based networks hijacked millions of vulnerable devices worldwide and were responsible for some of the most powerful distributed denial‑of‑service (DDoS) attacks ever observed. … Read more

Eight AWS Bedrock Attack Vectors: Securing Enterprise AI Beyond the Model

Dark, ominous depiction of hooded figures manipulating a glowing AWS-themed fortress.

AWS Bedrock is rapidly becoming a core foundation for enterprise AI applications, giving organizations managed access to foundation models and tight integration with corporate data and business systems. This same deep integration makes Bedrock a high‑value target: the platform effectively sits in the middle of identities, data stores and SaaS services. Recent research has outlined … Read more

Quest KACE SMA CVE-2025-32975: Critical Authentication Bypass Under Active Attack

Dark scene with hackers, a locked server, and ominous imagery of cyber threats.

Corporate networks are facing active exploitation of CVE-2025-32975, a critical authentication bypass vulnerability in the Quest KACE Systems Management Appliance (SMA), a popular platform for IT asset management and software deployment. According to telemetry from Arctic Wolf, malicious activity has been observed since the week of 9 March 2026, primarily against internet-exposed, unpatched KACE SMA … Read more

Apple Security Alert: Coruna and DarkSword Exploits Target Outdated iOS Devices

Aerial view of a tech campus with cybersecurity graphics overlaying the scene.

Apple has released a security warning for iPhone users who continue to run outdated versions of iOS. According to the company, attackers are actively exploiting browser vulnerabilities using powerful exploit kits known as Coruna and DarkSword, already leading to device compromise and theft of sensitive data. Why installing the latest iOS update is critical for … Read more

AI-Driven Financial Fraud: Interpol Warns of Industrialized Cybercrime

Aerial view of the Singapore skyline and an operator analyzing data in an office.

Artificial intelligence is rapidly transforming the economics of cybercrime. According to Interpol’s latest report on financial fraud, AI-enhanced operations generate on average 4.5 times more profit for criminals than traditional schemes. The organization estimates that global losses from financial fraud reached around USD 442 billion in 2025, with projected growth driven primarily by the scale-up … Read more

Global Takedown of Aisuru, Kimwolf, JackSkid and Mossad IoT DDoS Botnets

f518ae9f 987d 4d57 b7ff 4a5c7c70d27f

Law enforcement agencies in the United States, Germany and Canada have carried out a coordinated operation against four of the most powerful IoT botnets seen in recent years — Aisuru, Kimwolf, JackSkid and Mossad. Their command infrastructure, responsible for massive globally distributed DDoS attacks including strikes on parts of the US Department of Defense Information … Read more

CVE-2026-3888 in Ubuntu 24.04: snapd Vulnerability Enables Local Privilege Escalation

Urban scene with train, mountains, and a person near waste by water.

A new high-severity vulnerability, CVE-2026-3888, has been identified in Ubuntu Desktop 24.04 and newer, allowing a local, unprivileged attacker to escalate privileges to root. With a CVSS score of 7.8, the flaw impacts systems using default settings and is linked to how Ubuntu handles temporary directories and the isolation of snap applications. Overview of CVE-2026-3888 … Read more

Perseus Android Banking Trojan Targets Note‑Taking Apps to Steal Passwords and Seed Phrases

** Futuristic scene showing cyber security experts monitoring data on large smartphone screens.

A new Android banking trojan dubbed Perseus is setting a concerning precedent in mobile malware. According to research by ThreatFabric, the malware not only performs typical banking-trojan activities, but also systematically opens note‑taking applications on infected devices and scans them for passwords, crypto wallet seed phrases, and financial information. This behaviour directly exploits a widespread … Read more

DarkSword iOS Exploit Kit: Safari-Based Spyware Threat Puts Millions of iPhones at Risk

Phone split into dark cybersecurity threats and bright digital solutions.

Security researchers from Lookout, iVerify and Google’s Threat Intelligence Group (GTIG) have uncovered a new advanced iOS exploit kit dubbed DarkSword. This browser-based attack chain targets iPhones running vulnerable builds of iOS 18.4–18.7 and can grant attackers full device compromise after a single visit to a malicious or compromised website in Safari. DarkSword exploit kit: … Read more