Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis
970x20 Itcentric

Author: Agostino Pellegrino

Agostino Pellegrino

He is a freelancer, teacher and expert in Computer Forensics, Cyber Security and Ethical Hacking and Network Management. He has collaborated with leading educational institutions internationally and has practiced teaching and mentorship in advanced Offensive Security techniques for NATO obtaining major awards from the U.S. Government. His motto is "Study. Always."

Profilo LinkedIn
Areas of Expertise Cybersecurity architecture, Threat intelligence, Digital forensics, Offensive security, Incident response & SOAR, Malware analysis, Compliance & frameworks

Agostino Pellegrino is an expert in cybersecurity, cyber threat intelligence, and digital forensics with over twenty years of experience, specialized in integrating technical research, field operations, and advanced training. Founder of ApInfoSec and technical contributor for Red Hot Cyber, he works on designing secure architectures, incident response, SOC/CTI/DFIR engineering, and advanced teaching. His approach is evidence-based, focused on resilience, automation, and compliance with major frameworks and standards.

Positions and Roles

  • Founder and Head – ApInfoSec: specialized consultancy, security design, cyber intelligence, incident response, digital forensics, and advanced training.
  • Technical Contributor – Red Hot Cyber: publishing articles, threat analyses, case studies, and insights on offensive and defensive techniques.
  • Instructor and Trainer: ITS programs, master’s courses, and specialized training in offensive security, penetration testing, threat intelligence, malware analysis, incident response, digital forensics, cloud security, and governance.

Core Competencies

  • Design and evaluation of enterprise and hybrid security architectures.
  • Offensive security, vulnerability assessment, and penetration testing.
  • Cyber threat intelligence, OSINT, and monitoring criminal ecosystems.
  • Malware analysis and controlled static reverse engineering.
  • Digital forensics on endpoints, servers, and cloud environments.
  • Incident response, operational playbooks, and orchestration (SOAR).
  • Compliance and alignment with ISO/IEC 27001, NIS2, GDPR, IEC 62443, DORA, MITRE ATT&CK, FIRST.
  • Development of integrated SOC/CTI operational platforms (Elastic, OpenCTI, MISP, Wazuh, Velociraptor, XSOAR).

Initiatives and Contributions

  • Development of SOC and CTI operational platforms based on open-source and commercial stacks, focusing on automation, correlation, and data quality.
  • Design of training syllabi combining theory and hands-on labs for real operational skills.

Recognitions, Projects, Certifications, and Publications

  • Author of articles and technical contributions for Red Hot Cyber.

Professional Vision

Agostino views cybersecurity as a systemic discipline where technology, processes, and human factors must be integrated. He promotes awareness, continuous verification, adaptability, and skills development, avoiding purely formal approaches. He stands out for translating complex concepts into concrete operational models, balancing technical depth, methodological rigor, and practical usability.

Numero di articoli trovati: 112

Salt Typhoon Hackers Exposed: Cisco Training Led to Global Telecom Breaches

A recent study by SentinelLabs sheds new light on the roots of the hacker group known as “Salt Typhoon ,” which carried out one of the most audacious espionage operations...

NVIDIA Merlin Security Update: Fixing High-Severity Vulnerabilities

NVIDIA has released a significant security update for its Merlin framework, addressing several high-severity vulnerabilities. These vulnerabilities could allow attackers to execute malicious code or alter sensitive data within AI...

React Server Components Vulnerability: Update to Prevent DoS Attacks

The React Server component security saga continues this week. Following the patching of a critical remote code execution (RCE) vulnerability that led to React2shell, researchers have discovered two new vulnerabilities....

Critical Windows PowerShell Vulnerability CVE-2025-54100: Update Now

An urgent security update has been released to address a critical vulnerability in Windows PowerShell that allows attackers to execute malicious code on affected systems. This security flaw, designated CVE-2025-54100,...

LLM-Powered Malware: The Future of Autonomous Cyber Threats

Researchers at Netskope Threat Labs have just published a new analysis on the possibility of creating autonomous malware built exclusively from Large Language Models (LLMs), eliminating the need to encode...

Intellexa Exploits Zero-Day Vulnerabilities with Spyware

Despite significant geopolitical challenges, the mercenary spyware industry remains a resilient and persistent threat; in this context, the well-known vendor Intellexa continues to expand its arsenal. A recent report from...

Splunk Enterprise Vulnerability: CVE-2025-20386 and CVE-2025-20387

Security researchers have discovered two high-risk vulnerabilities (CVE-2025-20386 and CVE-2025-20387, with CVSS severity 8.0) affecting the Splunk Enterprise platform and Universal Forwarder components. These vulnerabilities result from incorrect permissions on...

Cyber Insurance: Why Basic Hygiene Matters

Cyber insurance has become a topic of discussion on management committees. It's no longer an add-on, but rather an essential consideration in corporate risk management. Yet many companies rely on...

Porsche Russia Alarm Issues Spark Widespread Vehicle Immobilization

Porsche owners in Russia are increasingly experiencing problems with factory alarms, making it impossible to use their cars. Their cars won't start, stall immediately after starting, or display engine-related errors...

WormGPT 4: AI-Powered Cybercrime Tools on the Rise

Cybercriminals no longer need to convince ChatGPT or Claude Code to write malware or data-stealing scripts. A whole class of specialized language models, specifically designed for attacks, already exists. One...