IETF 125 Shenzhen

Information about the IETF 125 Shenzhen meeting on 14-20 March 2026.

IETF
🚹 Oh no, folks! The mighty #Cloudflare has decided that #archive.today is now a sinister villain in the world of #botnets. đŸ˜± But don't worry, they have the ultimate security measure: enabling #JavaScript and cookies! đŸȘ Because we all know that's impenetrable, right? đŸ€Ł
https://radar.cloudflare.com/domains/domain/archive.today #today #cookies #HackerNews #ngated
archive.today Domain Information | Cloudflare Radar

Detailed information for archive.today: IP addresses, ASN, rank, security details, WHOIS, popularity insights, TLS certificates and recent scans.

"The collection of millions of hacked computers known as Aisuru and Kimwolf have been used to launch some of the biggest distributed denial-of-service (DDoS) attacks ever seen. Now United States law enforcement agencies have wiped both of them off the internet, along with two of the other hordes of hijacked computers—known as botnets—in a single broad takedown.

On Thursday, the US Department of Justice, working with the cybercrime-fighting agency within the US Department of Defense known as the Defense Criminal Investigative Service, announced that it had dismantled four massive botnets in a single operation, removing the command-and-control servers used to commandeer the hacker-run armies of compromised devices known by the names JackSkid, Mossad, Aisuru, and Kimwolf. Together, operators of the four botnets had amassed more than 3 million devices, the Justice Department said, and often sold access to those devices to other criminal hackers as well as using them to target victims with overwhelming floods of attack traffic to knock websites and internet services offline.

Aisuru and Kimwolf, a distinct but Aisuru-related botnet, had together comprised more than a million devices, according to DDoS defense firm Cloudflare, with Aisuru infecting a variety of devices ranging from DVRs to network appliances to webcams, and its Kimwolf offshoot infecting Android devices including smart TVs and set-top boxes."

https://www.wired.com/story/us-takes-down-botnets-used-in-record-breaking-cyberattacks/

#CyberSecurity #Botnets #DDoS #Aisuru #Kimwolf

US Takes Down Botnets Used in Record-Breaking Cyberattacks

The Aisuru, Kimwolf, JackSkid, and Mossad botnets had infected more than 3 million devices in total, many inside home networks, according to the US Justice Department.

WIRED

US Dismantles Four Major Botnets Behind Massive DDoS Attacks

📰 Original title: US Takes Down Botnets Used in Record-Breaking Cyberattacks

đŸ€– IA: It's not clickbait ✅
đŸ‘„ Usuarios: It's not clickbait ✅

View full AI summary: https://killbait.com/en/us-dismantles-four-major-botnets-behind-massive-ddos-attacks/?redirpost=98298992-f264-465c-96b2-bc7f94018e12

#cybersecurity #botnets #cyberattacks #ddos

US Dismantles Four Major Botnets Behind Massive DDoS Attacks

The United States Department of Justice (DOJ), in collaboration with the Defense Criminal Investigative Service and international partners from Canada and Germany, has dismantled four of the world’s


KillBait Archive

US Takes Down #Botnets Used in Record-Breaking #Cyberattacks

The #Aisuru , #Kimwolf , #JackSkid , and #Mossad botnets had infected more than 3 million devices in total, many inside home networks, according to the US Justice Department.
#doj #privacy #security

https://www.wired.com/story/us-takes-down-botnets-used-in-record-breaking-cyberattacks/

US Takes Down Botnets Used in Record-Breaking Cyberattacks

The Aisuru, Kimwolf, JackSkid, and Mossad botnets had infected more than 3 million devices in total, many inside home networks, according to the US Justice Department.

WIRED

Feds Disrupt #IoT #Botnets Behind Huge #DDoS Attacks

#doj joined authorities in #Canada & #Germany in dismantling the online #infrastructure behind 4 highly disruptive botnets that compromised more than 3 million Internet of Things (IoT) devices, such as #routers & web #cameras. The feds say the 4 botnets — named #Aisuru , #Kimwolf , #JackSkid & #Mossad — are responsible for a series of recent record-smashing DDoS attacks capable of knocking nearly any target offline

https://krebsonsecurity.com/2026/03/feds-disrupt-iot-botnets-behind-huge-ddos-attacks/

Feds Disrupt IoT Botnets Behind Huge DDoS Attacks – Krebs on Security

US Shuts Down Four Botnets Responsible for Record-Breaking Cyberattacks

US, Canada and Germany dismantle Aisuru, Kimwolf, JackSkid and Mossad botnets that compromised 3 million IoT devices and launched record-breaking DDoS attacks.

The Daily Perspective
📱 VulnCheck 2026: 1% des CVE 2025 exploitĂ©es, React2Shell et la chaĂźne SharePoint « ToolShell » en tĂȘte
📝 Source: VulnCheck — Exploit Intelligence Report 2026.
📖 cyberveille : https://cyberveille.ch/posts/2026-03-09-vulncheck-2026-1-des-cve-2025-exploitees-react2shell-et-la-chaine-sharepoint-toolshell-en-tete/
🌐 source : https://wwv.vulncheck.com/hubfs/Research/2026-VulnCheck-Exploit-Intelligence-Report.pdf
#Botnets #Microsoft_SharePoint #Cyberveille
VulnCheck 2026: 1% des CVE 2025 exploitĂ©es, React2Shell et la chaĂźne SharePoint « ToolShell » en tĂȘte

Source: VulnCheck — Exploit Intelligence Report 2026. Ce rapport rĂ©trospectif et chiffrĂ© dresse le panorama de l’exploitation des vulnĂ©rabilitĂ©s en 2025 (500+ sources, 2 douzaines d’indices VulnCheck), en priorisant l’exploitation in‑the‑wild, la maturitĂ© des exploits et le comportement des attaquants. Chiffres clĂ©s et tendances 48 174 CVE publiĂ©es en 2025 (83% avec identifiant 2025) ; ~1% exploitĂ©es in‑the‑wild Ă  fin 2025. 14 400+ exploits pour des CVE 2025 (+16,5% YoY), mais >98% restent des PoC non weaponized ; 417 exploits weaponized (majoritairement privĂ©s/commerciaux). 884 vulnĂ©rabilitĂ©s ajoutĂ©es au VulnCheck KEV en 2025 (47,7% avec identifiant 2025) ; 28,96% exploitĂ©es le jour de la publication CVE ou avant. Ransomware: 39 CVE 2025 attribuĂ©es, 56,4% dĂ©couvertes via exploitation zero‑day ; 1/3 sans exploit public/commercial au 01/2026. MontĂ©e du bruit IA: prolifĂ©ration de faux/faux‑positifs PoC gĂ©nĂ©rĂ©s par IA, contaminant l’écosystĂšme (ex: premiers PoC React2Shell non fonctionnels largement relayĂ©s). VulnĂ©rabilitĂ©s phares 2025

CyberVeille
14,000 routers are infected by malware that's highly resistant to takedowns https://arstechni.ca/hwAw #distributedhashtables #Security #botnets #malware #routers #Biz&IT #Tech #ASUS
14,000 routers are infected by malware that's highly resistant to takedowns

Most of the devices are made by Asus and are located in the US.

Ars Technica