Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
LECS 320x100 1
Banner Ancharia Desktop 1 1

Author: Agostino Pellegrino

Agostino Pellegrino

He is a freelancer, teacher and expert in Computer Forensics, Cyber Security and Ethical Hacking and Network Management. He has collaborated with leading educational institutions internationally and has practiced teaching and mentorship in advanced Offensive Security techniques for NATO obtaining major awards from the U.S. Government. His motto is "Study. Always."

Profilo LinkedIn
Areas of Expertise Incident Response, Malware Analysis, Penetration Testing, Red Teaming

Agostino Pellegrino is an expert in cybersecurity, cyber intelligence, and digital forensics, with a strong commitment to training, specialized consulting, and technical dissemination. Through an approach that combines methodological rigor, hands-on expertise, and an educational mindset, he supports organizations and professionals in addressing challenges related to digital security, social engineering, and regulatory compliance.

Positions and Roles

  • Chairman & Cybersecurity Consultant – ApInfoSec: Founder and leader of ApInfoSec, a firm focused on cybersecurity, cyber intelligence, networking, and digital forensics, providing specialized consulting services to companies and professionals, as well as advanced training programs for public and private institutions.
  • Trainer & Educator in Cybersecurity, CTI, and Forensics: Lecturer and trainer at training institutes and master’s programs, delivering practice-oriented courses and leveraging over twenty years of experience in advanced offensive security techniques and sensitive information management.
  • Editor and Contributor – Red Hot Cyber: Author of technical content for Red Hot Cyber, including analyses, articles, and in-depth pieces on cybersecurity topics and industry regulations.

Core Competencies

  • Cybersecurity & Offensive Security: design, analysis, and assessment of security systems, with particular focus on social engineering, network hardening, security assessments, and remediation activities.
  • Cyber Intelligence & Threat Analysis: research, monitoring, and analysis of threats and threat actors within digital ecosystems, with contributions on emerging scenarios and dark web dynamics.
  • Digital Forensics & Incident Response: forensic investigations, digital evidence handling, incident response, and risk mitigation in investigative and legal contexts.
  • Regulatory and Compliance: support for organizations in aligning with industry regulations and standards, with a strong focus on regulatory compliance and digital security culture.

Initiatives and Contributions

  • Experiential Training: tailored training programs based on hands-on exercises, roleplay, and gamification techniques, designed to develop operational skills within technical teams and security functions.
  • Conferences and Knowledge Sharing: speaker at industry events focused on cybersecurity and artificial intelligence, addressing technological and regulatory implications for information protection.

Professional Vision

Agostino promotes a vision of cybersecurity as an integrated discipline, where education, operational awareness, and risk culture are key enablers for building resilient systems and informed communities. He is particularly recognized for his ability to translate complex concepts into practical, actionable training paths, emphasizing adaptability and continuous professional growth.

Numero di articoli trovati: 222

Gravity Forms Under Attack: WordPress Plugin Infected with a Backdoor

The popular WordPress Gravity Forms plugin has suffered a supply chain attack, infecting its official website with a backdoor. Gravity Forms is a premium plugin for creating contact forms, payment...

Russian domestic hackers Cozy Bear (APT29). Analysis of the main attacks and their TTPs.

Author: Gianluca Tiepolo APT29 is a highly sophisticated Advanced Persistent Threat (APT) group that has been attributed to Russia's Foreign Intelligence Service (SVR). The group has been active since at...

A RCE vulnerability in Wing FTP Server rated 10 opens the door to 10,000 companies.

Huntress researchers have detected active exploitation of a critical vulnerability in Wing FTP Server, just one day after its public disclosure. The vulnerability CVE-2025-47812 has been assigned the highest severity...

RCE 0day Exploit for WinRAR and WinZIP for Sale on Exploit.in for Scam Phishing Emails

Recently, the popular underground forum exploit.in, currently closed and accessible by invitation only, has been offering exploits for a 0day vulnerability affecting the well-known WinRAR and WinZIP programs. The ad,...

Critical Vulnerabilities in SMBClient for macOS. 9.8 out of 10 for Effective RCE

Experts have identified serious vulnerabilities in SMBClient for macOS that affect both user space and the operating system kernel. These vulnerabilities potentially allow remote execution of arbitrary code and disruption...

The Race to 0day! China Advances in Offensive Cyberpower, While the US Is Forced to Chase

China's growing rise has prompted U.S. officials to strongly emphasize the need to improve its offensive cyber capabilities. However, some doubts remain about the ability to meet the challenge, given...

Cybersecurity, Italy on the podium with four young people. There is also Leonardo already protagonist in the RHC CTF

The first edition of the International Cybersecurity Olympiad ended in Singapore with an excellent result for Italy. Four Italian students reached the podium, winning gold and silver medals in the...

Critical Vulnerabilities Discovered in Hundreds of Brother and Other Printers

Hundreds of printer models from Brother and other manufacturers (Fujifilm, Toshiba, Ricoh and Konica Minolta) have been found to be vulnerable to serious vulnerabilities discovered by researchers at Rapid7. For...

US-Iran Cyberwar: DHS Raises Alarm, American Networks Under Attack

The United States has warned of possible cyber attacks by pro-Iranian groups following a series of airstrikes against Iranian nuclear facilities, as part of the armed conflict between Iran and...

“Jailbreak as a Service” is Coming: 60 Euros a Month to Purchase Cybercrime-Ready AI Systems

According to a report by Cato Networks, cybercriminals continue to actively use LLM patterns in their attacks. Specifically, we are talking about versions of theGrok and Mixtral patterns that have been deliberately modified to bypass...