Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Redhotcyber Banner Sito 320x100px Uscita 101125
Banner Desktop

Author: Agostino Pellegrino

Agostino Pellegrino

He is a freelancer, teacher and expert in Computer Forensics, Cyber Security and Ethical Hacking and Network Management. He has collaborated with leading educational institutions internationally and has practiced teaching and mentorship in advanced Offensive Security techniques for NATO obtaining major awards from the U.S. Government. His motto is "Study. Always."

Profilo LinkedIn
Areas of Expertise Incident Response, Malware Analysis, Penetration Testing, Red Teaming
Numero di articoli trovati: 222

Oracle E-Business Suite Zero-Day Attack: Clop Exploits CVE-2025-61882

Last week, Oracle warned customers of a critical zero-day vulnerability in its E-Business Suite (CVE-2025-61882), which allows remote execution of arbitrary code without authentication. It has now been revealed that...

Google CodeMender is here! When AI finds bugs in code and fixes them itself.

It would be fantastic to have an AI agent capable of automatically analyzing our projects' code, identifying security bugs, generating fixes, and immediately releasing them into production. Yet, it seems...

RediShell: A 13-year-old score 10 RCE has been upgraded to Redis

A 13-year-old critical flaw, known as RediShell , in Redis allows remote code execution (RCE) , giving attackers the ability to gain full control of the underlying host system. The...

An 8-year-old critical bug in the Unity game engine poses risks to Android and Windows.

A vulnerability has been discovered in the Unity game engine, which has been present since 2017. The issue can be exploited for code execution on Android and privilege escalation on...

Oracle E-Business Suite 9.8 Vulnerability: Urgent Updates Needed

Oracle has published a security advisory regarding a critical vulnerability identified as CVE-2025-61882 in the Oracle E-Business Suite . The flaw can be exploited remotely without authentication , potentially allowing...

100 bug researchers, $32 million! HackerOne: AI bugs are on the rise!

Vulnerability bounty platform HackerOne reported that white hat hackers worldwide received $81 million in compensation over the past 12 months. According to the company, this represents a 13% increase over...

CISA Alert: Sudo Bug Affects Linux and Unix! Urgent Action Required by October 20th

The Cyberspace and Infrastructure Security Center (CISA) recently added the critical vulnerability in the Sudo utility to its Actively Exploited Vulnerabilities (KEV) list. This effectively prompts government agencies to take...

With 50 dollars and physical access to the server, the Cloud goes to hell

A team of researchers has developed a simple hardware tool that challenges the fundamental principles of trusted computing in modern cloud environments. Using a device costing less than $50, they...

From user to root in a second! CISA warns: millions of operating systems at risk. Patch!

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical vulnerability in the popular Sudo utility, used on Linux and Unix-like systems, to its catalog of currently exploitable...

0-day 0-click WhatsApp! All it takes is one image to take control of your iPhone.

Some spyware producer is probably doing gymnastics... tearing their hair out. But it's the usual charade: someone finds, someone cashes in, someone integrates, and then the researcher on duty comes...