diff --git a/content/this-month/2025-01/index.md b/content/this-month/2025-01/index.md
new file mode 100644
index 00000000..33cd65d8
--- /dev/null
+++ b/content/this-month/2025-01/index.md
@@ -0,0 +1,218 @@
++++
+title = "This Month in Rust OSDev: January 2025"
+date = 2025-02-04
+
+[extra]
+month = "January 2025"
+editors = ["phil-opp"]
++++
+
+Welcome to a new issue of _"This Month in Rust OSDev"_. In these posts, we give a regular overview of notable changes in the Rust operating system development ecosystem.
+
+
+
+This series is openly developed [on GitHub](https://github.com/rust-osdev/homepage/). Feel free to open pull requests there with content you would like to see in the next issue. If you find some issues on this page, please report them by [creating an issue](https://github.com/rust-osdev/homepage/issues/new) or using our _comment form_ at the bottom of this page.
+
+
+
+## Announcements, News, and Blog Posts
+
+Here we collect news, blog posts, etc. related to OS development in Rust.
+
+
+
+- Podcast: [Rust in Production: Volvo Ships Memory-Safe ECUs in Production Cars](https://www.reddit.com/r/rust/comments/1i88zmb/rust_in_production_volvo_ships_memorysafe_ecus_in/)
+- [The VEKOS operating system is now able to execute programs](https://www.reddit.com/r/rust/comments/1ieetqt/the_vekos_operating_system_is_now_able_to_execute/)
+- Video: [Windows Kernel Programming with Rust - Matthias Heiden | EuroRust 2024](https://www.youtube.com/watch?v=NfBXDEgm6VY)
+- [Understanding the Microsoft Pluton security processor](https://techcommunity.microsoft.com/blog/windows-itpro-blog/understanding-the-microsoft-pluton-security-processor/4370413) (uses Rust and [TockOS](https://tockos.org/))
+- Linux: [Resistance to Rust abstractions for DMA mapping](https://lwn.net/SubscriberLink/1006805/f75d238e25728afe/)
+
+## Infrastructure and Tooling
+
+In this section, we collect recent updates to `rustc`, `cargo`, and other tooling that are relevant to Rust OS development.
+
+- [Insert null checks for pointer dereferences when debug assertions are enabled](https://github.com/rust-lang/rust/pull/134424)
+- [Make missing_abi lint warn-by-default](https://github.com/rust-lang/rust/pull/132397)
+- [show linker output even if the linker succeeds](https://github.com/rust-lang/rust/pull/119286)
+
+
+
+
+## `rust-osdev` Projects
+
+In this section, we give an overview of notable changes to the projects hosted under the [`rust-osdev`](https://github.com/rust-osdev/about) organization.
+
+
+
+### [`uefi-rs`](https://github.com/rust-osdev/uefi-rs)
+Maintained by [@GabrielMajeri](https://github.com/GabrielMajeri), [@nicholasbishop](https://github.com/nicholasbishop), and [@phip1611](https://github.com/phip1611)
+
+`uefi` makes it easy to develop Rust software that leverages safe, convenient,
+and performant abstractions for UEFI functionality.
+
+We merged the following PRs this month:
+
+- [uefi-raw: Add FirmwareVolume{,Block}2Protocol](https://github.com/rust-osdev/uefi-rs/pull/1503)
+- [uefi-raw: hii: Add Database Protocol](https://github.com/rust-osdev/uefi-rs/pull/1510)
+- [uefi-raw: Add ScsiIoProtocol](https://github.com/rust-osdev/uefi-rs/pull/1517)
+- [Add missing type/subtype checks to `TryFrom<&DevicePathNode>`](https://github.com/rust-osdev/uefi-rs/pull/1516)
+- [uefi-raw: Add common impls for http types](https://github.com/rust-osdev/uefi-rs/pull/1518)
+- [relicensing: Rewrite allocator, configuration table, and image unload PRs](https://github.com/rust-osdev/uefi-rs/pull/1523)
+- [relicensing: Rewrite set_timer PR](https://github.com/rust-osdev/uefi-rs/pull/1524)
+- [Fix memory leaks in DevicePathFromText](https://github.com/rust-osdev/uefi-rs/pull/1525)
+- [Add warning to custom memory types](https://github.com/rust-osdev/uefi-rs/pull/1526)
+- [test-runner: Clean up device path tests](https://github.com/rust-osdev/uefi-rs/pull/1527)
+
+
+
+
+
+
+
+Thanks to [@crawfxrd](https://github.com/crawfxrd) and [@hannahfluch](https://github.com/hannahfluch) for their contributions!
