Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis
LECS 970x120 1

Author: Massimiliano Brolli

Massimiliano Brolli

Responsible for the RED Team of a large Telecommunications company and 4G/5G cyber security labs. He has held managerial positions ranging from ICT Risk Management to software engineering to teaching in university master's programs.

Profilo LinkedIn
Areas of Expertise Bug Hunting, Red Team, Cyber Intelligence & Threat Analysis, Disclosure, Cyber Warfare and Geopolitics, Ethical Hacking

Massimiliano Brolli is a cybersecurity professional with a long-standing career in the IT and cybersecurity fields. He currently holds leadership roles in security, Cyber Threat Intelligence, and 0-day research within a major Italian technology group.

Current Positions

  • Head of Red Team, 0-day Research & Network Penetration Testing at TIM, a large Italian telecommunications company, responsible for offensive security operations, threat intelligence activities, and the discovery of previously undocumented vulnerabilities.

  • Founder of the Red Hot Cyber community, a project launched in 2019 to promote cybersecurity awareness and risk culture, engaging professionals, students, and international communities.

Core Skills

  • Cybersecurity & Cyber Threat Intelligence: leadership of technical teams and advanced research on threats and vulnerabilities.

  • Security Research (0-day): design and execution of research programs focused on identifying vulnerabilities in complex infrastructures.

  • Leadership & Innovation: creation and growth of community-driven initiatives and technical knowledge-sharing projects.

Initiatives & Contributions

  • Red Hot Cyber: a cybersecurity awareness and community project with over 140 active members, including initiatives such as the RHC Conference, an annual industry event.

  • Ongoing dissemination of technical content and digital risk awareness for both professionals and the broader public.

Professional Vision

He strongly believes in knowledge sharing and ethical hacking as key drivers to bring more people closer to cybersecurity and to help prepare the next generation of security professionals.

Massimiliano Brolli is a recognized reference figure within the Italian cybersecurity landscape, combining strong technical expertise with a clear strategic and educational vision.

Risorse web

Numero di articoli trovati: 70

Atroposia: The MaaS platform that provides a Trojan with a vulnerability scanner

Varonis researchers have discovered the Atroposia MaaS (malware-as-a-service) platform. For $200 a month, its customers receive a remote access Trojan with extensive functionality, including remote desktop, file system management, information...

Critical vulnerability in Blink: a website can block all Chromium-based browsers

Researcher José Pino has presented a proof-of-concept vulnerability in the Blink rendering engine used in Chromium -based browsers, demonstrating how a single web page can crash many popular browsers and...

Oracle VirtualBox Vulnerability: Risk of Virtual Machine Escape

BI.ZONE specialists have identified two vulnerabilities (CVE-2025-62592 and CVE-2025-61760) in Oracle VirtualBox. When combined, they allowed an attacker to exit a virtual machine and reach the ARM-based macOS host system....

Oracle Critical Patch Update October 2025: 374 vulnerabilities fixed

Oracle has released its new quarterly security update, the October 2025 Critical Patch Update , which addresses 374 vulnerabilities identified in numerous Oracle products. This is one of the largest...

F5 BIG-IP Vulnerability: 266,000 Devices at Risk Worldwide! 2,500 in Italy

The Cybersecurity and Infrastructure Security Agency (CISA) and the Multi-State Information Sharing & Analysis Center (MS-ISAC) are issuing this Joint Cybersecurity Advisory (CSA) in response to the active exploitation of...

Critical vulnerability in Linux-PAM: Privilege escalation with CVE-2025-8941

A high-severity vulnerability has been identified in the Pluggable Authentication Modules (PAM) framework with the identifier CVE-2025-8941. This vulnerability originates in the core of Linux operating systems and allows attackers...

Pasquale’s Experience: A Text Message in the Heat – Session 1

Cybercrime is increasingly looming over the unfortunate online world. Fake profiles and scams are rampant on social networks, which, even with the best artificial intelligence, struggle to keep up with...

Critical vulnerabilities in Microsoft Defender for Endpoint: security risks

Security flaws have been discovered in network communication between Microsoft Defender for Endpoint (DFE) cloud services , allowing attackers, following a breach, to bypass authentication, manipulate data, release sensitive information,...

WhatsApp Alert: New Malware Spreads Like a Virus Among Contacts

Trend Micro researchers have detected a large-scale malware campaign targeting users in Brazil. It is distributed via the desktop version of WhatsApp and is characterized by a high infection rate....

Never accept USB flash drives from strangers! A practical example of physical hacking with a USB flash drive.

Have you ever been told that if you find a USB flash drive on the ground, you shouldn't plug it into your computer? Today, we'll explain why you shouldn't do...