Tag: ddos
-
Recent Cyber Attacks and Threat Actor Activity: A Deep Dive into the Evolving Threat Landscape
Executive Overview Over the past week, global threat activity has highlighted a critical reality: modern cyber attacks are faster, more coordinated, and increasingly industrialized. From mass exploitation of web application vulnerabilities to ransomware-as-a-service operations and record-breaking volumetric DDoS attacks, adversaries continue to evolve both tactically and operationally. This article provides a deep analytical overview of…
-
DDoS Protection Faces Fresh Challenges As Bot Traffic Reaches New Peak
As automated attack networks grow larger and more sophisticated, security teams are struggling to keep pace with a surge in malicious bot activity that is reshaping the DDoS threat landscape In December 2025, Solana experienced one of the largest DDoS attacks in history, with traffic peaking at 6 Tbps. Although the attack continued over more…
-
La Poste Still Offline After Major DDoS Attack
French postal service warns of “major network incident” just before Christmas First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/la-poste-still-offline-after-major/
-
France’s postal and banking services disrupted by suspected DDoS attack
France’s postal service, La Poste, said it was hit by a disruptive cyberattack that knocked its services offline. First seen on techcrunch.com Jump to article: techcrunch.com/2025/12/23/frances-postal-and-banking-services-disrupted-by-suspected-ddos-attack/
-
DDoSHire und Künstliche Intelligenz in Cybercrime-Plattformen – Chatbots als Steuerungsebene für DDoSHire-Angriffe
First seen on security-insider.de Jump to article: www.security-insider.de/ki-ddos-for-hire-chatbots-angriffskoordination-a-ed10dcd6dc138172fc2a0c8b9c78025f/
-
DDoS incident disrupts France’s postal and banking services ahead of Christmas
France’s La Poste confirmed that a distributed denial-of-service (DDoS) attack was the source of problems with its websites and mobile applications. First seen on therecord.media Jump to article: therecord.media/la-poste-france-ddos-disruption-days-before-christmas
-
Massive Android botnet Kimwolf infects millions, strikes with DDoS
The Kimwolf Android botnet has infected 1.8M+ devices, launching massive DDoS attacks and boosting its C&C domain, says XLab. Kimwolf is a newly discovered Android botnet linked to the Aisuru botnet that has infected over 1.8 million devices and issued more than 1.7 billion DDoS attack commands, according to XLab. On October 24, 2025, XLab…
-
Kimwolf Botnet Hijacks 1.8 Million Android TVs, Launches Large-Scale DDoS Attacks
A new distributed denial-of-service (DDoS) botnet known as Kimwolf has enlisted a massive army of no less than 1.8 million infected devices comprising Android-based TVs, set-top boxes, and tablets, and may be associated with another botnet known as AISURU, according to findings from QiAnXin XLab.”Kimwolf is a botnet compiled using the NDK [Native Development Kit],”…
-
The Rise of Precision Botnets in DDoS
For a long time, DDoS attacks were easy to recognize. They were loud, messy, and built on raw throughput. Attackers controlled massive botnets and flooded targets until bandwidth or infrastructure collapsed. It was mostly a scale problem, not an engineering one. That era is ending. A quieter and far more refined threat has taken its……
-
Nation-State and Cybercrime Exploits Tied to React2Shell
Tags: china, cve, cybercrime, ddos, exploit, hacker, iran, korea, malware, north-korea, service, update, vulnerability2 More Vulnerabilities Need Patching in React Server Components, Warns Vercel. Mass exploitation of the React2Shell – CVE-2025-55182 – vulnerability remains underway by nation-state hackers tied to China, North Korea and Iran, as well as financially motivated cybercriminals running everything from cryptomining malware to DDoS services, security experts warn. First seen on govinfosecurity.com Jump to…
-
Gcore Radar Report 1. HJ 2025 Angriffe sind ein Stresstest für Plattformen
First seen on security-insider.de Jump to article: www.security-insider.de/ddos-strategiewechsel-gcore-radar-2025-a-bc741fe0c8c0557cd7efb982fbb52798/
-
Gcore Radar Report 1. HJ 2025 Angriffe sind ein Stresstest für Plattformen
First seen on security-insider.de Jump to article: www.security-insider.de/ddos-strategiewechsel-gcore-radar-2025-a-bc741fe0c8c0557cd7efb982fbb52798/
-
Broadside Mirai Botnet Hijacks Ship Cameras for DDoS
The Broadside Mirai variant exploits vulnerable maritime DVRs to gain stealthy access and threaten global shipping. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/broadside-mirai-botnet-hijacks-ship-cameras-for-ddos/
-
New Stealthy Linux Malware Merges Mirai-based DDoS Botnet with Fileless Cryptominer
Cybersecurity researchers uncover a sophisticated Linux campaign that blends legacy botnet capabilities with modern evasion techniques. A newly discovered Linux malware campaign is demonstrating the evolving sophistication of threat actors by combining Mirai-derived distributed denial-of-service (DDoS) functionality with a stealthy, fileless cryptocurrency mining operation. According to research from Cyble Research & Intelligence Labs (CRIL), the…
-
Suspicious traffic could be testing CDN evasion, says expert
