Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Cyber Offensive Fundamentals 320x200 V0.1
Banner Ancharia Desktop 1 1

Author: Agostino Pellegrino

Agostino Pellegrino

He is a freelancer, teacher and expert in Computer Forensics, Cyber Security and Ethical Hacking and Network Management. He has collaborated with leading educational institutions internationally and has practiced teaching and mentorship in advanced Offensive Security techniques for NATO obtaining major awards from the U.S. Government. His motto is "Study. Always."

Profilo LinkedIn
Areas of Expertise Incident Response, Malware Analysis, Penetration Testing, Red Teaming
Numero di articoli trovati: 222

Lovense writes to Red Hot Cyber. The CEO provides clarification on security vulnerabilities.

Regarding our previous article about security bugs discovered in Lovesense devices (a leading company in the field of intimacy technology devices), the company has released an official statement to Red...

Analysis of the Silver Fox Trojan’s Google Translate-imitating attack campaign

According to the Knownsec 404 Advanced Threat Intelligence Team, a surge in attack activity has recently been observed involving the Silver Fox Trojan, which mimics popular tools such as Google...

Auto-Color malware distributed via a vulnerability in SAP NetWeaver

Darktrace has recorded a targeted attack on a US chemical company, in which attackers exploited a critical vulnerability in the SAP NetWeaver platform. The threat, registered as CVE-2025-31324, consisted of...

Oscar-winning bug for macOS/iOS! An encrypted email causes the device to crash.

Can an encrypted email cause a macOS/iOS system to crash immediately? The answer is YES! This is not a science fiction plot, but a real attack, as revealed by the...

What is a Bug Bounty and what is a responsible disclosure program?

In recent years, concerns about cybersecurity have grown exponentially. The increase in cyber attacks, the advancement of hacking techniques, and the ever-increasing importance of personal data have led many companies...

New macOS bug allows TCC bypass to steal user data

Microsoft said that attackers may have exploited a recently patched Transparency, Consent, and Control (TCC) bypass vulnerability to steal sensitive information from macOS users, including cached Apple Intelligence data. TCC...

Is Your Smart TV Spying on You? Security Gaps and Critical Vulnerabilities in IoT Devices

Networked smart devices are no longer simple helpers, but potential enemies. With every new thermostat or TV connected to the internet, a new flaw opens up in the digital infrastructure...

Zero-click exploits: the new invisible frontier of cyber attacks

In recent years, cybersecurity has seen the emergence of increasingly sophisticated threats, capable of compromising devices and personal data without the user taking any action. Among these, so-called zero-click exploits...

Fire Ant Attacks: How a vCenter Bug Opens the Door to IT Hell

Sygnia reports that the initial Fire Ant attack vector, CVE-2023-34048, exploits an out-of-bounds write vulnerability in the vCenter Server implementation of the DCERPC protocol, allowing unauthenticated remote code execution. Security...

Microsoft Betrayed from Within? Chinese Hackers Exploited SharePoint Bugs Before Patches

Microsoft has launched an internal investigation to determine whether a leak of confidential information from the Microsoft Active Protections Program (MAPP) allowed state-sponsored Chinese hackers to exploit serious SharePoint vulnerabilities...