Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
320x100 Itcentric
Crowdstriker 970×120

Author: Redazione RHC

Mistral AI Unveils Powerful Open Source Models for Advanced AI Applications

French company Mistral AI has unveiled its Mistral 3 line of models, making them fully open source under the Apache 2.0 license . The series includes several compact and dense models with 3, 8, and 14 billion parameters , as well as the flagship Mistral Large 3 model. This is a ” Mixture-of-Experts ” model with 41 billion active parameters and 675 billion shared parameters , which the company calls its most powerful solution to date. Mistral Large 3 was trained from scratch on approximately 3,000 NVIDIA H200 GPUs. After further training, the model achieved the level of the best open-source training

Maha Grass APT Group Unleashes StreamSpy Malware Attacks

The Patchwork cyber espionage group — also known as Hangover or Dropping Elephant and internally tracked by QiAnXin as APT-Q-36 — has been active since 2009 and is believed to be close to South Asia. Over the years, it has targeted government agencies, the military, research institutions, diplomacy, industry, and educational institutions in several Asian countries, conducting large-scale intelligence gathering operations. The QiAnXin Threat Intelligence Center has identified a new Trojan attributed to the Maha Grass organization, which uses a combination of WebSocket and HTTP protocols to communicate with command and control servers. The malware, dubbed StreamSpy , retrieves instructions via a

Digital Crime Among Teenagers: Temporary Involvement

Dutch authorities have published data showing that adolescents’ involvement in cybercrime is usually temporary. An analysis prepared by the House of Representatives indicates that early interest in hacking often fades by age 20, and only a few maintain a lasting interest. The report highlights that adolescents begin committing various types of crimes at roughly the same age . Cybercrime is no more common than gun or drug crime , and significantly less common than property crime. Furthermore, the path to their first attempts typically passes through game simulations that allow them to develop technical skills. According to data collected over the years,

Porsche Russia Alarm Issues Spark Widespread Vehicle Immobilization

Porsche owners in Russia are increasingly experiencing problems with factory alarms, making it impossible to use their cars. Their cars won’t start, stall immediately after starting, or display engine-related errors . Managers at the Rolf dealership told RBC that they’ve noticed an increase in service calls since November 28 due to the satellite alarms being blocked. According to the company’s customer service manager, Yulia Trushkova, there is currently no correlation between models and types of engines, and in theory, any vehicle can be immobilized. Currently, immobilization can be bypassed by resetting the factory alarm unit and removing it. The cause of the

Cryptomixer Shut Down: Europol Cracks Down on $1.3B Bitcoin Mixing Service

Law enforcement agencies in Switzerland and Germany have reported the dismantling of Cryptomixer , a major mixing service operating since 2016 that helped criminals launder illicitly obtained funds. According to Europol, the service has processed over €1.3 billion in Bitcoin (about $1.5 billion) in recent years. Operation Olympia took place in Zurich in late November. During the raids, which lasted from November 24 to 28, law enforcement agencies, with the support of Europol and Eurojust, seized three servers containing over 12 terabytes of data , blocked domains on the traditional internet and the Tor network, and confiscated €24 million (approximately $29 million)

ShadyPanda Malware Infects 4.3M Browsers with Chrome Edge Extensions

Researchers at Koi Security described a multi-stage operation called ShadyPanda . Over the course of seven years, attackers released seemingly useful extensions for Chrome and Edge, built up an audience with positive comments and reviews. They then released an update containing malicious code . Researchers estimate that the total number of installations reached a remarkable 4.3 million downloads . The scheme is simple and unpleasant: “legitimate” extensions accumulate ratings, reviews, and trust badges for years, only to receive an update that contains malware, extracts arbitrary JavaScript, and executes it with full access to the browser . The code is obfuscated and becomes

Phishing Attacks Surge in Black Friday Season: Stay Vigilant

This year, too, cybercriminals are taking advantage of seasonal shopping periods to spread phishing websites and fraudulent promotions, aiming to steal personal information and payment details . Gaming platforms remain a prime target throughout the year. In Spain, this trend is also reflected in the latest Cyber Security Report 2024 published by the National Institute for Cyber Security (INCIBE). Increase in fraud in the last 2 years According to this report, 2,122 cases related to fraudulent online stores were handled, in which users were redirected to websites imitating legitimate companies to steal personal or banking information. Additionally, the 017 cybersecurity helpline received

Human Washing Machine Launched: Japan’s Science Unveils Unique Device

Japanese company Science has launched a washing machine for humans. The 2.30-meter-long capsule bathes a person in 15 minutes and attracted considerable interest at the recently concluded Osaka Expo. The device is modeled after the human washing machine presented at the 1970 Expo, also held in Osaka. As reported by the Indian news site NDTV , the president of Science is said to have seen this capsule as a child, which apparently left a lasting impression on him. Users lie on a bed inside the capsule and are then covered in foam and a fine mist. During the wash, relaxing music and

Brazilian Systems Targeted in Sophisticated OAST Exploit Campaign

Security researchers have discovered a sophisticated exploit campaign that leverages a private out-of-band application security testing (OAST) service hosted on Google Cloud infrastructure. The campaign primarily targets systems in Brazil and exploits over 200 common vulnerabilities (CVEs). Attack method OAST endpoints typically help attackers verify the success of exploits for command execution, server-side request forgery (SSRF), and deserialization. Most attackers use publicly available OAST services such as toast.fun and interact.sh , but the authors of this threat operation operated a private domain called i-sh.detectors-testing.com. VulnCheck’s Canary threat intelligence system detected approximately 1,400 exploit attempts related to this infrastructure between October 12 and

Australian Man Jailed for Evil Twin Wi-Fi Scam Targeting Airline Passengers

An Australian court has convicted a 44-year-old man who stole the personal data of airline passengers and airport visitors over several months . He was sentenced to seven years and four months in prison for creating fake Wi-Fi networks and then using the stolen information. This story began in April 2024, when employees of an Australian airline discovered a suspicious wireless network on board a plane. After contacting the Australian Federal Police (AFP) , law enforcement arrested the suspect, then 42 years old. A search of his carry-on luggage uncovered a Pineapple portable Wi-Fi device, a laptop, and a mobile phone. Police