Aisuru IoT Botnet Sets New Record With 29.7 Tbps Hyper‑Volumetric DDoS Attack

Man showing distress at a workstation with data displays in the background.

The Aisuru botnet has set a new benchmark for distributed denial-of-service (DDoS) attacks, delivering peak traffic of 29.7 Tbps in a single campaign, according to a recent Cloudflare report. Over just three months, Aisuru was linked to more than 1,300 DDoS attacks, confirming its status as one of the most powerful known IoT botnets currently … Read more

Android December 2025 Security Update: 107 Vulnerabilities Fixed and Two Zero‑Days Under Active Attack

Conference room showcasing an Android update announcement with a robot and professionals.

Google has released the December 2025 Android security update, addressing 107 vulnerabilities of varying severity across the mobile ecosystem. Two flaws, CVE-2025-48633 and CVE-2025-48572, stand out as zero‑day vulnerabilities already exploited in real‑world targeted attacks, making this update critical for both consumers and enterprises. Overview of the December 2025 Android Security Update The December bulletin, … Read more

India Mandates Sanchar Saathi on All Smartphones and Tightens SIM Rules for Messaging Apps

Silhouette of a person holding a phone displaying "Sanchar Saachi" against a dramatic sky.

India’s Ministry of Communications has ordered all smartphone manufacturers to preinstall the government’s Sanchar Saathi app on devices sold in the country, marking one of the most far‑reaching attempts to hard‑wire a state cybersecurity tool into the consumer mobile ecosystem. Vendors have 90 days to comply, and the requirement applies not only to new devices, … Read more

New Rust-Based IDFKA Backdoor Enables Stealthy Cyber-Espionage Against Telecom Operators

Close-up of a weathered metal tag with the inscription "IDFKA."

Analysts from Solar 4RAYS have documented a previously unknown backdoor, dubbed IDFKA, used in targeted cyber‑espionage campaigns against Russian telecommunications companies. The Rust-based malware remained undetected in the infrastructure of an IT contractor and its telecom customers for at least ten months, highlighting the growing sophistication of attacks on critical communications infrastructure. Discovery of IDFKA: … Read more

Windows LNK Vulnerability CVE-2025-9491: Silent Fix, Active Exploitation, and How to Defend

Stylized icon of a folder with blue windows and "LNK" text on a textured surface.

In mid‑2025, the security community learned that Microsoft had quietly changed how Windows handles LNK shortcut files, effectively cutting off one of the most actively abused attack vectors in the ecosystem: CVE-2025-9491. By that time, at least 11 threat groups — from North Korean state‑linked APTs to cybercrime gangs such as Evil Corp — had … Read more

Windows 11 KB5066835 Triggers Nvidia GeForce Gaming Slowdowns: What Gamers Need to Know

Cracked blue Windows logo with glowing fissures beside a GeForce driver card.

The October security update for Windows 11, identified as KB5066835, has led to unexpected performance degradation in games on some systems with Nvidia GeForce graphics cards. Nvidia has officially acknowledged the issue on Windows 11 builds 24H2 and 25H2 and has released a dedicated beta driver, GeForce Hotfix Display Driver version 581.94, as a temporary … Read more

Shai-Hulud 2.0: Massive npm Supply Chain Attack Exposes GitHub and Cloud Secrets

Frustrated man coding at a laptop surrounded by glowing screens with code.

The self-propagating worm Shai-Hulud has re-emerged in the npm ecosystem, rapidly escalating into one of the most significant software supply chain attacks to date. According to analysis by Wiz, within less than three days the campaign compromised tens of thousands of developers and their CI/CD infrastructures. Scale of the Shai-Hulud 2.0 npm Supply Chain Campaign … Read more

IACR Halts Helios E‑Voting Results After Cryptographic Key Loss: What Went Wrong

Man in a suit contemplates, holding a key beside a locked padlock.

The International Association for Cryptologic Research (IACR) has annulled the results of its annual elections after losing a critical component of the cryptographic key required to decrypt the final tally in the Helios electronic voting system. The incident highlights how even world‑class cryptographers can be undermined by weaknesses in cryptographic key management and operational procedures. … Read more

SSD Data Retention and Long-Term Storage: Risks, Limits, and Secure Backup Strategies

Massive fire erupting from a structure marked "SSD," surrounded by smoke and debris.

Solid-state drives (SSDs) have become the default choice for laptops and workstations thanks to their high performance, low latency, and energy efficiency. However, when the task shifts from day‑to‑day operations to long-term archival data storage, SSDs have fundamental limitations that are often underestimated and can lead to irreversible data loss. How SSDs and HDDs Differ … Read more

Australian Man Jailed for Evil Twin Airport Wi‑Fi Attack on Airline Passengers

Man in a futuristic setting monitoring security displays in a sleek environment.

An Australian court has sentenced a 44‑year‑old man to seven years and four months in prison for operating fake airport and in‑flight Wi‑Fi networks to steal passengers’ credentials and intimate data. The case highlights how Evil Twin Wi‑Fi attacks remain one of the most dangerous threats to travelers using public wireless networks. Large‑Scale Airport Wi‑Fi … Read more