Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
TM RedHotCyber 320x100 042514
970x20 Itcentric

Author: Agostino Pellegrino

Agostino Pellegrino

He is a freelancer, teacher and expert in Computer Forensics, Cyber Security and Ethical Hacking and Network Management. He has collaborated with leading educational institutions internationally and has practiced teaching and mentorship in advanced Offensive Security techniques for NATO obtaining major awards from the U.S. Government. His motto is "Study. Always."

Profilo LinkedIn
Areas of Expertise Incident Response, Malware Analysis, Penetration Testing, Red Teaming

IBM AIX: Two critical bugs allow execution of arbitrary commands (Score 10 and 9.6)

Two serious vulnerabilities in IBM's AIX operating system could allow remote attackers to execute arbitrary commands on affected systems, prompting the company to issue important security updates. Both vulnerabilities represent...
Share on Facebook Share on LinkedIn Share on X

A bug in ImunifyAV antivirus leads to RCE. 56 million sites at risk.

A vulnerability has been discovered in the Linux hosting ecosystem : the ImunifyAV malware scanner has been found to be vulnerable to remote code execution (RCE). The issue affects the...
Share on Facebook Share on LinkedIn Share on X

Microsoft fixes 63 vulnerabilities, including an actively exploited zero-day

On November's Patch Tuesday, Microsoft fixed 63 vulnerabilities , including a critical zero-day vulnerability that had already been exploited in attacks. This time, the fixes affected a wide range of...
Share on Facebook Share on LinkedIn Share on X

Slammer, the first worm to use a bug that hasn’t been fixed for six months.

Many years have passed since the SQL Slammer worm spread uncontrollably on January 25, 2003. It was one of the fastest-spreading malware in history , and with this article we...
Share on Facebook Share on LinkedIn Share on X

Synology fixes a zero-day bug in BeeStation OS. Researchers receive $40,000.

Synology has patched a zero-day vulnerability in its BeeStation devices, demonstrated during the recent Pwn2Own competition. The bug, identified as CVE-2025-12686, falls under the category of "buffer copying without input...
Share on Facebook Share on LinkedIn Share on X

Let’s find out what cyber insurance is. It insures your online business, but not only that.

The digital world is constantly evolving, and with the growth of online activity, protecting your business from potential cyber threats has become increasingly important. Cyber insurance is a form of...
Share on Facebook Share on LinkedIn Share on X

QNAP fixes 7 critical NAS bugs discovered at Pwn2Own Ireland 2025

QNAP has fixed seven critical zero-day vulnerabilities in its Network Attached Storage (NAS) operating systems after a group of researchers successfully exploited them at Pwn2Own Ireland 2025 , held in...
Share on Facebook Share on LinkedIn Share on X

2 critical bugs detected on Cisco Unified Contact Center Express (CCX)

Cisco has published two new critical vulnerabilities affecting Cisco Unified Contact Center Express (CCX) , the platform used by thousands of companies to manage contact centers and unified communications. The...
Share on Facebook Share on LinkedIn Share on X

CISA Warns! New Bugs in Gladinet, Control Web Panel, and WordPress Expose Systems

Two vulnerabilities related to Gladinet and Control Web Panel (CWP) have been added to the U.S. Cybersecurity and Infrastructure Security Agency (CISA) catalog of known exploited vulnerabilities (KEVs), due to...
Share on Facebook Share on LinkedIn Share on X

New bugs in Teams open the door to data theft and social engineering

Cybersecurity experts have disclosed four vulnerabilities in Microsoft Teams that could have allowed attackers to conduct dangerous social engineering and impersonation attacks against users. Simply put, these loopholes allow you...
Share on Facebook Share on LinkedIn Share on X