+
+
+### [`bootloader`](https://github.com/rust-osdev/bootloader)
+Maintained by [@phil-opp](https://github.com/phil-opp) and [@Freax13](https://github.com/orgs/rust-osdev/people/Freax13)
+
+The `bootloader` crate implements a custom Rust-based bootloader for easy loading of 64-bit ELF executables. This month, we merged the following improvements:
+
+- [use threads instead of futures in build.rs](https://github.com/rust-osdev/bootloader/pull/484)
+- [Move test kernels to a separate workspace](https://github.com/rust-osdev/bootloader/pull/486)
+- [fix condition for running bootloader common tests](https://github.com/rust-osdev/bootloader/pull/487)
+
+### [`x86_64`](https://github.com/rust-osdev/x86_64)
+Maintained by [@phil-opp](https://github.com/phil-opp), [@josephlr](https://github.com/orgs/rust-osdev/people/josephlr), and [@Freax13](https://github.com/orgs/rust-osdev/people/Freax13)
+
+The `x86_64` crate provides various abstractions for `x86_64` systems, including wrappers for CPU instructions, access to processor-specific registers, and abstraction types for architecture-specific structures such as page tables and descriptor tables.
+
+We merged the following PRs this month:
+
+- [fix warnings & remove broken CI job](https://github.com/rust-osdev/x86_64/pull/530)
+- [Add page attribute table support](https://github.com/rust-osdev/x86_64/pull/529)
+- [use default python again](https://github.com/rust-osdev/x86_64/pull/533)
+- [feat(msr): add IA32_APIC_BASE support](https://github.com/rust-osdev/x86_64/pull/532)
+
+Thanks to [@hannahfluch](https://github.com/hannahfluch) and [@adavis628](https://github.com/adavis628) for their contributions!
+
+
+### [`acpi`](https://github.com/rust-osdev/acpi)
+Maintained by [@IsaacWoods](https://github.com/IsaacWoods)
+
+The `acpi` repository contains crates for parsing the ACPI tables – data structures that the firmware of modern computers use to relay information about the hardware to the OS. We merged the following changes this month:
+
+- [acpi: Remove Clone Copy traits for MADT](https://github.com/rust-osdev/acpi/pull/238)
+- [acpi: Clone impl for PlatformInfo and ManagedSlice](https://github.com/rust-osdev/acpi/pull/239)
+- [aml: fix clippy warnings and run clippy in CI](https://github.com/rust-osdev/acpi/pull/237)
+- [Fix unsoundness in our representation of the MADT](https://github.com/rust-osdev/acpi/pull/223)
+
+Thanks to [@IsaacWoods](https://github.com/IsaacWoods), [@mrjbom](https://github.com/mrjbom), and [@00xc](https://github.com/00xc) for their contributions!
+
+
+### [`multiboot2`](https://github.com/rust-osdev/multiboot2)
+Maintained by [@phip1611](https://github.com/phip1611)
+
+_Convenient and safe parsing of Multiboot2 Boot Information (MBI) structures and
+the contained information tags. Usable in no_std environments, such as a kernel.
+An optional builder feature also allows the construction of the corresponding
+structures._
+
+We merged the following PRs this month:
+
+- [fix: typos](https://github.com/rust-osdev/multiboot2/pull/253)
+- [misc improvements](https://github.com/rust-osdev/multiboot2/pull/254)
+
+
+
+## Other Projects
+
+In this section, we describe updates to Rust OS projects that are not directly related to the `rust-osdev` organization. Feel free to [create a pull request](https://github.com/rust-osdev/homepage/pulls) with the updates of your OS project for the next post.
+
+
+
+### [`roeeshoshani/genesis`](https://github.com/roeeshoshani/genesis)
+(Section written by [@roeeshoshani](https://github.com/roeeshoshani))
+
+`genesis` is a bare metal firmware implementation for mips. it implements everything from the bottom up, from
+initializing the cpu caches, to configuring pci devices and the interrupt controller.
+
+this month, the core async executor was implemented.
+
+this means that we can implement blocking operations (for example reading a byte from the UART) as rust futures, and we then
+`.await` them.
+
+this makes our lives much easier when writing code that needs to block until some I/O events happen. instead of using callbacks,
+and having to pass our state all over the place, we can just `.await` the blocking future, and write our code using async functions,
+which is much more ergonomic.
+
+##### example
+
+currently, there is only one blocking operation implemented, the operation of reading a byte from the UART.
+
+this allows code like the following to be written:
+```rust
+loop {
+ let byte = uart_read_byte().await;
+ println!("received uart byte: {}", byte);
+}
+```
+
+which is a huge improvement over the previous implementation of putting the code inside the UART interrupt handler.
+
+##### how does it work?
+
+the way this works is that the core kernel's main loop looks roughly like the following:
+```rust
+loop {
+ poll_tasks();
+ wait_for_interrupt();
+}
+```
+
+then, the interrupt handler is responsible for waking up the relevant tasks.
+
+futures that need interrupt handlers to wake them up should somehow register themselves, and the interrupt hanlers will then
+wake the registered tasks.
+
+then, in the next iteration, the tasks that were woken up will be polled again, which completes the loop.
+
+
+## Join Us?
+
+Are you interested in Rust-based operating system development? Our `rust-osdev` organization is always open to new members and new projects. Just let us know if you want to join! A good way for getting in touch is our [Zulip chat](https://rust-osdev.zulipchat.com).