Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis
970x120 Olympous

Author: Pietro Melillo

Pietro Melillo

Head of the Dark Lab group. A Computer Engineer specialised in Cyber Security with a deep passion for Hacking and technology, currently CISO of WURTH Italia, he was responsible for Cyber Threat Intelligence & Dark Web analysis services at IBM, carries out research and teaching activities on Cyber Threat Intelligence topics at the University of Sannio, as a Ph.D, author of scientific papers and development of tools to support cybersecurity activities.
Leads the CTI Team "RHC DarkLab"

Profilo LinkedIn
Areas of Expertise Cyber Threat Intelligence, Ransomware, National Security, Training

Pietro Melillo is a cybersecurity professional with solid experience in Cyber Threat Intelligence (CTI), security governance, and advanced threat analysis. His background combines high-level operational roles, academic research, and technical dissemination, with a strong focus on understanding threat ecosystems and their impact on business.

Current Positions

  • Chief Information Security Officer (CISO) – Würth Italy: Responsible for defining and governing the enterprise-wide cybersecurity strategy across multiple business entities. Oversees regulatory compliance, with a strong focus on the NIS2 Directive, and the adoption and continuous improvement of international standards such as ISO/IEC 27001. He also leads organization-wide initiatives in incident response, vulnerability management, security awareness, and AI governance, ensuring alignment between security controls, regulatory requirements, and business objectives.
  • PhD Researcher in Cyber Threat Intelligence – University of Sannio: Research activities focused on the ransomware ecosystem, dark web dynamics, and data-driven models for cyber threat analysis and prediction.
  • Director of the CTI Group “DarkLab” – Red Hot Cyber: Coordinates research, monitoring, and dissemination activities related to emerging threats, underground ecosystems, and the evolution of cybercrime.

Core Competencies

  • Cyber Threat Intelligence: advanced threat analysis, predictive models, and study of digital criminal ecosystems.
  • Security Governance & Compliance: integration of cybersecurity, regulatory frameworks, and business strategies (NIS2, ISO/IEC 27001).
  • Incident Response & Vulnerability Management: structured handling of security incidents and risk mitigation processes.
  • AI Governance & Security Awareness: governance models and awareness programs for emerging technologies.

Initiatives and Contributions

  • Academic teaching: lecturer and academic collaborator at several Italian universities, including the University of Rome Tor Vergata and the University of Sannio, delivering courses on CTI, dark web analysis, and cybercrime.
  • Applied research: development of studies and analyses based on empirical data and threat intelligence methodologies, with a strong focus on operational applicability.
  • Knowledge sharing: active contributor to Red Hot Cyber initiatives, supporting the dissemination of knowledge on emerging cyber threats.

Professional Vision

He advocates for an integrated approach to cybersecurity that combines research, operations, and governance, aiming to anticipate threats through data-driven analysis and a deep understanding of digital criminal ecosystems. His goal is to reduce decision-making uncertainty and enhance organizational resilience in an ever-evolving threat landscape.

Web resources

Numero di articoli trovati: 90

Stormous claims an attack on NASA

In recent years, the landscape of cyber threats has been dominated by increasingly sophisticated ransomware groups. Among them, the ransomware group Stormous has gained notoriety for targeting high-profile organizations, including...

Alleged SpaceX Database Breach Published on BreachForums

A recent post on a dark web forum has caught the attention of the international cybersecurity community. A user, identified by the nickname l33tfg, claimed to have published a supposed...

Arrest of Pavel Durov: Telegram Founder Detained in Paris

On August 24, 2024, French authorities arrested Pavel Durov, the founder and CEO of Telegram, at Le Bourget Airport. Durov, a 39-year-old Franco-Russian citizen, had just arrived from Azerbaijan on...

IntelBroker Takes Control of BreachForums: A New Chapter in Cybercrime Management

IntelBroker Takes Control of BreachForums: A New Chapter in Cybercrime Management IntroductionThe recent acquisition of BreachForums by IntelBroker marks a significant shift in the landscape of cybercrime. This transition of...

Echelon Stealer: The Open Source Malware

Echelon Stealer is an infostealer malware that was first discovered in 2018 and is still active. Currently shared as an open-source tool on GitHub, Echelon Stealer offers various advanced features...

The Ransomware Group Ransomexx Claims Attack on Liteon

On July 26, 2024, the ransomware group Ransomexx publicly claimed responsibility for an attack against Liteon, a giant in the electronic components sector. This attack is further evidence of the...

PoC Released for SQL Injection Without Authentication on WordPress WZone Plugin

A proof of concept (PoC) for a critical vulnerability identified as CVE-2024-33544 has recently been released. This vulnerability involves an unauthenticated SQL injection, which poses a serious threat to the...

Sale of a 0Day RCE Exploit for GLPI HelpDesk

Recently, a user on the Breachforums known as "cisc0" posted an announcement regarding the sale of a 0Day exploit for GLPI HelpDesk. According to the user, this exploit works on...

Play Ransomware Claims Attack on MIPS Technologies

In the last few hours, the Data Leak site of the ransomware gang Play Ransomware has published a new claim: the giant MIPS Technologies (www.mips.com) has been the victim of...

Rockstar Games Possibly Victim of a Massive Data Leak!

Recently, an alleged data leak has involved Rockstar Games, one of the world's largest video game producers, famous for titles like Grand Theft Auto and Red Dead Redemption. According to...