Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
320x100 Olympous
970x120 Olympous

Author: Agostino Pellegrino

Agostino Pellegrino

He is a freelancer, teacher and expert in Computer Forensics, Cyber Security and Ethical Hacking and Network Management. He has collaborated with leading educational institutions internationally and has practiced teaching and mentorship in advanced Offensive Security techniques for NATO obtaining major awards from the U.S. Government. His motto is "Study. Always."

Profilo LinkedIn
Areas of Expertise Incident Response, Malware Analysis, Penetration Testing, Red Teaming

Agostino Pellegrino is an expert in cybersecurity, cyber intelligence, and digital forensics, with a strong commitment to training, specialized consulting, and technical dissemination. Through an approach that combines methodological rigor, hands-on expertise, and an educational mindset, he supports organizations and professionals in addressing challenges related to digital security, social engineering, and regulatory compliance.

Positions and Roles

  • Chairman & Cybersecurity Consultant – ApInfoSec: Founder and leader of ApInfoSec, a firm focused on cybersecurity, cyber intelligence, networking, and digital forensics, providing specialized consulting services to companies and professionals, as well as advanced training programs for public and private institutions.
  • Trainer & Educator in Cybersecurity, CTI, and Forensics: Lecturer and trainer at training institutes and master’s programs, delivering practice-oriented courses and leveraging over twenty years of experience in advanced offensive security techniques and sensitive information management.
  • Editor and Contributor – Red Hot Cyber: Author of technical content for Red Hot Cyber, including analyses, articles, and in-depth pieces on cybersecurity topics and industry regulations.

Core Competencies

  • Cybersecurity & Offensive Security: design, analysis, and assessment of security systems, with particular focus on social engineering, network hardening, security assessments, and remediation activities.
  • Cyber Intelligence & Threat Analysis: research, monitoring, and analysis of threats and threat actors within digital ecosystems, with contributions on emerging scenarios and dark web dynamics.
  • Digital Forensics & Incident Response: forensic investigations, digital evidence handling, incident response, and risk mitigation in investigative and legal contexts.
  • Regulatory and Compliance: support for organizations in aligning with industry regulations and standards, with a strong focus on regulatory compliance and digital security culture.

Initiatives and Contributions

  • Experiential Training: tailored training programs based on hands-on exercises, roleplay, and gamification techniques, designed to develop operational skills within technical teams and security functions.
  • Conferences and Knowledge Sharing: speaker at industry events focused on cybersecurity and artificial intelligence, addressing technological and regulatory implications for information protection.

Professional Vision

Agostino promotes a vision of cybersecurity as an integrated discipline, where education, operational awareness, and risk culture are key enablers for building resilient systems and informed communities. He is particularly recognized for his ability to translate complex concepts into practical, actionable training paths, emphasizing adaptability and continuous professional growth.

Numero di articoli trovati: 222
Fumetto sul cyberbullismo di Red Hot Cyber

“Byte The Silence”: RHC’s Free Shock Comic About Cyberbullying Out Today!

Today, June 23, 2025, "Byte The Silence" is released, the new comic about cyberbullying created by Red Hot Cyber, is available from today for free in electronic format, on our...

HijackLoader Expands Techniques to Improve Defense Evasion 

Donato Onofri e Emanuele Calvelli Endpoint Security & XDR CrowdStrike. HijackLoader continues to become increasingly popular among adversaries for deploying additional payloads and tooling A recent HijackLoader variant employs sophisticated techniques to...