Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis
Crowdstriker 970×120

Author: Agostino Pellegrino

Agostino Pellegrino

He is a freelancer, teacher and expert in Computer Forensics, Cyber Security and Ethical Hacking and Network Management. He has collaborated with leading educational institutions internationally and has practiced teaching and mentorship in advanced Offensive Security techniques for NATO obtaining major awards from the U.S. Government. His motto is "Study. Always."

Profilo LinkedIn
Areas of Expertise Cybersecurity architecture, Threat intelligence, Digital forensics, Offensive security, Incident response & SOAR, Malware analysis, Compliance & frameworks

Agostino Pellegrino is an expert in cybersecurity, cyber threat intelligence, and digital forensics with over twenty years of experience, specialized in integrating technical research, field operations, and advanced training. Founder of ApInfoSec and technical contributor for Red Hot Cyber, he works on designing secure architectures, incident response, SOC/CTI/DFIR engineering, and advanced teaching. His approach is evidence-based, focused on resilience, automation, and compliance with major frameworks and standards.

Positions and Roles

  • Founder and Head – ApInfoSec: specialized consultancy, security design, cyber intelligence, incident response, digital forensics, and advanced training.
  • Technical Contributor – Red Hot Cyber: publishing articles, threat analyses, case studies, and insights on offensive and defensive techniques.
  • Instructor and Trainer: ITS programs, master’s courses, and specialized training in offensive security, penetration testing, threat intelligence, malware analysis, incident response, digital forensics, cloud security, and governance.

Core Competencies

  • Design and evaluation of enterprise and hybrid security architectures.
  • Offensive security, vulnerability assessment, and penetration testing.
  • Cyber threat intelligence, OSINT, and monitoring criminal ecosystems.
  • Malware analysis and controlled static reverse engineering.
  • Digital forensics on endpoints, servers, and cloud environments.
  • Incident response, operational playbooks, and orchestration (SOAR).
  • Compliance and alignment with ISO/IEC 27001, NIS2, GDPR, IEC 62443, DORA, MITRE ATT&CK, FIRST.
  • Development of integrated SOC/CTI operational platforms (Elastic, OpenCTI, MISP, Wazuh, Velociraptor, XSOAR).

Initiatives and Contributions

  • Development of SOC and CTI operational platforms based on open-source and commercial stacks, focusing on automation, correlation, and data quality.
  • Design of training syllabi combining theory and hands-on labs for real operational skills.

Recognitions, Projects, Certifications, and Publications

  • Author of articles and technical contributions for Red Hot Cyber.

Professional Vision

Agostino views cybersecurity as a systemic discipline where technology, processes, and human factors must be integrated. He promotes awareness, continuous verification, adaptability, and skills development, avoiding purely formal approaches. He stands out for translating complex concepts into concrete operational models, balancing technical depth, methodological rigor, and practical usability.

Numero di articoli trovati: 112

Living-off-the-Land 2.0: When Attackers Weaponize Security Tools

Sophos has warned of an increasingly sophisticated attacker practice: the use of legitimate cybersecurity tools as part of a Living-off-the-Land (LotL) tactic, in which an attack is carried out using...

Critical vulnerabilities are on the rise! Awareness, Patching, and Audits are key.

According to a Kaspersky Lab report, the use of vulnerabilities increased significantly in the second quarter of 2025: almost every subsystem of modern computers was attacked, from UEFI to browser...

It’s a global cyber shock! Beijing’s 007s are infiltrating and compromising the world’s Internet backbones.

The United States and several allied countries have issued a joint warning about a growing cyber offensive conducted by actors sponsored by the People's Republic of China. According to a...

Critical vulnerabilities in NetScaler ADC and Gateway. Update now! Attacks are ongoing!

NetScaler has alerted administrators of three new vulnerabilities in NetScaler ADC and NetScaler Gateway, one of which is already being used in active attacks. Updates are available and the vendor...

Google’s 2025 Performance Review: Fewer Bugs, More Vibe Coding

For Google employees, "staying ahead of the curve" means not just developing AI, but also being able to use it every day. In recent months, the company has seen growing...

Critical Downgrade Bug in Chat-GPT Leads to Jailbreak of Model

A critical flaw found in OpenAI's latest model, ChatGPT-5, allows attackers to bypass advanced security features through the use of simple expressions. This bug, dubbed "PROMISQROUTE" by researchers at Adversa...

Spyware under fire! Apple releases a critical patch for a 0day used on iOS and iPadOS

Apple has released an urgent security patch for iOS and iPadOS to address a critical zero-day vulnerability. This vulnerability, identified as CVE-2025-43300, has been confirmed to be actively exploited in...

Critical Score 10 Vulnerability in Erlang/Open Telecom Platform: Active Exploits on the Rise

Researchers recorded that a critical flaw in the Erlang/Open Telecom Platform SSH stack implementation began being actively exploited as early as early May 2025; approximately 70% of detections occurred on...

SQLite, Nginx, and Apache collapse in a day. Will hackers and AI agents revolutionize bug hunting?

Developing AI agents capable of identifying vulnerabilities in complex systems is still a challenging task that requires a lot of manual labor. However, these agents offer a major advantage: unlike...

Bug da Oscar (score 10) per Cisco Secure Firewall Management Center

A critical security flaw has been disclosed by Cisco in its Secure Firewall Management Center (FMC) software, potentially allowing unauthenticated attackers to remotely execute shell commands of their choice with...