“Cf-Warp-Tag-Id,” which is associated with Cloudflare’s Warp VPN service;”X-Fastly-Request-Id,”, which is associated with the Fastly CDN;”X-Akamai-Transformed,” a header added by Akamai;and a puzzler: “X-T0Ken-Inf0.” Ullrich thinks it might contain a form of authentication token, but isn’t sure.In an interview, he said one explanation is that a threat actor is trying to get around a CDN’s…
-
Suspicious traffic could be testing CDN evasion, says expert
“Cf-Warp-Tag-Id,” which is associated with Cloudflare’s Warp VPN service;”X-Fastly-Request-Id,”, which is associated with the Fastly CDN;”X-Akamai-Transformed,” a header added by Akamai;and a puzzler: “X-T0Ken-Inf0.” Ullrich thinks it might contain a form of authentication token, but isn’t sure.In an interview, he said one explanation is that a threat actor is trying to get around a CDN’s…
-
Why the record-breaking 30 Tbps DDoS attack should concern every business
A new warning about the threat posed by Distributed Denial of Service (DDoS) attacks should make you sit up and listen. First seen on fortra.com Jump to article: www.fortra.com/blog/why-record-breaking-30-tbps-ddos-attack-concern-business
-
DDoS attack volume rises in Q3, fueled by Aisuru botnet
A report by Cloudflare also shows a surge in attacks targeting AI companies. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/ddos-rises-q3-aisuru-botnet-record-attack/806922/
-
Russian scientist sentenced to 21 years on treason, cyber sabotage charges
Artyom Khoroshilov, a researcher at the Moscow Institute of General Physics, will spend more than 20 years in Russian prison on accusations that include treason for aid sent to Ukraine and sabotage related to a DDoS attack on the postal system. First seen on therecord.media Jump to article: therecord.media/russia-sentences-physicist-treason-ddos-attacks
-
Aisuru Botnet Shatters Records With 29.7 Tbps DDoS Attack
The Aisuru botnet’s massive DDoS assault marks a new era in which hyper-volumetric attacks are both accessible and harder to defend. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/aisuru-botnet-shatters-records-with-29-7-tbps-ddos-attack/
-
Cloudflare Blocks Aisuru Botnet Powered Largest Ever 29.7 Tbps DDoS Attack
Cloudflare’s Q3 2025 DDoS Threat Report reveals the Aisuru botnet launched a record 29.7 Tbps attack. Learn which sectors were the most targeted, and the key drivers behind the surge in attacks. First seen on hackread.com Jump to article: hackread.com/cloudflare-aisuru-botnet-ddos-attack/
-
Neuer DDoS-Rekord: Riesiges Botnetz attackiert mit beispielloser Datenflut
Das Aisuru-Botnetz wächst rasant und befeuert Onlinedienste mit immer größeren Datenfluten. Es hat abermals einen neuen DDoS-Rekord aufgestellt. First seen on golem.de Jump to article: www.golem.de/news/neuer-ddos-rekord-aisuru-botnetz-attackiert-mit-nie-dagewesenen-datenfluten-2512-202900.html
-
Neuer DDoS-Rekord: Riesiges Botnetz attackiert mit beispielloser Datenflut
Das Aisuru-Botnetz wächst rasant und befeuert Onlinedienste mit immer größeren Datenfluten. Es hat abermals einen neuen DDoS-Rekord aufgestellt. First seen on golem.de Jump to article: www.golem.de/news/neuer-ddos-rekord-aisuru-botnetz-attackiert-mit-nie-dagewesenen-datenfluten-2512-202900.html
-
Cloudflare mitigates record 29.7 Tbps DDoS attack by the AISURU botnet
Cloudflare blocked a record 29.7 Tbps DDoS attack from the AISURU botnet. The 69-second attack set a new high, though the target remains undisclosed. Cloudflare stopped a record 29.7 Tbps DDoS attack from the AISURU botnet, a 69-second barrage that set a new volume record. The cybersecurity firm did not disclose the name of the…
-
Neuer DDoS-Rekord: Aisuru-Botnetz attackiert mit nie dagewesenen Datenfluten
Das Aisuru-Botnetz wächst rasant und befeuert Onlinedienste mit immer größeren Datenfluten. Es hat abermals einen neuen DDoS-Rekord aufgestellt. First seen on golem.de Jump to article: www.golem.de/news/neuer-ddos-rekord-aisuru-botnetz-attackiert-mit-nie-dagewesenen-datenfluten-2512-202900.html
-
Aisuru-Botnet auf dem Vormarsch – KI-Unternehmen im Visier
DDoS-Angriffe haben auch im vergangenen Quartal rasant an Komplexität und Umfang zugenommen. Viele Unternehmen haben Schwierigkeiten, mit dieser sich ständig weiterentwickelnden Bedrohungslage Schritt zu halten. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/aisuru-botnet-auf-dem-vormarsch-ki-unternehmen-im-visier/a43062/
-
Record 29.7 Tbps DDoS Attack Linked to AISURU Botnet with up to 4 Million Infected Hosts
Cloudflare on Wednesday said it detected and mitigated the largest ever distributed denial-of-service (DDoS) attack that measured at 29.7 terabits per second (Tbps).The activity, the web infrastructure and security company said, originated from a DDoS botnet-for-hire known as AISURU, which has been linked to a number of hyper-volumetric DDoS attacks over the past year. The…
-
Greynoise IP Check: Neues Tool erkennt Botnetz-Aktivitäten am eigenen Anschluss
Das Tool stellt fest, ob der Internetanschluss des Nutzers möglicherweise für DDoS-Attacken oder andere Cybercrime-Aktivitäten missbraucht wird. First seen on golem.de Jump to article: www.golem.de/news/greynoise-ip-check-neues-tool-erkennt-botnetz-aktivitaeten-am-eigenen-anschluss-2512-202764.html

